View Post

‘Work with our diplomats or deal with US military’: Mattis unveils new defense strategy

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

The US will counter any “threat to America’s democracy experiment” in the world, if necessary with military force, the Pentagon chief threatened. Jim Mattis said Russia and China are potential adversaries for the US.RT LIVE http://rt.com/on-airSubscribe to RT! http://www.youtube.com/subscription_c...Like us on Facebook ... Read More
View Post

Triton Malware Details Show the Dangers of Industrial System Sabotage

In Events, Government, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

A recent digital attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. And while security researchers offered some analysis last month of the malware used in the attack, called Triton or Trisis, newly revealed details of how it works expose just how vulnerable industrial plants—and their failsafe mechanisms—could be to manipulation. At the S4 security conference on Thursday, researchers from the industrial control company Schneider Electric, whose equipment Triton targeted, presented deep analysis o... Read More
View Post

A New Way to Track Down Bugs Could Help Save IoT

In Education, Events, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , ,

On a clear day this summer, security researcher Ang Cui boarded a boat headed to a government biosafety facility off the northeastern tip of Long Island. Cui's security company, Red Balloon, will spend the next year studying how its Internet of Things threat-scanning tool performs on the building control systems of Plum Island Animal Disease Center. If successful, the project could provide a critical tool in the fight against vulnerabilities in embedded industrial systems and critical infrastructure. "The island is only accessible via a ferry. The dock is protected by armed guards and I presume patrolled by the Coast Guard," Cui says. Those protections, though, mean nothing to potential hackers. So Cui's... Read More
View Post

Triton Malware Details Show the Dangers of Industrial System Sabotage

In Events, Government, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

A recent digital attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. And while security researchers offered some analysis last month of the malware used in the attack, called Triton or Trisis, newly revealed details of how it works expose just how vulnerable industrial plants—and their failsafe mechanisms—could be to manipulation. At the S4 security conference on Thursday, researchers from the industrial control company Schneider Electric, whose equipment Triton targeted, presented deep analysis o... Read More
View Post

Triton Malware Details Show the Dangers of Industrial System Sabotage

In Events, Government, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

A recent digital attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. And while security researchers offered some analysis last month of the malware used in the attack, called Triton or Trisis, newly revealed details of how it works expose just how vulnerable industrial plants—and their failsafe mechanisms—could be to manipulation. At the S4 security conference on Thursday, researchers from the industrial control company Schneider Electric, whose equipment Triton targeted, presented deep analysis o... Read More
View Post

A New Way to Track Down Bugs Could Help Save IoT

In Education, Events, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , ,

On a clear day this summer, security researcher Ang Cui boarded a boat headed to a government biosafety facility off the northeastern tip of Long Island. Cui's security company, Red Balloon, will spend the next year studying how its Internet of Things threat-scanning tool performs on the building control systems of Plum Island Animal Disease Center. If successful, the project could provide a critical tool in the fight against vulnerabilities in embedded industrial systems and critical infrastructure. "The island is only accessible via a ferry. The dock is protected by armed guards and I presume patrolled by the Coast Guard," Cui says. Those protections, though, mean nothing to potential hackers. So Cui's... Read More
View Post

A New Way to Track Down Bugs Could Help Save IoT

In Education, Events, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , ,

On a clear day this summer, security researcher Ang Cui boarded a boat headed to a government biosafety facility off the northeastern tip of Long Island. Cui's security company, Red Balloon, will spend the next year studying how its Internet of Things threat-scanning tool performs on the building control systems of Plum Island Animal Disease Center. If successful, the project could provide a critical tool in the fight against vulnerabilities in embedded industrial systems and critical infrastructure. "The island is only accessible via a ferry. The dock is protected by armed guards and I presume patrolled by the Coast Guard," Cui says. Those protections, though, mean nothing to potential hackers. So Cui's... Read More
View Post

New Report Links Massive Hacking Campaign to Lebanese Intelligence

In Government, Security, Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , , , ,

