George W. Bush’s Homeland Security Advisory System—the color-coded terrorism “threat level” indicator that became a symbol of post-9/11 fear mongering—is getting its spiritual successor for hacking: the “Cyber Incident Severity Schema.” President Obama announced a new policy directive Tuesday that will codify how the federal government will respond to hacking incidents against both the government […]

Earlier this year there were various predictions – including from the CEO of information-security technology vendor FireEye – that spending on cybersecurity would slow down in 2016. I was unconvinced when I initially heard the negative predictions, and, to this day, I remain skeptical; my feelings were recently reinforced by a conversation with  Steve Morgan, […]

WikiLeaks’ controversial release of Democratic National Committee staff emails may have only just begun, cybersecurity officials warned today. Democratic Presidential candidate Hillary Clinton greets guests after speaking at the Democratic National Committee’s Women’s Leadership Forum in October 2015. (Mark Wilson/Getty Images) The email leak unearthed messages from staffers appearing to show preferential treatment to Hillary […]

As the Obama administration nears its final months, the White House has released a framework for handling cyberattacks. The Presidential Policy Directive on United States Cyber Incident Coordination builds on the action plan that Obama laid out earlier this year, and it’s intended to create a clear standard of when and how government agencies will […]

Experts who’ve followed the leak of Democratic National Committee documents say they believe the party’s claim that Moscow had a hand in the hack, lending weight to the extraordinary allegation that the Kremlin is trying to tamper with the U.S. presidential contest. “You’re left with all the signs pointing to Moscow,” said Matt Tait, a […]

A cyberespionage group known for targeting diplomatic and government institutions has branched out into many other industries, including aviation, broadcasting, and finance, researchers warn. Known as Patchwork, or Dropping Elephant, the group stands out not only through its use of simple scripts and ready-made attack tools, but also through its interest in Chinese foreign relations. […]

This week the National Geographic Channel announced there will be a second season of the popular series BREAKTHROUGH, which is executive produced by Imagine Entertainment and Asylum Entertainment. In the new season award-winning directors Brendan and Emmett Malloy join the executive producing team, as well as this season’s vanguard list of directors. Brian Grazer, Ron […]

Albany Albany Law School is launching the nation’s first online master’s program aimed at the legal studies of cybersecurity and data privacy. Building off a new alliance with the University at Albany, the program will allow students to cross-register with UAlbany’s new College of Emergency Preparedness, Homeland Security and Cybersecurity, the nation’s first security college. […]

Democratic presidential candidate Hillary Clinton speaks to supporters at the Human Rights Campaign Breakfast in Washington, October 3, 2015. Joshua Roberts/Reuters Among the nearly 20,000 emails published on Wikileaks following the massive hack of the Democratic National Committee is one that, quite ironically, mocks a BuzzFeed News report critical of the DNC and RNC’s cybersecurity […]

July 25, 2016 ISR Stealer leverages compromised websites to host access panels and targets companies that deal with machinery parts. McAfee Labs researchers spotted a series of spearphishing attacks using a modified version of the Hackhound password stealer (PWS) for what they believe to be an industrial cyberespionage campaign.   The PWS, dubbed ISR Stealer, […]