View Post

Budget 2017: Green light for driverless car testing

In Business, Finance, Government, Science & Nature, Security by BBCLeave a Comment

Tech News Keywords: , , , , , , , ,

The testing of driverless cars on UK roads is expected to be given the green light in Wednesday's Budget.Chancellor Philip Hammond will announce regulation changes to allow developers to apply to test the vehicles.Writing in the Sun, he said investment would "prepare the ground" for the cars to be on roads by 2021.Mr Hammond is also reportedly planning to announce proposals to build 300,000 new homes in the UK a year, as well as extra money for NHS nurses' pay.The chancellor has also promised to invest... Read More
View Post

Blockchain could ‘change everything’ for real estate

In Business, Government, Healthcare, Legal, Mobile Technology, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

“This changes everything.” That’s how Apple introduced the original iPhone in 2007. But it could just as easily apply here and now to the blockchain and its potential to enable transformative innovation in a variety of industries. The most mature proposals for blockchain-led innovation are in the banking and financial services sector and cyber security, with viable solutions also emerging in supply chain management, insurance, and healthcare. One sector that’s been less discussed is real estate. It’s an industry that can be opaque and committed to self-preservation rather than consumers’ best interests. More than just enhancing or streamlining established processes, blockchain will — if supported by legislativ... Read More
View Post

Holiday Gift Ideas For The Techie In Your Life

In Video by CBS New YorkLeave a Comment

Tech News Keywords: , , , , , ,

Published on Nov 18, 2017Whether you're buying for a tech lover or feel like treating yourself, CNET Editor-In-Chief Lindsey Turrentine has a few ideas. Category License Standard YouTube License Detected Closed Captioning: MONDAY 43 BREEZY. TUE... Read More
View Post

The Pentagon Left Data Exposed in the Cloud

In Business, Emerging Technology, Events, Government, Healthcare, Legal, Mobile Technology, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Well, it’s been a wild and wooly week for security, especially for Face ID, which a group of hackers at a Vietnamese security firm convincingly claim to have broken just a week after the iPhone X release. They’re joined by a 10-year-old boy, who managed to break into his mother’s iPhone X thanks to a little trick known as genetics. Amazon Key also turns out to be less secure than advertised; r... Read More
View Post

Pentagon contractor leaves social media spy archive wide open on Amazon

In Business, Events, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , ,

WikipediaA Pentagon contractor left a vast archive of social-media posts on a publicly accessible Amazon account in what appears to be a military-sponsored intelligence-gathering operation that targeted people in the US and other parts of the world. The three cloud-based storage buckets contained at least 1.8 billion scraped online posts spanning eight years, researchers from security firm UpGuard's Cyber Risk Team said in a blog post published Friday. The cache included many posts that appeared to be benign, and in many cases those involved from people in the US, a finding that raises privacy and civil-liberties ques... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1spinning machine0.853machine, textile machine, spinning machine
2textile machine0.898
3machine0.898

UK seeks future cyber-security stars

In Education, Government, Security by BBCLeave a Comment

Tech News Keywords: , , , , ,

A £20m initiative to get schoolchildren interested in cyber-security has been launched by the UK government.The Cyber Discovery programme is aimed at 15 to 18-year-olds and involves online and offline challenges themed around battling hackers.It is one of several programmes trying to build interest in security work and help fill a looming skills gap. One industry expert said a broad strategy would be needed to address the widening gap.Hacker clubsThe free Cyber Discovery programme aims to "encourage the best young minds into cyber-security", sai... Read More
View Post

Holiday Shopping Guide

In Video by CBS New YorkLeave a Comment

Tech News Keywords: ,

Detected Closed Captioning: She's Gonna Look Beautiful Now What Kind Of Deal Did You Get On That Oh That This One Was Great This Was Like 195 When We Got It For $70 Mary Ann Kerr Is Not Waiting She's Going For The Sales Right Now Using Lots Of Coupons Tonya Lozano Is Planning To Start On Black Friday The day After Thanksgiving Going Out Shopping In The Middle Of The Night Is Fun What Time Do You Go I'm Actually Try To Go Like Midnight Then There's Mia papi My Shopping Strategy Is To Avoid The Stores At All Costs To Do Everything online And To Let The Internet Technology Kind Of Lead Me To Where The Best Sales Are Shopping Expert Trey bodge Says That's The Way To Go Use Deal Websites And Apps Where Ads From All Sorts Of Store... Read More
View Post

Where does cyber fit in the Air Force’s multi-domain command and control concept?

In Business, Security by Fifth DomainLeave a Comment

Tech News Keywords: , ,

The Air Force is finalizing its study on multi-domain command and control, a top priority for the service’s chief of staff. This concept seeks to orchestrate effects across space, cyber and air seamlessly, and potentially simultaneously, as a way to overwhelm adversaries. However, cyber effects and forces are controlled and governed differently than other traditional capabilities. This can lead to questions about how cyber fits into the Air Force’s overall plans. ... Read More
View Post

Man gets threats—not bug bounty—after finding DJI customer data in public view

In Business, Emerging Technology, Events, Gaming, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge / A security researcher says he was trying to play fair with DJI's bug bounty program. DJI calls him a hacker who exposed customer data.DJI, the Chinese company that manufactures the popular Phantom brand of consumer quadcopter drones, was informed in September that developers had left the private keys for both the "wildcard" certificate for all the company's Web domains and the keys to cloud storage accounts on Amazon Web Services exposed publicly in code posted to GitHub. Using the data, researcher Kevin Finisterre was able to access flight log data and ... Read More
View Post

Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities

In Business, Government, Legal, Security by National Public RadioLeave a Comment

Tech News Keywords: , , , , , , , ,

Enlarge this image A laptop in the Netherlands was one of hundreds of thousands infected by ransomware in May. The malware reportedly originated with the NSA. Rob Engelaar/AFP/Getty Images hide caption ... Read More
View Post

Congress to investigate alleged retaliation against HHS cyber whistleblowers

In Business, Government, Healthcare, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

Members of the House Committee on Energy and Commerce are looking into whether the Department of Health and Human services retaliated against two cybersecurity employees who made protected communications to the committee by detailing them to unclassified duties, according to a letter sent to the acting HHS secretary by committee leadership. “The committee is examining whether the Department of Health and Human Services retaliated against two key cybersecurity officials for communicating with this committee as well as whether rec... Read More
View Post

LG’s excellent OLED TVs are getting steep discounts for Black Friday

In Business, Security by The VergeLeave a Comment

Tech News Keywords:

LG’s OLED TVs are widely considered to be among the best-looking TV sets out there — if not the outright best. But the problem is, they’re all very, very expensive. At least, they usually are: next week, as part of an extended Black Friday sale, LG is dropping the price on nearly all of its 2017 OLED TVs. These TVs won’t exactly be cheap, but they’ll be at their most affordable pricing ever and include some solid deals for anyone looking to get the best picture quality possible. Every one of the sets supports 4K and Dolby Vision HDR, and they all use the same OLED panel. The diff... Read More
View Post
Number of Items Identified: 17
Item #Item NameScoreItem Classification
1video display0.606electronic device, video display
2electronic device0.611
3pink color0.867
4coal black color0.602

New “Quad9” DNS service blocks malicious domains for everyone

In Business, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , ,

Enlarge / All you really have to do is set your DNS to 9.9.9.9.GCA/ Quad9 The Global Cyber Alliance (GCA)—an organization founded by law enforcement and research organizations to help reduce cyber-crime—has partnered with IBM and Packet Clearing House to launch a free public Domain Name Service system. That system... Read More
View Post

Ex-Homeland Security Secretary Tom Ridge hospitalized

In Education, Government, Healthcare, Security by Military TimesLeave a Comment

Tech News Keywords: , , , , , ,

AUSTIN, Texas — Former U.S. Homeland Security Secretary Tom Ridge was in critical condition Thursday after undergoing an emergency heart procedure at a hospital in Austin. A Ridge spokesman said the 72-year-old Ridge, Pennsylvania’s Republican governor from 1995 to 2001, was attending the Republican Governors Association conference when he called for help at his hotel at about 7 a.m. The spokesman, Steve Aaron, said Ridge underwe... Read More
View Post

Senator urges ad blocking by feds as possible remedy to malvertising scourge

In Business, Events, Finance, Government, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , ,

Enlarge / It's a federal style.Ron Cogswell A US Senator trying to eradicate the Internet scourge known as malvertising is proposing that all federal agencies block ads delivered to worker computers unless advertisers can ensure their networks are free of content that contains malicious code. In a ... Read More
View Post

Major federal IT modernization bill reaches final stretch

In Business, Government, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , ,

The Modernizing Government Technology Act is now only one step away from becoming law, as the bill was recently included in the House and Senate conference report of the National Defense Authorization Act sent to the president Nov. 16. “Our federal agencies will finally have the motivation to catch up with the 21st century and embrace emerging technologies so that we can leave behind these antiquated legacy IT systems that have plagued our government for decades,” said the bill’s author, Rep. Will Hurd, R-Texas. “Instead, ... Read More
View Post

US-coalition partners work out cyber defense for joint operations

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

The U.S. and coalition partners demonstrated cyber defense concepts during a recent multi-national experiment. Many U.S. officials note they will never fight alone, necessitating the importance of developing templates for coalition operations as coalition cyber operations are still in their infancy. Bold Quest 17.2 – which was hosted this year at a Joint Staff facility in Virginia and seeks to improve interoperability and information sharing – was just the second year that involved a cyber thread during the annual event, now i... Read More
View Post

The Best Black Friday and Cyber Monday 2017 Gaming Deals

In Business, Education, Gaming, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

We’ve already published our favorite Black Friday deals for 2017, but we’re making some topic-specific guides to help you navigate the immense number of deals going on over Black Friday and Cyber Monday. There are a lot of excellent gaming deals going on, and we’ve gathered some of the best right here, all available online so you don’t have to traipse around in the cold on Thanksgiving weekend to get them. Gaming Hardware Deals PS4 and Xbox One Controllers - $40 ($20 off) Date: Available Now, Bigger sale Nov. 23-24 Buy PS4 Controllers on ... Read More
View Post

Access Denied: What you need to know to protect the network [Commentary]

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

The story below is true in essence, if not in particulars, and it is one that has played out many times across all sectors. The IT security head of a major federal agency — we’ll call him Sam — comes to work one morning. He meets Susan from cryptography, who mentions that one of their IT admins, Larry, has been working since 5 a.m. Sam finds this strange because Larry is a night owl. Susan tells him that Larry requested access to the agency’s primary database for maintenance purposes. Though his credentials and keys were o... Read More
View Post

CYBERCOM working through intel side of cyber defense

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

Defensive cyber intelligence is beginning to mature and take shape within Cyber Command and their subordinate defensive units and maneuver forces. “On the defensive side, [intelligence] was a little bit harder stretch,” Rear Adm. Kathleen Creighton, deputy commander of Joint Force Headquarters-DoD Information Networks, Cyber Command’s operational defensive arm charged with defending the global network, said. “[Defense has] been a little bit slower to mature.” ... Read More
View Post

How many Russian trolls does it take to influence Brexit vote?

In Business, Government, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

The claims around alleged Russian meddling in British politics has been stirred by allegations that fake Twitter accounts attempted to influence the Brexit vote. But while the mere suggestion was enough to make mainstream headlines, little was said about the “infinitesimal” quantity of tweets involved.RT LIVE http://rt.com/on-airSubscribe to RT! ... Read More
View Post

Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them

In Business, Events, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

EnlargeMikhail Deynekin For almost two months in 2014, servers belonging to Moscow-based Kaspersky Lab received confidential National Security Agency materials from a poorly secured computer located in the United States that stored the files, most likely in violation of US laws, company officials said. The classified source code, documents, and executable binaries were stored on a computer that used an IP ... Read More
View Post

Cyber-bullying: Prince’s ‘stop, speak, support’ code of conduct

In Business, Government, Mobile Technology, Security by BBCLeave a Comment

Tech News Keywords: , , , , ,

Facebook and Snapchat are trialling a new, more direct way to help young people bullied online, following an intervention by Prince William.The social media platforms will put those in need of emotional support in touch with a counsellor from Childline.The prince, together with tech firms, children's charities and parents, is also introducing the equivalent of a Green Cross Code for the internet.It tells young people to "stop, speak, support" when online.The aim is to encourage them to stop negative behaviour, tell a responsible adult and support victims of bullying.Other firms... Read More
View Post

The Vulnerabilities Equities Process Still Has Issues Even After Added Transparency

In Business, Government, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Governments rely on flaws in software, hardware, and encryption protocols for espionage and assorted intelligence gathering. And what makes that cyber-sneaking are technical flaws that governments find and keep to themselves. But in the United States, the practice of withholding vulnerabilities such that they can’t be fixed has drawn increasing controversy—especially because of real-world situations where secret government hacking tools have leaked and spread to devastating effect. In an attempt to clarify and codify the government's approach to dealing with this problem, the White house released ... Read More
View Post

Three questions with C4ISRNET’s new editor, Mike Gruss

In Business, Events, Government, Security, Start Up by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