Published on Jan 19, 2018A new report released Jan. 18 by mobile security firm Lookout and the Electronic Frontier Foundation claims to have traced a large cyber espionage campaign to Lebanon's main internal intelligence agency. Category License Standard YouTube License ... Read More
View Post

New Report Links Massive Hacking Campaign to Lebanese Intelligence

In Government, Security, Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , , , ,

Published on Jan 19, 2018A new report released Jan. 18 by mobile security firm Lookout and the Electronic Frontier Foundation claims to have traced a large cyber espionage campaign to Lebanon's main internal intelligence agency. Category License Standard YouTube License ... Read More
View Post

In speech, Mattis explains his cyber concerns

In Business, Finance, Government, Healthcare, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

On the same day the summary of new National Defense Strategy only vaguely mentioned the Pentagon’s cyber capabilities, Secretary of Defense James Mattis expanded on the topic and discussed the department’s efforts tor reorganize cyber forces. The only portion of the strategy summary that explicitly addresses cyberspace notes that the Department of Defense will “invest in cyber defense, resilience, and the continued integration of cyber capabilities into the full spectrum of military operations.” ... Read More
View Post

National Defense Strategy released with clear priority: Stay ahead of Russia and China

In Business, Education, Finance, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — The Pentagon’s new National Defense Strategy lays out a world where great-power competition, rather than counterterrorism, will drive the department’s decision-making and force structure. “Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security,” the 11-page unclassified summary of the strategy reads. Instead, “the central challenge to U.S. prosperity and security is the reemergence of long-term strategic competition,” primarily from China and Russia. ... Read More
View Post

The Army wants to showcase its cyber warrior training platform

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

Much like infantry soldiers need to practice their marksmanship on a shooting range, cyber mission forces need a virtual equivalent to hone their skills on an individual and team basis. To establish such an emulation, the Army was tapped in 2016 as the lead for the joint services to develop the persistent cyber training environment, or PCTE. ... Read More
View Post

Congressional budget skirmishes won’t halt cyber issues

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

Worries that the government may shut down Friday at midnight have dominated the airwaves, but everything around Washington hasn’t been mired in deadlock. Federal agencies’ cyberspace policies and posture have seen a lot of activity in the past week, and there will be ramifications regardless of whether Congress manages to avert a Jan. 19 shutdown. Here’s a roundup of the biggest cyber stories: Kaspersky filed a preliminary injunction to counter DHS ban: Kaspersky Lab filed a preliminary injunction in U.S. fe... Read More
View Post

4 ways the Pentagon can secure internet of things devices

In Events, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

With the increased use of “internet of things” devices, sensors, remote technologies, data analytics and artificial intelligence, the boundaries of Department of Defense and intelligence agency networks have increased exponentially. This opens the door to a new level of communication synergy, as well as new and serious security risks. There are two big challenges when it comes to battlefield communication devices: Internet of things device security – As of now, there isn’t even a standard operating system being used for these devices on the batt... Read More
View Post

Report links hacking campaign to Lebanese security agency

In Business, Events, Government, Legal, Mobile Technology, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

LONDON — A major hacking operation tied to one of the most powerful security and intelligence agencies in Lebanon has been exposed after careless spies left hundreds of gigabytes of intercepted data exposed to the open internet, according to a report published Thursday. Mobile security firm Lookout, Inc. and the Electronic Frontier Foundation, a digital rights group, said the haul, which includes nearly half a million i... Read More
View Post

Shutdown could make it harder to prevent cyberattacks

In Government, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , ,

Government shutdown and budgeting debates hurt agencies’ ability to adequately protect their networks, because they lose time to procure necessary technologies, according to Trey Hodgkins, senior vice president for public sector at the Information Technology Alliance for Public Sector. As Congress looks likely to pass its fourth continuing resolution in five months, agencies will have a hard time procuring cybersecurity technologies through the Department of Homeland Security’s Continuous Diagnostics and Mitigation program and... Read More
View Post

Which of these leaders will be the next head of Cyber Command?

