That response would be reciprocation for the very public (and not particularly sophisticated) hacking we’ve seen targeting the Democratic side of this particular presidential election. This includes the DNC hacks, the Guccifer 2.0 clowning around, the targeted feeding of docs to WikiLeaks. And, if we’re going to include all the hacker toolsets, the unprecedented use […]

by

The Department of Homeland Security (DHS) Science and Technology Directorate (ST) is working to protect the Federal government’s fleet of connected vehicles from cyber threats. Executive Order 13693: Planning for Sustainability in the Next Decade, issued in March 2015, requires Federal agencies to equip their vehicles with telematics systems by March 2017. Telematics systems collect […]

by

Hackers unleashed a complex attack on the internet through common devices like webcams and digital recorders and cut access to some of the world’s best known websites on Friday, a stunning breach of global internet stability. The attacks struck Twitter, Paypal, Spotify and other customers of an infrastructure company in New Hampshire called Dyn, which […]

by

Despite conducting her own government business through a personal “homebrew” server while secretary of state, Hillary Clinton is seen in a newly obtained video lecturing her staff of their “special duty” to recognize the importance of cybersecurity. “The real key to cybersecurity rests with you,” Clinton says in the 2010 video, which was obtained by […]

by

Dyn is an internet performance management company and when things are going well, we don’t hear anything about them. That’s good, but that was not the case on Friday. The company is being hit with a distributed denial of service (DDOS) attack on Friday. It’s led to outages for high-profile sites such as Netflix (NFLX) […]

by

That response would be reciprocation for the very public (and not particularly sophisticated) hacking we’ve seen targeting the Democratic side of this particular presidential election. This includes the DNC hacks, the Guccifer 2.0 clowning around, the targeted feeding of docs to WikiLeaks. And, if we’re going to include all the hacker toolsets, the unprecedented use […]

by