C4ISRNET, the leading media brand dedicated to the defense networks, communications and ISR sector, has a new editor. Mike Gruss will lead the editorial team and digital, video and print content strategy for C4ISRNET. He joins C4ISRNET parent company Sightline Media from FedTech, a custom magazine and digital brand covering the use of IT in defense and government. He previously served as senior staff writer for Space News, “We are ... Read More
View Post

Signs of Russian Meddling in ‘Brexit’ Referendum

In Business, Education, Emerging Technology, Government, Healthcare, Legal, Security by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

On Tuesday, the chief of the National Cyber Security Center released a summary of a prepared speech asserting that in the past 12 months, Russian hackers had unleashed cyberattacks on the British energy grid and the telecommunications and media industries.Taken together, the flurry of reports and accusations adds to growing pressure on Twitter, Facebook and other social media companies to disclose more of their internal record... Read More
View Post

White House calls for greater transparency in cyber Vulnerability Equities Process

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

WASHINGTON ― The White House is planning to better disclose the decision making process of whether or not to publicly reveal the federal government’s digital vulnerabilities. “Obtaining and maintaining the necessary cyber capabilities to protect the nation creates a tension between the government’s need to sustain the means to pursue rogue actors in cyberspace and its obligation to share its knowledge of flaws in software and hardware with responsible parties who can ensure digital infrastructure is upgraded,” White Hous... Read More
View Post

Bill establishing State Department cyber ambassador passes committee

In Government, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

The Cyber Diplomacy Act, which would create an Office of Cyber Issues within the State Department, passed through the House Foreign Affairs Committee Nov. 15. Under the bill, the head of the office would have the rank and status of an ambassador and be responsible for leading the State Department’s diplomatic cyberspace efforts by promoting “an open, interoperable, reliable, unfettered and secure information and communications technology infrastructure globally.” “The US is increasingly under attack by foreign actors, and ... Read More
View Post
Number of Items Identified: 14
Item #Item NameScoreItem Classification
1missile0.837vehicle, rocket, missile
2rocket0.899
3vehicle0.899
4ultramarine color0.728

Pentagon eyes intimate R&D tie-up with UAE based on US-Israel model

In Business, Emerging Technology, Events, Government, Legal, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

DUBAI, United Arab Emirates — U.S. and Emirati defense officials will meet next month in Abu Dhabi to continue discussions on technology security protocols that aim to elevate the level at which Washington can share and ultimately co-develop sensitive technologies with one of its most prized strategic partners in the region. In interviews here at the Dubai Airshow, U.S. executives supportive of more intimate ties with their Emirati partners cited UAVs, sophisticated munitions and innovative means of coastal defense as examples o... Read More
View Post

Repurposing of cybertools emerging threat vector

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

One of the emerging cyber threat trends being observed by U.S. intelligence agencies is that of repurposing and weaponizing existing capabilities. While one actor might use a particular exploit or strain of malware against a target, “another adversary might see that, grab hold of that and say I want to use that for my purposes and I want to combine it with these other techniques or malwares or exploits and really repurpose, combine and use it in ways that the originator of that exploit never intended it to be used,” Jonathan D... Read More
View Post

Announcing the 2017 CA Technologies Partner of the Year Awards

In Business, Security by CA TechnologiesLeave a Comment

Tech News Keywords: , , ,

Each year at CA World, we celebrate the success of our partner ecosystem with the CA Technologies Partner Awards. The Partner Awards are designed to recognize the outstanding contributions and incredible work performed by our Global Consulting and Regional Partners and their dedication to customer success. The 2017 CA Partner Awards encompass the following categories Global Consulting Partner (GSI/GSP) Awards Award Name Partner Company Name ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1deli0.636building, retail store, shop, deli
2shop0.803
3retail store0.824
4building0.876

Walmart is raising prices online to increase in-store traffic

In Business, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

Walmart is taking a bit of an nontraditional approach to boost sales ahead of Black Friday and Cyber Monday shopping events by raising prices for products sold online and discounting those same items in physical retail stores. According to The Wall Street Journal, the big-box store has quietly raised prices for household and food items such as toothbrushes, macaroni and cheese, and dog food on its website while the prices in stores remained the same. If there are price discrepancies between online and in-store purchases, Walmart will now highlight this on the product’s web listing to encoura... Read More
View Post

Rajoy: Spain can handle any cyber-meddling in Catalonia

In Government by Fifth DomainLeave a Comment

Tech News Keywords: , ,

MADRID (AP) — Spanish Prime Minister Mariano Rajoy says he is confident his government can handle any possible foreign tampering of upcoming elections in Catalonia amid a secession bid by the prosperous region. On Monday, Spain’s Defense Minister Maria Dolores de Cospedal said in recent months, “many actions” to mount a misinformation campaign to destabilize Catalonia had “come from Russian territory.” She said that Spain had no indication that Russia’s government was involved. ... Read More
View Post

Rajoy: Spain can handle any cyber-meddling in Catalonia

In Government by Fifth DomainLeave a Comment

Tech News Keywords: , ,

MADRID (AP) — Spanish Prime Minister Mariano Rajoy says he is confident his government can handle any possible foreign tampering of upcoming elections in Catalonia amid a secession bid by the prosperous region. On Monday, Spain’s Defense Minister Maria Dolores de Cospedal said in recent months, “many actions” to mount a misinformation campaign to destabilize Catalonia had “come from Russian territory.” She said that Spain had no indication that Russia’s government was involved. ... Read More
View Post

Britain cyber chief says Russian hackers are targeting critical infrastructure

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

LONDON (AP) — Britain’s cybersecurity chief says Russian hackers are targeting the country’s telecommunications systems, media and energy networks. Ciaran Martin’s stark warning comes after Prime Minister Theresa May on Monday said Russia was “weaponizing information” and meddling in elections to undermine the international order. Martin, in prepared remarks released before a speech on Wednesday, says “Russian interfere... Read More
View Post

Britain cyber chief says Russian hackers are targeting critical infrastructure

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

LONDON (AP) — Britain’s cybersecurity chief says Russian hackers are targeting the country’s telecommunications systems, media and energy networks. Ciaran Martin’s stark warning comes after Prime Minister Theresa May on Monday said Russia was “weaponizing information” and meddling in elections to undermine the international order. Martin, in prepared remarks released before a speech on Wednesday, says “Russian interfere... Read More
View Post

US official: 15 percent of agencies used Kaspersky software

In Education, Government, Legal, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON (AP) — Computer systems at 15 percent of U.S. government agencies were running Kaspersky Lab software that’s been banned because of concerns about the company’s ties to the Kremlin and Russian spy operations, a top Homeland Security Department official told Congress on Tuesday. In July, the General Services Administration removed Kaspersky from its list of approved federal vendors. In September, the Homeland Security Department directed all U.S. federal agencies and departments to stop using products or services s... Read More
View Post