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

With the reported retirement of Adm. Michael Rogers, commander of U.S. Cyber Command and director of the National Security Agency, government and defense industry sources have floated several names as potential successors. It’s likely whoever is nominated as the new leader of Cyber Command, will also likely service as director of the NSA, like Rogers. Here are four officers that have been mentioned for the job and how they’ve dis... Read More
View Post

Catalonia separatists seek to restore exiled leader Puigdemont

In Business, Government, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , ,

In Catalonia, new and returning members of the regional parliament have met for the first time since snap elections in December.But there is still uncertainty over the new president of the parliament. Separatist parties want former leader Carles Puigdemont to take the role, but he is in self-imposed exile in Belgium.Madrid says that move would be illegal.Al Jazeera's Karl Penhaul reports.- Subscribe to our channel: http://aje.io/AJSubscribe... Read More
View Post

Bitcoin investors targeted by North Korean hackers

In Business, Security, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Published on Jan 17, 2018Endgame CEO Nate Fick on hackers in North Korea targeting cryptocurrency investors and efforts to improve cyber security. Category License Standard YouTube License Detected Closed Captioning: WE WILL BRING IT TO YOU COM... Read More
View Post

Google Chrome extensions with 500,000 downloads found to be malicious

In Business, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , ,

EnlargeICEBRG Researchers have uncovered four malicious extensions with more than 500,000 combined downloads from the Google Chrome Web Store, a finding that highlights a key weakness in what's widely considered to be the Internet's most secure browser. Google has since removed the extensions. Researchers from security firm ICEBRG stumbled on the find after detecting a suspicious spike in outbound network... Read More
View Post

Russia-Linked Hackers Targeting US Senate

In Security, Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , , , , ,

Published on Jan 16, 2018According to cybersecurity firm Trend Micro, Russian hackers are targeting the U.S. Senate with a new espionage campaign. Category License Standard YouTube License Detected Closed Captioning: [Music] Russian Hackers Ar... Read More
View Post

Why Cloudflare Let an Extremist Stronghold Burn

In Business, Education, Finance, Gaming, Government, Legal, Science & Nature, Security, Start Up by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the fall of 2016, Keegan Hankes, an analyst at the Southern Poverty Law Center, paid a visit to the neo-Nazi website the Daily Stormer. This was not unusual; part of Hankes’ job at the civil rights organization was to track white supremacists online, which meant reading their sites. But as Hankes loaded the page on his computer at SPLC’s headquarters in Montgomery, Alabama, something caught his eye: a pop-up window that announced “Checking your browser before accessing … Please allow up to 5 seconds.” In fine print, there was the cryptic phrase “DDoS protection by Cloudflare.” Hankes, who had worked at SPLC for three years, had no idea what Cloudfla... Read More
View Post

Breed Reply Portfolio of IoT Start-Ups Raise in Excess of $50 Million in Series A Funding in 2017

In Business, Emerging Technology, Finance, Government, Healthcare, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

LONDON–(BUSINESS WIRE)–January 16, 2018– Breed Reply, a leading operational investor in early-stage internet of things (IoT) businesses, saw one third of its 18-strong portfolio of investee companies, complete series A funding rounds in 2017. In total, six companies raised in excess of $50 million during the year with funds coming from notable investors including Accel, Aviva Ventures, Finance Wales, Intu and MunichRE. More companies in the growing portfolio are expected to be ready for Series A investment in 2018. The successful companies span a broad range of IoT sectors: ... Read More
View Post

Homeland Security coming for Westbury hackers

In Business, Education, Government, Legal, Science & Nature, Security, Start Up by Innovate LILeave a Comment

Tech News Keywords: , , , , , ,

By GREGORY ZELLER // A multistate hacking effort centered in Westbury has attracted the U.S. Department of Homeland Security’s attention – and agents are coming. But no arrests are imminent: When Westbury nonprofit We Connect the Dots hosts its Back-To-School Code-a-Thon later this month, it will welcome DHS representatives as partners in an educational data dump for high schoolers on potential cybersecurity careers, including government work. ... Read More
View Post

