Cyber Security

DEF CON Hardcore hackers and the corporate security industry have never really got on that well. Symantec is looking to change that after hiring Tarah Wheeler to act as its cybersecurity czar. Wheeler has a long career in the IT industry, including stints at Microsoft and Blackphone-maker Silent Circle. Both of her parents worked in […]

by

The drones have arrived. They’re flying over parks, neighborhoods, and occasionally crashing near the White House lawn. And as the number of commercial drones is expected to top 7 million by 2020, researchers are working quickly to build new defenses against the potential misuse of unmanned aerial vehicles – and trying to figure out how the flying gadgets can actually […]

by

Inside the secretive world of cybersecurity experts is a phrase that quickly determines the severity of a cyberattack: Is this mischief or calamity? For the higher-ups at the Democratic National Committee, hit by a cyberattack that vacuumed up thousands of emails, which WikiLeaks then leaked, it sure felt like a calamity. It was the night […]

by

Mike Pence’s cyberrecord As Indiana’s governor, Pence established a reputation for seeing cybersecurity through a business-focused lens and for emphasizing law enforcement’s need for greater resources to fight hacking. During his run as governor, he also pushed for tax breaks to draw in more infosec jobs into the state. In April, Pence announced the formation […]

by

LAS VEGAS (CNNMoney) – There’s now money to be made in Pokemon extermination. Citing a concern that Pokemon Go players are wandering into private land and near electrical equipment, power utility companies in Florida have hired cybersecurity company LookingGlass to pull Pokemon off the map. “We’re now in the business of killing Pokemon,” LookingGlass CEO […]

by

Giant refrigerator-sized supercomputers battled each other on Thursday in a virtual contest to show that machines can find software vulnerabilities. The result: the supercomputers time and time again detected simulated flaws in software. It represents a technological achievement in vulnerability detection, at a time when it can take human researchers on an average a year […]

by

Every day it seems like there’s another hack, password theft, or leak. Both government agencies and private companies are regularly attacked, by intruders just looking for sensitive data to sell, or foreign actors looking for valuable information. That alone is reason enough for a Presidential candidate to at least have an educated, informed cybersecurity policy. […]

by

A dozen years ago the Defense Advanced Research Projects Agency (DARPA) held its first “grand challenge” to see if autonomous automobiles could cross a 240-kilometer stretch of the Mojave Desert on their own. Mechanical problems and mishaps ended the race before any of the competitors had gone more than 12 kilometers. DARPA, the U.S. Department […]

by