‘No conclusive evidence’ of Kaspersky cyber-spying – US officials

In Business, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , ,

After months of investigation, no conclusive evidence has been found to support claims the anti-virus developer Kaspersky Lab has been involved in cyber-spying.RT LIVE http://rt.com/on-airSubscribe to RT! http://www.youtube.com/subscription_c...Like us on Facebook ... Read More
View Post

U.S. government shares North Korean hacking campaign details

In Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , ,

(Reuters) — The U.S. government on Tuesday issued a technical alert about cyber attacks it said are sponsored by the North Korean government that have targeted the aerospace, telecommunications and financial industries since 2016. The alert, from the FBI and Department of Homeland Security, said North Korean hackers were using a type of malware known as “FALLCHILL” to gain entry to computer systems and compromise network systems. The FBI and DHS had issued a warning in June that squarely blamed the North Korean government for a raft of cyber attacks stretching back to 2009 targeting... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1person0.669

Face ID iPhone X ‘hack’ demoed live with mask by Bkav

In Business, Mobile Technology, Security by BBCLeave a Comment

Tech News Keywords: , , ,

A Vietnamese cyber-security firm has shown the BBC how a mask can be used to unlock Apple's new iPhone X.The demo took place about a week after Bkav first claimed to have undermined the handset's security.But other experts have cast doubt on what the "hack" amounts to.Apple has not commented beyond referring the pubic to documents it had already published about its security system.... Read More
View Post

The Best Black Friday 2017 Deals You Can Buy At Home

In Business, Gaming, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Black Friday, Black November, Pre-Black Friday, Cyber Monday… The buzzwords for November’s big holiday sales are as plentiful as stuffing on Thanksgiving. And we’d like you to enjoy that Thanksgiving dinner. Instead of getting shoved around at your local big box store just to save $20, hop on your PC! We here on WIRED's Gear team have found some of the absolute best tech deals online before, during, and around Black Friday. Black Friday Ads For 2017 Amazon Pre-Black Friday Deals ... Read More
View Post

4 priorities for DoD’s cyber defense arm

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

Joint Force Headquarters-DoD Information Networks, or JFHQ-DoDIN, acts as Cyber Command’s defensive operational arm, providing global defense, command and control and synchronization of the DoDIN. Rear Adm. Kathleen Creighton, JFHQ-DoDIN’s deputy commander, who assumed the position in August, provided some insights into what her organization is working on during a keynote Nov. 14 in Arlington at the Defense Systems Conference. ... Read More
View Post

Is the US military prepared for cyberattacks on satellites?

In Business, Government, Legal, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

Keeping the U.S. defensive resources safe from cyberattacks means protecting systems in the remote locations throughout the world — and off-world. Securing military satellites against cyberattacks has become increasingly important as various ground-based threats raise questions about vulnerabilities in cyber resources on the ground, in the air and in space. The U.S. Army began to revise their security systems after an examination o... Read More
View Post

Medigate Announces $5.35M Seed Round to Protect Connected Medical Devices from Pandemic Cyberattacks Threatening Patient Safety and Privacy

In Business, Events, Gaming, Government, Healthcare, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , ,

Industry’s first dedicated medical device security platform lets healthcare providers identify and secure inherently vulnerable medical devices TEL AVIV–(BUSINESS WIRE)–November 14, 2017– Israeli startup Medigate today announced $5.35 million in seed funding for its mission to secure the use of the millions of connected medical devices on healthcare provider networks. Backing for the technology platform, which lets CISOs and security t... Read More
View Post

How One Woman’s Digital Life Was Weaponized Against Her

In Business, Education, Events, Government, Healthcare, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

The first time the police arrived on her doorstep, in March of 2015, Courtney Allen was elated. She rushed to the door alongside her dogs, a pair of eager Norwegian elkhounds, to greet them. “Is this about our case?” she asked. The police looked at her in confusion. They didn’t know what case she was talking about. Courtney felt her hope give way to a familiar dread. Three days earlier, Courtney and her husband, Steven, had gone to the police headquarters in Kent, Washington, a suburb of Seattle, and reported that, for the past few months, they had been the victims of a campaign of online harassment. They had found a fake Facebook page under Stev... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1touch screen0.761electronic device, video display, touch screen
2video display0.892
3electronic device0.894
4blue color0.853

More countries are using social media to crack down on dissent, study finds

In Business, Government, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

The number of countries promoting disinformation on social media rose to its highest level during the past year, a new study has found. The report, from the pro-democracy think tank Freedom House, found manipulation tactics in elections in at least 18 countries in the last 12 months, including the United States. But while Russia (and America) have used such tactics to promote their own interests abroad, more countries are employing people to shape the opinions of their electorates and crack down on internal dissent, the report found. The findings, which represent the seventh ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1portrait photo0.716person, portrait photo
2person0.825
3coal black color0.837

Brian Buchwal gives his thoughts on Singles’ Day shopping festival

In Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , ,

Detected Closed Captioning: Now For More On The Singles Day Shopping festival I'm Joined By Brian Buckwalds Live From New York He's Co-founder And CEO At Pomona Thank You For Joining Us it's Great To Be Here So Let's Look At Some Of These Numbers 25 Billion Dollars in Sales From Just Alibaba And Then Jvcom Also Saw Sales Up 50% What Does All This Momentum Say About China's potential And Consumption Well Ultimately What It Tells Us About China's Potential And Consumption Is That It Is Certainly The Largest Market In The World And At This Point relatively Limitless A Few Years Ago most Economists Were Looking At China And Forecasting And Consumer Slowdown what We've Seen Is A Continued Momentum Continued Growth In Fact Continu... Read More
View Post

Connected toys have ‘worrying’ security issues

In Education, Emerging Technology, Legal, Security by BBCLeave a Comment

Tech News Keywords: , , , ,

Consumer watchdog Which? has called on retailers to stop selling some popular toys it says have "proven" security issues.Those toys include Furby Connect, the i-Que robot, Cloudpets and Toy-fi Teddy.Which? found that there was no authentication required between the toys and the devices they could link with via Bluetooth.Two of the manufacturers said they took security very seriously.Sloppy securityThe lack of authentication meant that, in theory, any device within physical range could link to the toy and take control or send messages, the watchdo... Read More
View Post

How the West should prepare for a post-Putin Russia [Commentary]