3 reasons chatbots didn’t meet industry expectations in 2017

In Business, Government, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , ,

Great expectations surrounded the dawn of the “chatbot revolution” less than a couple of years ago. Marketers and futurists fantasized about intelligent virtual autonomous agents that would understand us better than we understand ourselves, glean our desires from snippets of conversations, and turn our every command into an immediate action. The idea was something like a mix of JARVIS from the Marvel Universe and HAL from 2001: A Spa... Read More
View Post

What’s Trending on Weibo 01.12.18

In Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , ,

Detected Closed Captioning: Criticism Is Getting Intense On Chinese Social Media As Calls For A Boycott Of Marriott Hotels Grow Louder It All Started When Marriott Sent Out A Survey To Customers In China With The Questionnaire Listing Hong Kong Macau Tibet And Taiwan As Separate Countries instead Of Regions That Are Part Of China After This Mistake Came To Light Marriott Went Online To Apologize For the Oversight But It Doesn't Seem To Be Working That's Because I'm Weibo Some Web Users Are Even Telling Mara To Leave China Saying You Are No Longer welcome Here Cyber Authorities Have Temporarily Shut Down Marriott Internationals Chinese website And Its Mobile Phone App Which Will Severely Disrupt Bookings Follow CG Tian And Th... Read More
View Post

Facebook revamps News Feed

In Business, Security, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , ,

Published on Jan 12, 2018The Cyber Guy Kurt Knutsson and MediaDC political analyst Ron Meyer discuss Facebook’s News Feed overhaul intended to highlight meaningful social interactions. Category License Standard YouTube License Detected Closed... Read More
View Post

Afshin Molavi on the reactions to Pres Trump’s warning on the Iran Nuclear Deal

In Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , ,

Detected Closed Captioning: Me Now Is Efficient Maulavi Senior fellow At The School For Advanced International Studies At Johns Hopkins University A Lot To Unfold Here Let's Just Begin With This Announcement Today what Can Really Change Before The Next Deadline And In You Know We've Heard Donald Trump Say So Much Pulled The Us Out Of The Climate Accords Do All These Things But It Never Actually Happened So Where Does This Fall In All Of This Well They Were Pretty Clear In That This Is I Think The Third Waiver That He Has Signed And They Were Pretty Clear That He's Not Gonna Be signing Any More Waivers Come May So Come May You Know As One Says You Kick the Can Down The Road There's Only So Much Road Right And So You Know What... Read More
View Post

Protecting against known DoD vulnerabilities is posing a challenge

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

One of the main areas of focus both during and after the May 2017 global ransomware attack, dubbed WannaCry, was that it exploited a known Microsoft vulnerability for which the company released a patch three months prior to the attack. Several affected organizations fell victim to the attack because they failed to implement the patch. Large organizations such as the Department of Defense are not exempt from protecting against such known vulnerabilities. ... Read More
View Post

Cybersecurity firm: US Senate in Russian hackers’ crosshairs

In Gaming, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

PARIS — The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionage campaign against the U.S. Senate, a cybersecurity firm said Friday. The revelation suggests the group often nicknamed Fancy Bear, whose hacking campaign scrambled the 2016 U.S. electoral contest, is still busy trying to gather the emails of America’s political elite. “They... Read More
View Post

Next F-35: US navy’s ambitious submarine faces concerns at design stage

In Business, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

A brand new US submarine project, set to be delivered in 2031, could be left dead in the water before it's even got going. It's being compared to America's most costly fighter jet, the F-35, which has been widely slammed by experts for it's technical failures. RT LIVE http://rt.com/on-airSubscribe to RT! http://www.youtube.com/subscription_... Read More
View Post

