A report from cybersecurity software company Protenus last month revealed that the number of affected patient records—spanning across all disclosed health data breaches—has continued to climb each quarter in 2018—from 1.13 million in Q1 to 3.14 million in Q2 to 4.4 million in Q3. But despite this continuous troubling trend, there still are indicators that […]

by

SPECIAL OFFER Try 1 month of Digital Plus for 99¢Cancel anytime ✓ Unlimited access to E-Edition (PDF of newspaper) ✓ Unlimited articles, complete access to poststar.com and apps ✓ Skip article surveys … read more at: https://poststar.com/news/local/cyber-security-grant-tightens-washington-county-systems/article_a5274aff-3838-58d0-95fe-100a4779c279.html

by

(John Kemp is a Reuters market analyst. The views expressed are his own) * Chartbook: tmsnrt.rs/2AtMMVh By John Kemp LONDON, Jan 2 (Reuters) – Fear became the dominant sentiment in 2018, especially in the second half of the year, as growing pessimism about the future gripped policymakers, business leaders, investors and journalists. Those best able […]

by

Editor’s Note: This article is the first in a special series published in collaboration with the Raisina Dialogue, which kicks off on Jan. 8 in New Delhi. Every year, the Raisina Dialogue convenes experts from a diverse cross-section of disciplines and professions to address the most challenging issues facing the global community. It is fair […]

by

The names and addresses of nearly 1,000 North Koreans who defected and resettled in South Korea were stolen during a recent security breach, according to the AP. South Korea’s Unification Ministry said the names, home addresses, and birthdays of 997 defectors were stolen sometime in November. The source of the breach hasn’t been determined, but […]

by

Created by Alice Smith, NITE Team 4 was launched into early access beta in October 2017. NITE Team 4 one of a few RPG games centered around hacking and cyber warfare, boasting to base the gameplay on original NSA documents to create an authentic hacking experience. This game could also be categorized as an alternate […]

by

Editor’s note: This commentary is by Richard Czaplinski on behalf of the members of the Will Miller Green Mountain Veterans For Peace, Chapter 57. Czaplinski, of Warren, is a U.S. Navy veteran and the president of the group. In all the controversy and discussion about the F-35s coming to Burlington (jobs, noise, dangers to surrounding […]

by

A new year fills us with new hopes, Facing attacks with new scopes. Are disasters election hacking on their way? Are major cyber attacks here to stay? Welcome to part 2 of “2019: Cyber War”.  In Part 1, I state my belief that a major cyber attack will strike in 2019.  I also begin to […]

by

Acting Secretary Eliseo Rio Jr. of the Department of Information and Communications Technology (DICT) said the country’s new major telco player—a venture backed by state-owned China Telecom—would be subjected to more stringent cybersecurity requirements to protect against possible threats to national security. Rio said the DICT was working with multiple government agencies, including the National […]

by