In Business, Education, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the days of the Cold War, many subscribed to the view of the American spy hunter James Angleton that “deception is a state of mind ― and the mind of the state.” What would have come as a surprise to them is that three decades after the end of the Cold War, deception has become the state of the world. If a Martian were to be sent to Earth with a secret mission to figure out trends in international politics on our planet, he would certainly be puzzled by the outsized role that President Vladimir Putin’s Russia plays in th... Read More
View Post
Number of Items Identified: 14
Item #Item NameScoreItem Classification
1sage green color0.887

Weaponizing 3-D printers: Cyberattacks could turn battlefield tech into threats

In Business, Education, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

Realtime 3-D printing has moved beyond trendy trinkets and has moved into businesses, homes and even the battlefield. Now that military branches have created and tested 3-D printed weapons, Navy submarine-like vessels and even MREs, the conversation around additive manufacturing in the military has turned to securing those assets from cyberattacks. For years, the biggest challenge within 3-D printing for the military was getting the technology to work in remote locations. Today, 3-D printing can be used to replace parts, create we... Read More
View Post

Hackers say they broke Apple’s Face ID. Here’s why we’re not convinced

In Business, Government, Mobile Technology, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , ,

EnlargeBkav Security researchers say they used a $150 mask to break the Face ID facial recognition that locks Apple's new iPhone X. The work may be a significant, it may be little more than a stunt with few real-world consequences, or it could possibly be something in the middle. So far, it's impossible to know because the researchers have evaded key questions about how they went about breaking i... Read More
View Post

Cyberwar’s battlefield: The commercial sector [Commentary]

In Business, Finance, Government, Healthcare, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

Cyberwar is an unprecedented threat to our national security, our economic security our personal lives, fortunes and sacred democracy. How did it come to be this way? We developed open systems and networks including the internet with the idea that a benign world would use it for their betterment, but as with all technology advances we found that the technology that makes lives easier, more efficient, and better can be turned against us. Today, much as the arena of cyberspace has morphed into this same Heaven-Hell configuration. Th... Read More
View Post

eBay is price-matching early Black Friday deals

In Business, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

eBay is trying to one-up other major retailers in an attempt to win over consumers on Black Friday by offering to price-match competitors’ deals that have already been announced ahead of the shopping event. From November 13th to the 17th, eBay will match prices on select deals from Walmart, Kohl’s, Macy’s, and JCPenney. Then, from Black Friday through Cyber Monday, eBay will continue to match prices on deals from Amazon, Best Buy, Walmart, and others. We’ve found the best tech deals th... Read More
View Post

To better fight crime and terror in the digital era, the FBI seeks top STEM graduates

In Education, Government, Legal, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

WASHINGTON ― The field of opportunity for science, technology, engineering and mathematics (STEM) graduates continues to grow thanks to the FBI’s increased recruitment efforts. Special Agent Avatar Lefevre runs a cyber-skills recruitment unit within the FBI’s Human Resources Division. For him, the digital landscape will be the setting for future bouts with terrorism, espionage and crime, thus necessitating... Read More
View Post

Spain warns EU about cyber-meddling suspicions in Catalonia

In Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

BRUSSELS (AP) — Spain on Monday warned its European Union partners about a disinformation campaign aimed at destabilizing its volatile northeast region of Catalonia, which Madrid claims appears to be coming from Russia. Spanish Defense Minister Maria Dolores de Cospedal told reporters that “many of the actions come from Russian territory,” but that it’s not yet possible to determine what their exact source is or if the Russian government is involved. ... Read More
View Post

Cybercrimes present unique challenges for investigators

In Business, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

ATLANTA (AP) — The federal investigators looking into the breach that exposed personal information maintained by the Equifax credit report company are used to dealing with high-profile hacks and the challenges they present. The U.S. attorney’s office and FBI in Atlanta have prosecuted developers and promoters of the SpyEye and Citadel malware toolkits, used to infect computers and steal banking information. They’ve helped prosecute a hack into Scottrade and ETrade that was part of an identity theft scheme, and aided the inte... Read More
View Post

Microsoft looks to solve IT workforce vacancies through veterans program

In Business, Education, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Microsoft’s Software and Systems Academy is making sure that veterans land on their feet after leaving military service by training exiting service members in IT. According to the veterans that have gone through the program, the mentorship it provides gives them an advantage in finding successful civilian jobs. “They help you better convey your experience in the military,” said Solaire Sanderson, former Marine and MSSA graduate, currently working as a security analyst in Microsoft’s Cyber Defense Operations Center. “A lo... Read More
View Post

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

In Business, Emerging Technology, Energy, Events, Gaming, Government, Healthcare, Legal, Mobile Technology, Security by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

With a leak of intelligence methods like the N.S.A. tools, Mr. Panetta said, “Every time it happens, you essentially have to start over.”Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack, with Russia as the most likely perpetrator, an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. And there is broad agreement that the damage from the Shadow Broke... Read More
View Post

Building security and privacy protection into a BYOD environment

In Business, Events, Government, Legal, Science & Nature, Security by The StackLeave a Comment

Tech News Keywords: , , , , , ,

Daniele Màtyàs Tieghi, CTO and product manager at Mon-K Data Protection, discusses why businesses would be advised to reassess their data protection investments Over the last five years, companies have had to face increasing costs of cyberattacks and data breaches. In 2015, the cost of cyber attacks globally was $480 million (approx. £361 million). In 2016, this figure rose to $3.1 billion and the dramatic trend is far from slowing – some forecasts even citing $2.1 trillion by 2019. In response, companies are beginning to worry and governments are starting to focus on data protection and cybersecurity in new legislation. Since 2015, there has been an exponential growth in cyberattacks. As seen... Read More
View Post

How to shop for a new computer

In Business, Video by USA TodayLeave a Comment

Tech News Keywords: , , , , ,

Published on Nov 13, 2017The choices can be overwhelming: PC vs laptop? Chromebook or Apple? Columnist Marc Saltzman guides shoppers through the computer-buying process. Category License Standard YouTube License Detected Closed Captioning: Buy... Read More
View Post

The Tech Industry’s Gender-Discrimination Problem

In Business, Education, Emerging Technology, Finance, Government, Legal, Science & Nature, Security, Start Up by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

One day in 2013, AJ Vandermeyden drove to Tesla’s corporate headquarters, in Palo Alto, California, sat down on a bench outside the main entrance, and waited, in the hope of spotting someone who looked like a company employee. Vandermeyden, who was thirty years old, had been working as a pharmaceutical sales representative since shortly after college, but she wanted a different kind of job, in what seemed to her the center of the world—Silicon Valley. She knew that Tesla’s ambitious, eccentric co-founder Elon Musk was managing companies devoted to space flight and solar energy, in addition to running Tesla, which was producing electric cars, and she was inspired by his mission. Tesla... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1Treasury0.638person, Treasury
2person0.724
3reddish brown color0.723
4claret red color0.62
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender CertaintyIdent NameIdent ClassificationIdent Score
1650.670626MALE0.99593John McCainpeople, conservatives, republicans0.880797