Defensive cyber continues to mature, still lags offensive cyber

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

While the Department of Defense’s overall cyber force is relatively new, the offensive side draws from a legacy that reaches back decades and has roots in the intelligence community. The defensive side, however, is working to put together procedures and tactics for protecting DoD networks and weapon systems on a global scale. But a milestone is on the horizon. Cyber Command’s defensive operational arm – Joint Force Headquarters... Read More
View Post

Apple health data used in murder trial

In Business, Healthcare, Legal, Mobile Technology, Security by BBCLeave a Comment

Tech News Keywords: , , , , ,

Health data has provided crucial evidence at a trial in Germany, in which a refugee is accused of rape and murder.Apple's Health App accurately records steps and has been pre-installed on the iPhone 6S and newer models.Data suggesting the suspect was climbing stairs could correlate to him dragging his victim down a riverbank and climbing back up, police said.The accused - Hussein K - has admitted his guilt but disputed some details.The 19-year-old medical student Maria Ladenburger was murdered in October 2016 and the trial - at the district court in Freiburg - started in September.Ms Ladenburger was raped and drown... Read More
View Post

U.S. House passes bill to renew NSA warrantless internet surveillance

In Business, Events, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — The U.S. House of Representatives on Thursday passed a bill to renew the National Security Agency’s warrantless internet surveillance program, overcoming objections from privacy advocates and confusion prompted by morning tweets from President Donald Trump that initially questioned the spying tool. The legislation, which passed 256-164 and split party lines, is the culmination of a years-long debate in Congress on the proper scope of U.S. intelligence collection – one fueled by the 2013 disclosures of classified surveillance secrets by former NSA contractor Edward Snowden. Senior Democrats in the House had urged cancellation of the vote after Trump appeared to cast doubt on the merits of the progr... Read More
View Post

House reauthorizes spy program that helps prevent cyber attacks

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

After a confusing morning of tweets by President Donald Trump, the House on Thursday passed a bill to reauthorize a key foreign intelligence collection program with an important tweak: It would require the FBI to get a warrant if it wants to view the contents of Americans’ communications swept up in the process. Legislation to renew the program that allows spy agencies to conduct surveillance on foreign targets abroad passed the House 256-164 and now heads to the Senate. Trump has said he will sign the bill, which would extend t... Read More
View Post

FBI security expert: Apple are “jerks” about unlocking encrypted phones

In Business, Government, Legal, Mobile Technology, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , ,

EnlargeGetty Images | Boonrit Panyaphinitnugoon Federal Bureau of Investigation officials are continuing to voice their displeasure with Apple's approach to iPhone security, with one FBI official reportedly calling the company "jerks" and an "evil genius" this week. Apple has repeatedly made it more difficult to access data on encrypted iPhones, making Apple customers safer from hackers but also preventing the FBI from breaking into phones used by suspected criminals. "At what point is it just... Read More
View Post

Anti-Russia guide: US Democrats publish 200-page doc on Moscow allegations

In Business, Government, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , ,

Vladimir Putin is the number-one threat to democracy in Europe & the US, according to a new report, published by US Senate Democrats. It took more than a year for its authors to compile the 200-page document. READ MORE: https://on.rt.com/8wmkRT LIVE ... Read More
View Post

The next challenge for Navy cyber teams? Keeping skills sharp

In Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , ,

In November, the Navy’s Cyber Mission Force teams reached a key staffing milestone nearly a year ahead of schedule. The next step? Ensuring those teams sustain a high degree of readiness that allows them to deploy anywhere, anytime. Keeping cyber teams razor-sharp and ready to act means that the teams are either on-mission or in a simulated training environment essentially every day, said Adm. Michael Gilday, the commander of Fleet Cyber/10th Fleet. ... Read More
View Post

Japan cleared to buy missile defense focused SM-3

In Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , ,

WASHINGTON – The U.S. State Department has cleared Japan to buy four Standard Missile-3 (SM-3) Block IIA weapons, worth an estimated $133.3 million. The SM-3 Block IIA is being designed jointly by the U.S. and Japan for defense against medium- and intermediate-range ballistic missiles, so the fact the sale cleared the State department is no surprise. It is unlikely to meet resistance in Congress, where members of the Senate now have 30 days to raise concerns about the potential sale. ... Read More
View Post

