The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks count as an attack on its member states that could start a war. Leaving the definition open could cool fears about whether hackers could start a war.
Turning computer code into a kind of math puzzle may hold the key to protecting software from hackers. A consortium of universities developing the idea, called mathematical obfuscation, recently received a $5 million grant from the U.S. government as part of a broader cybersecurity initiative.
Secure Channels Inc. has announced that none of the 155 hackers at the recent Black Hat USA 2014 Conference in Las Vegas who participated in a “Can You Break This” contest were able to hack the company’s new patented PKMS2 Encryption Technology.
Mixing upper and lower case letters, numbers and special characters doesn’t make passwords any harder for hackers to crack, only increasing the number of characters does, according to new research from Trustwave.
The hottest topic in the insurance world today is cyber risk insurance, or coverage for the response to and fallout from cyber crime and breaches. Although high–profile breaches have led to skyrocketing interest in cyber insurance, they have also highlighted a glaring weakness in insurance companies’ ability to price — and therefore offer — such coverage: the lack of incident resolution expertise.
Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.
Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.
Virtual environments are a tool that security researchers and security software use to automatically analyze and detect malware. But according to Symantec research, virtual machines (VMs) are becoming more common in enterprise operational environments — so malware authors are learning to write their code to attack that infrastructure more effectively while avoiding detection.
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response. A new SANS incident response survey looks at how practitioners are dealing with these numerous incidents.
Lean operations and a lack of technical staff make non-governmental organizations a prime, and relatively soft, target for well-funded adversaries, according to an academic study of a four-year campaign targeting one such group.
If the NSA still doesn’t know the full extent of the greatest leak of secrets in its history, it’s not because of Edward Snowden’s attempts to cover his tracks. On the contrary, the NSA’s most prolific whistleblower now claims he purposefully left a trail of digital bread crumbs designed to lead the agency directly to the files he’d copied.
Hackers can be tough opponents because the best of them share ideas online about new ways to attack networks and how to hide from law enforcement. Gangs in nations like Russia or China can be particularly resourceful and dangerous — especially since governments there are secretly sponsoring hackers' efforts and protecting them from international law enforcement.
A one-two combination of malware programs has infiltrated the embassies and government systems of a number of former Eastern Bloc nations as well as European targets, according to a technical analysis by security researchers.
Computer forensic and cybersecurity tools are getting smarter and easier to use by the week, but I'd like to offer a contrarian view and tell you that it's not necessarily a good thing. Better tools — or rather, better tool marketing — can lull you into a false sense of security.
Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file.