This week in Congress: More and more defense nominations

In Business, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — Senate Armed Services Committee officials continue their confirmation blitz this week with five more nominees under consideration this week. Last week, the committee hosted eight administration nominees for defense posts, and will by the end of the week will have considered 17 new names in November. Members had only considered 12 others since the start of the summer. But, since Defense Secretary James Mattis met with c... Read More
View Post

China’s version of Black Friday set a record

In Business, Science & Nature, Video by NewsyLeave a Comment

Tech News Keywords: , ,

Nov. 11 started out in China as a day to celebrate being single, but now it's become the biggest shopping holiday on the planet.Learn more about this story at www.newsy.com/73482/Find more videos like this at www.newsy.comFollow Newsy on Facebook: www.facebook.com/newsyvideosFollow Newsy on Twitter: www.twitter.com/newsyvideosDetected Closed Captioning: I Thought Black Friday Was The Shopping holiday Of The Year China Has Its Own version In Sales Dwarfed Black Fridays And Cyber Mondays Combined It's Officially Called The 11:11 Global Shopping Festival But It's Also Known As Singles Day Because In China November 11th Has Informally Become A Day When Bachelors Cel... Read More
View Post

Robocops can’t tackle online crime without human assistance

In Business, Government, Healthcare, Legal, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Cybercrime is on the rise and organizations across a wide variety of industries — from financial institutions to insurance, to healthcare providers, and large e-retailers — are rightfully worried.  In the first half of 2017 alone, over 2 billion records were compromised.  After stealing PII (personally identifiable information) from these hacks, fraudsters can gain access to customer accounts, create synthetic identities, and even craft phony business profiles to commit variou... Read More
View Post

Why cybersecurity workers are some of the hardest to retain

In Business, Government, Healthcare, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Cybersecurity workers are in high demand, and the security industry may face a shortage of close to two million qualified personnel by 2022. That’s concerning giving the increasing number of cyber attacks we’re witnessing. But what’s more concerning is that, according to recent research I conducted, the problem is not only attracting talent to cybersecurity, it’s retaining that talent. A large number of people are leaving the industry and not returning to it due to a lack of direction, burnout, and a toxic culture that can include discrimination or harassment. While building the pipeline ... Read More
View Post

Alibaba’s Singles’ Day sale amassed $25.3 billion, doubling 2016 Black Friday and Cyber Monday sales combined

In Business, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

A decade ago, November 11th was a tongue-in-cheek cultural “celebration” of single people in China. In 2009, retailer Alibaba turned the day into the country’s version of Black Friday — and eight years later, sales from the Chinese e-commerce event has nearly doubled those from Black Friday and Cyber Monday in the US combined. Alibaba reported that sales from Singles’ Day amounted to $25.3 billion, a 40 percent jump from last year’s figures. Additionally, the retailer hit a record $18 billion in just 13 hours, eclipsing last year’s record of $17.8 billion in 24 hours. Market research experts say the massive growth is attributed to ... Read More
View Post

$280M Worth of Ethereum Is Trapped for a Pretty Dumb Reason

In Business, Events, Government, Legal, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

On Monday, a small configuration mistake at an internet service provider and infrastructure company caused internet outages around the United States for a few hours, reverberating across other ISPs' networks as well. Cool way to start the week. From there, research indicated this week that the Kremlin-linked hacking group APT28 (also known as Fancy Bear) has been exploiting a newly exposed vulnerability in Microsoft Office to do topical phishing attacks referencing th... Read More
View Post

The Voice of the Industry: The wider implication of data breaches

In Business, Education, Events, Finance, Government, Legal, Science & Nature, Security by The StackLeave a Comment

Tech News Keywords: , , , , , , , , ,

If you follow technology news, it’s hard to go a day without hearing about a company or organisation having its systems breached and personal data being leaked to nefarious characters. Two recent leaks, though, have been particularly galling. The hack of Equifax’s database is significant for a number of reasons, but perhaps primarily because the company’s database holds incredibly sensitive data on a majority of the American population. News has also broken more recently that the initial estimate given by Equifax on the hack’s impact in the UK was low. UK me... Read More
View Post

Department of Defense’s ‘Hack the Pentagon’ Bug Bounty Program Helps Fix Thousands of Bugs

In Business, Government, Legal, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

The United States government doesn't get along with hackers. That's just how it is. Hacking protected systems, even to reveal their weaknesses, is illegal under the Computer Fraud and Abuse Act, and the Department of Justice has repeatedly made it clear that it will enforce the law. In the last 18 months, though, a new Department of Defense project called "Hack the Pentagon" has offered real glimmers of hope that these prejudices could change. The government's lo... Read More
View Post

Woman Takes On Cyberbully

In Video by CBS New YorkLeave a Comment

Tech News Keywords: , , , , ,

Detected Closed Captioning: I'M MAURICE DuBOIS. A CYBER BULLY IS IN JAIL. CBS 2'S CAROLYN GUSOFF REPORTS. IT WAS HORRIFIC. IT'S STARTED OUT WITH NASTY INSULTS. Reporter: LISA KUCHAR RECALLS THE VIAL ATTACKS THAT STARTED ON SOCIAL MEDIA. SOMEONE WAS IMPERSONATING HER WRITING THE MOST CRUDE AND HURTFUL POSTS. AROUND THE CLOCK BARRAGE FROM FOUR DOZEN ACCOUNTS SET UP TO MOCK AND TAUNT HER. SHE NOT ONLY PUBLISHED MY ADDRESS, BUT SHE TOLD PEOPLE TO GO THERE. SHE SAID I WAS A PROSTITUTE. Reporter: EVENTUALLY THERE WAS PHYSICAL STALKING AND THREATENING VOICE MESSAGES. [ VOICE MESSAGE WITH CURSING ] DON'T THINK I DON'T KNOW YOU'RE SLEEPING WITH MY BOYFRIEND. I WAS DEVASTATED. SHE NOT ONLY THREATENED TO CONTACT MY EMPLOYERS, MY FRIENDS... Read More
View Post

Black Friday 2017: the best deals in one place

In Business, Security by The VergeLeave a Comment

Tech News Keywords: , ,

If you're looking for a great deal on TVs, phones, consoles, or really any gadget or gizmo, Black Friday and Cyber Monday are some of the best shopping days of the year when it comes to new tech. We're sorting through all of this year's discounts from Amazon, Best Buy, Walmart, Target, and basically every other store you can think of to find the best of the best and will be updating this stream as new deals come in. Check back here for the latest. ... Read More
View Post