DoD quietly reorganizes Cyber Command

In Business, Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

U.S. Cyber Command has quietly reorganized its hierarchy to include a second deputy, a three-star general who reports to the commander. The move comes after President Donald Trump, in accordance with Congressional mandate, directed Cyber Command to elevate to a full unified combatant command out from under Strategic Command. It also takes place as the agency prepares for a new commander with the expected retirement of Adm. Michael Rogers this spring. ... Read More
View Post

DoD quietly reorganizes Cyber Command to shepherd command through elevation

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

U.S. Cyber Command has quietly reorganized its hierarchy to include a second deputy, a three-star general who reports to the commander. The move comes after President Donald Trump, in accordance with Congressional mandate, directed Cyber Command to elevate to a full unified combatant command out from under Strategic Command. It also takes place as the agency prepares for a new commander with the expected retirement of Adm. Michael Rogers this spring. ... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1capitol building0.893building, government building, capitol building
2government building0.896
3building0.896
4Public Building0.801
5protective covering0.793
6blue color0.878

Short term budget fixes are bad government

In Education, Government, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , ,

Once again, the airwaves and media outlets are filled with the threat of another federal government shutdown in just 10 days. Congress and the president have been at odds over the annual spending bill to fund the government for months, with agencies function under a series of short-term spending measures to keep the lights on. The latest continuing resolution was passed just before Christmas and is set to expire Jan. 19. Unfortunatel... Read More
View Post

Short term budget fixes are bad government

In Education, Government, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , ,

Once again, the airwaves and media outlets are filled with the threat of another federal government shutdown in just 10 days. Congress and the president have been at odds over the annual spending bill to fund the government for months, with agencies function under a series of short-term spending measures to keep the lights on. The latest continuing resolution was passed just before Christmas and is set to expire Jan. 19. Unfortunatel... Read More
View Post

CES 2018: Smart technology at forefront of the show

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , ,

Detected Closed Captioning: ♪♪ NEIL: ALL RIGHT. FORGET THE REGULAR MARKETS HERE. TECH AGAIN PROVING TO BE THE BIG CATALYST THAT DRIVES EVERYTHING AND YOU CAN SEE IT AND FEEL IT AT THE CONSUMER ELECTRONICS SHOW CALL THE CES WITH A LOOK AT THE NEW ODD TECHNOLOGY. HEY, LIZ. >> NEIL, AS 5000 EXHIBITORS OPENING UP THEIRWARES AND THIS CONSUMER ELECTRONICS, IT IS POURING RAIN IN VEGAS, THEY HAVEN'T SEEN RAIN IN 117 DAYS. EDISON IS A BLUETOOTH SPEAKERING. THERE ARE TARPS ALL OVER AND TRASHCANS EVERYWHERE. WE UNDERSTAND, SOME OF OUR COMPETITORS SETS ARE GETTING DRIPPED ON, SO YOU KNOW, IT HAPPENS. NEIL, ARE YOU BOXERS OR BRIEFS GUY? BEFORE YOU ANSWER THAT, I WANT TO SHOW YOU THESE? SMART UNDERWEAR. I KNOW YOU'RE WAITING TO C... Read More
View Post

Why more agencies aren’t starting bug bounty programs?

In Business, Finance, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

The Department of Defense has been lauded as the first agency in the federal government to institute a bug bounty program. While limited in scope as compared to private sector programs, Hack the Pentagon, as it’s known, sought to invite vetted hackers into its doors with the aim of discovering vulnerabilities within their websites and systems. Since then, many security experts have expressed the need for similar programs to take place within the other federal agencies. ... Read More
View Post

