A group of educators this month completed a final draft of K-12 computer science and cybersecurity standards, which, pending State Superintendent Kirsten Baesler’s approval, will go into effect this fall. These academic standards are not mandatory, as cybersecurity and computer science are not required courses of instruction. But Baesler said the overall goal of these […]

by

There are more connected cars than ever — manufacturers are making more of them than ever, more people are driving them than ever, and that means hackers and bad actors have a bigger target than ever. As connected “devices” — albeit the biggest and most complicated of connected devices — vehicles are as vulnerable as […]

by

ENISA’s headquarters in AthensENISA Last January ENISA released its annual report with the ’15 top cyber threats and trends’ in Europe. The European Union Agency for Network and Information Security (ENISA) is a center of network and information security expertise for the E.U., its Member states, the private sector and European citizens. Its prime concern […]

by

By Joel Schectman and Christopher Bing WASHINGTON (Reuters) – A team of former U.S. government intelligence operatives working for the United Arab Emirates hacked into the iPhones of activists, diplomats and rival foreign leaders with the help of a sophisticated spying tool called Karma, in a campaign that shows how potent cyber-weapons are proliferating beyond […]

by

Norwegian cybersecurity firm Visma is accusing a Chinese state-sponsored attack group (APT10) of allegedly attacking their systems and engaging in cyberespionage. Visma, in partnership with fellow security firms Recorded Future and Rapid7, investigated a cyberespionage campaign that targeted organisations in the United States and Europe between November 2017 and September 2018. One of the targeted […]

by

In proving its destructive capability during the 2016 Presidential election campaign, Information Warfare (IW), or the act of deliberately spreading false or misleading information so as to subvert an adversary’s trust in its sources, is emerging as an effective tool for promoting targeted political influence. Whilst classed as such, it is not always treated with […]

by