WikiLeaks: CIA wrote code ‘to impersonate’ Russia’s Kaspersky Lab anti-virus company

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

WikiLeaks claims the CIA's created a computer programme that impersonates the software of the Russian anti-virus company, Kaspersky Lab. READ MORE: https://on.rt.com/8rvkRT LIVE http://rt.com/on-airSubscribe to RT! ... Read More
View Post

North Korea’s digital divide: Online elites, isolated masses

In Business, Education, Government, Healthcare, Mobile Technology, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

PYONGYANG, North Korea (AP) — Ever so cautiously, North Korea is going online. Doctors can consult via live, online video conferencing, and lectures at prestigious Kim Il Sung University are streamed to faraway factories and agricultural communes. People use online dictionaries and text each other on their smart phones. In the wallets of the privileged are “Jonsong” or “Narae” cards for e-shopping and online banking. Cash registers at major department stores are plugged into the web. ... Read More
View Post

Does organizing cyberspace actually ratchet up potential for conflict?

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

Some in the academic world think so. “I think the elevation of Cyber Command and I think the creation of Cyber Command has expedited the security dilemma,” Aaron Brantly, assistant professor of political science at Virginia Tech, said during a panel at the CyCon U.S. conference in Washington Nov. 8. “I think that that has spurred a process by which multiple other states around the world are in the process of developing their own cyber commands. These people are sitting in buildings and they have to do something so they’re ... Read More
View Post

High profile breaches, Jurassic Park and Chinese takeout [Commentary]

In Business, Events, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

In recent weeks and months, we’ve seen a slew of high profile breaches gain media and consumer attention. The SEC, Deloitte, Equifax and Bupa stories are just a few of these examples. For most people, two of the biggest questions that come to mind are: “How did this happen?” and “How am I affected?” To think about this, let’s shift the focus to user intent, and ask “Why?” We often hear that a vulnerability was left unpatched, or an inadvertent mistake led to the leak of confidential information. For those outside o... Read More
View Post

How Journalists Fought Back Against Crippling Email and Subscription Bombs

In Business, Events, Government, Legal, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

It was 10 am on a hot, humid Tuesday in August when I decided I could finally relax. After a frantic weekend of finishing a big story—and typing so much that my forearms tingled—I needed to decompress. I placed my phone on do not disturb, turned on my air conditioner, and blissfully spent an hour contorting myself into various poses on the yoga mat next to my bed. Precisely at 11 am, my yoga routine finished, I turned my phone back on to see a text message from my colleague Lauren Kirchner: “I am under some kind of email attack.” I was chagrined but not surprised. Lauren had been harassed all weekend, a result of an article we had coaut... Read More
View Post

DHS chief nominee says cyber a top priority

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

WASHINGTON (AP) — President Donald Trump’s choice to lead the Department of Homeland Security says cybersecurity will be one of her top priorities. Kirstjen Nielsen, a former staffer at the sprawling federal agency, says the scope and pace of cyberattacks on federal networks and critical infrastructure are “continually increasing” and grow more complex and sophisticated each day. Nielsen, 45, now serves as deputy White House ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1azure color0.927
2blue color0.913

Maximizing SIEM with data analytics [Commentary]

In Finance, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

Recent cybersecurity breaches have impacted a range of sectors, from finance to professional services to the public sector, proving that early detection of cybersecurity threats and reducing overall risk are not simple tasks. As the data center continues to become software defined and workloads continue to flow across hybrid environments to take advantage of the lowest cost infrastructure, it becomes increasingly difficult to manage risks. From compliance to cybersecurity, agencies are leveraging Security Information Event Management (SIEM) software to avoid cyber breaches. ... Read More
View Post

How the Air Force is doing rapid cyber acquisition for offense, defense

In Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

While many complain about how the slow pace of the current acquisition system cannot keep up with the speed of cyber, the Air Force has been instituting a model for cyber capability development that has engendered capabilities in a fraction of the current process. What makes the Air Force approach different than all the other services? The funding pot they use for this rapid cyber capability development. A new paper published by Rebecca Lively, an attorney with 24th Air Force/Air Force Cyber, outlines how the Air Force uses operat... Read More
View Post

Kelly’s ex-deputy readies for own DHS confirmation hearing

In Business, Education, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON (AP) — Kirstjen Nielsen helped shepherd President Donald Trump’s Department of Homeland Security secretary pick through his Senate confirmation process. Now she’s got her own team guiding her through those same hoops. Trump surprised many in his administration when he announced his decision to nominate Nielsen to run the sprawling agency, which has been leading the charge on implementing Trump’s aggressive immigration agenda. Nielsen had served as former DHS Secretary John Kelly’s top deputy early in the ... Read More
View Post

US-China Comprehensive Dialogue and its four pillars

In Business, Legal, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , ,

The United States-China Comprehensive Dialogue will be overseen by the two presidents and have four pillars: Diplomatic and Security Dialogue; Comprehensive Economic Dialogue; Law Enforcement and Cybersecurity Dialogue; and Social and Cultural Issues Dialogue.Watch CGTN LIVE on your computer, tablet or mobilehttp://america.cgtn.com/livenewsSubscribe to CGTN America on YouTubeFollow CGTN America:Twitter: @cgtnamericaFaceb... Read More
View Post

Army looks to its youngest soldiers, officers to lead in cyber warfare

In Education, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

The fundamental character of war is changing rapidly, and it will be up to the U.S. military’s youngest leaders to figure out how to successfully fight the next wars, the Army’s top officer said. “For those of you in the military who are 25 years old or younger, captains or below, this is going to be a fundamental, significant change that you are going to have to come to grips with, and you are going to have to lead the way,” Army Chief of Staff Gen. Mark Milley said Tuesday at the International Conference on Cyber Conflic... Read More
View Post

Schiff: Impossible to say Russia Tilted Election

In Business, Government, Security, Video by Associated PressLeave a Comment

Tech News Keywords: , , , , ,

The top Democrat on the House intelligence committee says the United States is "marginally better prepared" to prevent Russian interference in U.S. elections. But, Rep. Adam Schiff cautions that "the Russians are a very capable cyber-adversary." (Nov. 7)Subscribe for more Breaking News: http://smarturl.it/AssociatedPressGet updates and more Breaking News here: ... Read More
View Post

DoD is outpacing itself on cyber

In Events, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

One of the observations most oft discussed surrounding the cyber domain is how fast it moves. So fast, evidently, that the Defense Department is outpacing itself. “We are outrunning our headlights,” Lt. Gen. Paul Nakasone, commander of Army Cyber Command, said during a keynote presentation at the CyCon U.S. conference in Washington Nov. 7. “We’re learning so much, whether or not it’s with our forces, with our doctrine, with our strategy; we are well forward of where we thought we would ever be.” ... Read More
View Post

