The president of Jigsaw, a Google-owned company using technology to problem-solve global conflicts, speaks in Sarasota. Elizabeth Djinis Staff Writer @djinisinabottle SARASOTA — If Russia did launch a cyber-attack on the U.S. before last year’s presidential election in favor of President Donald Trump, it wouldn’t have tried to turn votes for one candidate, Jared Cohen, […]

by

Healthcare IT executives have had their hands full trying to protect health data from ransomware. But providers will see medical devices increasingly targeted by this kind of file-encrypting malware, according to a Department of Homeland Security official. The threat landscape for medical device cybersecurity is rapidly evolving because of the widespread adoption of Internet of […]

by

ABU DHABI // An overhaul in the way government websites are protected to help tackle hackers and prevent information leaks was unveiled by the Telecommunications Regulatory Authority at Idex on Monday. Among the security systems introduced was Mosaic, which searches a target list for cyber-attacks in the UAE. “It is still in beta testing and […]

by

The Board of Regents of the University System of Georgia approved on Feb. 14 an online Bachelor of Science in cybersecurity at Kennesaw State University. The new undergraduate degree is set to begin in fall 2017, according to a news release. It will include elements of criminal justice, information technology, and information security and assurance, […]

by

More than 100 members of the Israel Defense Forces (IDF), the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices. The attack campaign started in July and continues to date, according to researchers from antivirus firm Kaspersky Lab, […]

by

Photo: Premium Times By Fred K. Nkusi Barely a week ago, I chanced upon a programme on Al Jazeera which was held under then title “a threat of cyberwarfare”. The discussants mainly underscored the exponential increase of cyber/data espionage, as one of the tools used in actual warfare. They further noted that some governments or […]

by