Apps to score the best Black Friday, holiday shopping deals

In Video by USA TodayLeave a Comment

Tech News Keywords: , , , , ,

Detected Closed Captioning: It's November Which Means The Start Of The Pre Holiday Shopping Season Where Millions Will Be Looking For Good Deals on Gifts Especially Over Black Friday And Cyber Monday So What Are The Best Apps And Websites To Help Save You Money hey Everyone Marc Saltzman Here For USA Today Surf Report Thanks For Watching In This Week's Written Column I Take A Look At All The Different Ways You Can Score a Great Deal Over Black Friday Whether You're Shopping For A Loved One Or yourself All You Need Is Your Smartphone And A Few Clever Apps To Help You Out In This Video We're Going To Look At Two Of those Apps In Particular One That Focuses More On The Retail Experience and The Other One Is More For Online shop... Read More
View Post

Man charged with hiring hackers to sabotage former employer

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

MINNEAPOLIS (AP) — In the first Minnesota case to address a new and growing form of cybercrime, federal prosecutors have charged a man with paying computer hackers to sabotage websites affiliated with his former employer. The FBI says the case represents a growing form of cybercrime in which professional hackers are paid to inflict damage on individuals, businesses and others who rely on digital devices connected to the web. ... Read More
View Post

Job seekers find lots of opportunities at federal hiring event

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

A recent two-day hiring event held by the Federal Chief Information Officer Council gave cyber and IT talent the opportunity to meet face to face with over 30 federal agencies looking to hire in those fields. According to attendees, that face to face meeting can make all the difference in securing a job at the right agency. “Anyone who has applied for jobs with the federal government knows that it often can be very difficult just to get in front of a hiring manager,” said attendee Jakarra Howard. “Now I have specific names t... Read More
View Post

Tweeter-in-chief ready to confront China’s ‘great firewall’

In Business, Government, Mobile Technology, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , ,

WASHINGTON (AP) — America’s tweeter-in-chief is set to face off bit-to-bit against China’s “great firewall.” President Donald Trump’s arrival in Beijing on Wednesday will serve as a test of reach for his preferred 140-character communications tool. The White House is declining to comment on the president’s ability to tweet in China or the precautions being taken to protect his communications in the heavily monitore... Read More
View Post

An edge for non-state actors: AI

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

While highly advanced and destructive cyberspace capabilities have historically resided strictly with top-level nation states, those days may soon be over. Commercial advancements in artificial intelligence and machine learning could level the playing field and lower the barrier of entry for smaller nation states, as well as non-state actors. During a keynote presentation at the CyCon U.S. conference in Washington, D.C., Nov. 7,... Read More
View Post

DISA’s new acquisition authority could mean a boost to cyber

In Business, Government, Mobile Technology, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

Leaders at the Defense Information Systems Agency hope to use a new acquisition authority to bolster the organization’s cyber efforts. In May DISA was officially granted what’s known as Other Transaction Authority, which allows the agency to operate outside the usual acquisition methods. The process allows for cost-sharing with vendors and aims to shorten the capability-development cycle and accelerate the transition of prototypes to the government. ... Read More
View Post

Avast owners lining up $4 billion London IPO

In Business, Government, Healthcare, Mobile Technology, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

(Reuters) — The owners of Avast Software have hired Rothschild to prepare the business for a share sale which could value one of the world’s most used providers of computer antivirus software at as much as $4 billion, four sources familiar with the matter told Reuters. CVC Capital Partners, which took control of the Prague-based company in 2014, could seek an initial public offering (IPO) in London for Avast in the first half of next year if market conditions allow, two of the sources said. CVC and Rothschild declined to comment. If successful, Avast’s IPO would represent the largest ever UK technology IPO. However, it would have to navigate a tough market, which has seen a number of planned London lis... Read More
View Post

AI-enabled technologies could help museums survive the digital age

In Business, Emerging Technology, Government, Legal, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

By definition, museums store and display objects of historical, scientific, artistic, or cultural significance. Want to see dinosaur skeletons, medical oddities, Civil War weapons, or Renoir masterpieces? There’s a museum out there for you. But without relatability and modern storytelling, even the most captivating exhibits can be, well, a bit stuffy and boring. Especially for young people who are used to rich, complex multimedia experiences. Scoff at generational expectations if you will, but there’s a point here worth considering. If museums want to remain engaging and relevant in chang... Read More
View Post

Feds exposed: What the government is doing to protect you after a breach

In Events, Government, Healthcare, Legal, Mobile Technology, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

In early September credit reporting company Equifax revealed that the personal information – including Social Security numbers, birth dates, addresses and driver’s license numbers – of 143 million Americans was hacked and stolen by malicious actors. This breach constituted one of the biggest exposures of Social Security numbers since the Office of Personnel Management breach in 2015, which contained the sensitive information of 21.5 million individuals that had either applied for a background investigation or were the spouse... Read More
View Post

The entrepreneurs behind a technology boom in Argentina

In Business, Government, Start Up, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Two years into the government of President Mauricio Macri, Argentina’s technology industry is experiencing huge growth. His pro-market and pro-business policies are aimed at opening up and modernizing the country’s economy.Some sectors have resisted President Macri’s changes. But others are benefiting such as tech start-ups. Correspondent Joel Richards met with some entrepreneurs in Buenos Aires who are creating a regional hub for innovative technology in a variety of fields. Argentina is expecting many more changes to the economy with labor and tax reform being discussed. But as the economy opens, so does competition from established international companies. Many Argentine compan... Read More
View Post

Arkansas county hopes bitcoin pilot will help fight cybercrime

In Business, Education, Energy, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

BENTONVILLE, Ark. (AP) — The Benton County sheriff’s office hopes a pilot program in its Cyber Crimes Division will further combat child pornography, child predators and other crimes online. The pilot program involves acquiring a digital currency, or cryptocurrency, called bitcoin. The currency was created in 2009, and its popularity grew as an alternative to money kept by central banks, the Northwest Arkansas Democrat... Read More
View Post

Amendment puts IGs in charge of cyber audits, not NIST

In Government, Legal, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , ,

A House bill that would have put the National Institute of Standards and Technology in charge of auditing agency cybersecurity practices was amended to place that responsibility in the hands of agency inspectors general, a move which a policy expert said will give the bill a better chance of passage. “I would think this amendment would increase the likelihood of passage,” said Marcus Christian, partner in the law firm Mayer Brown’s Litigation and Dispute Resolution practice and White Collar Defense and Compliance group. “I... Read More