Jamie Dimon on cyber security: We’re well protected

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , ,

Detected Closed Captioning: FOR OPPORTUNITY, THAT'S NOT GOOD FOR WAGES AND HOW AMERICAN FEELS ABOUT ITSELF AND WE HAVE TO FIX SOME OF THESE PROBLEMS. MARIA: I SEE SOME OF THE TECHNOLOGY THAT YOU HAVE PUT IN THE BRANCHES, YOU HAVE BEEN COUPLE OF YEARS AGO I REMEMBER YOU SAY TO GO ME, AT SOME POINT JP WILL SPEND A BILLION DOLLARS ON CYBER. >> WE ARE AT 700 TODAY OR SOMETHING LIKE THAT. WE ARE WELL PROTECTED BUT CYBER DO. YOU TO PROTECT YOURSELF AND PROTECT YOUR CLIENTS, ET CETERA, WE NEED TO WORK MORE WITH THE GOVERNMENT TO GET CYBER DONE BUT TECHNOLOGIES, AGAIN, I LOOK AT TABLE, A COUPLE KNEE PROJECTS SOON, SO WE GREAT TEAMS OF DOING IT AND, OF COURSE, THE MESH PUBLIC WANTS IT. MARIA: SOME PEOPLE SAY THERE'S IN CORPORATE... Read More
View Post

The botnet solution everybody already knows about

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

Government and industry could help prevent dangerous botnet attacks simply by using tools that already exist, according to a draft report headed to the White House. Instead, IT officials often ignore those tools because they’re too expensive, too difficult or for other reasons, a recent report from the National Telecommunications and Information Administration said. “The tools, processes, and practices required to significantly e... Read More
View Post

Aurora CEO optimistic about future of long-endurance drones

In Business, Emerging Technology, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

WASHINGTON — The Air Force has been resistant to buy ultra-high endurance drones, but a recent $48 million investment in the technology could signify that the service is changing its mind about its requirements, the head of Aurora Flight Sciences said. On Wednesday, Aurora Flight Sciences announced that the Air Force had awarded it a $48 million contract to create a certified version of its Orion medium altitude, long-endurance unmanned aerial system. ... Read More
View Post

Iran: Economic reasons contributing to the unrest | Counting the Cost

In Government, Legal, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , , , , , , ,

Almost a year on after sanctions were lifted from Iran, the Middle East's second-largest economy remains a hard place to find a job. This is one of the economic factors contributing to the current unrest being felt across the country. With an economy second only to Saudi Arabia, a population exceeding all in the region barring Egypt - standing at 80 million who call Iran home - and over 50 percent of that figure currently under the age of 30, the world has taken notice of the demonstrations in the country. Since the New Year, thousands have taken to the streets over rising prices and economic mismanagement; the biggest show of public dissent in the country since pro-reform rallies took place in... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1condominium0.753housing, condominium
2housing0.76
3gray color0.713

Healthcare breaches from ransomware nearly doubled last year

In Healthcare, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , ,

The number of major IT breaches in the healthcare industry caused by ransomware attacks nearly doubled in 2017, according to a new report from the cyber defense company Cryptonite. The industry is expected to remain a prime target in 2018. The report’s findings draw from data breaches affecting 500 or more people and reported to the Health and Human Services Office of Civil Rights as required by federal law. Under the Health ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1person0.713

National Defense Strategy coming Jan. 19

In Business, Finance, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

WASHINGTON – The Pentagon will unveil its National Defense Strategy on Jan. 19, Secretary of Defense Jim Mattis announced Friday. Speaking to reporters at the Pentagon, Mattis said a significant part of the strategy will remain classified, but promised to make at least part of the document open to the public. “There will be a classified one that is relatively thick; there will be a shorter one that will basically lay it out uncla... Read More
View Post

Can 30-day prototyping solve Army cyber-buying woes?

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

The idea of buying technology faster, better and more cost-efficiently isn’t new in the government, but that’s not stopping the Army from improving cyber-specific acquisition. In the Army’s program executive office for enterprise information systems, officials in the defense cyber operations program are executing a new acquisition strategy that uses a consortium-based approach and other transaction authority to achieve goals like a 30-day prototyping process. ... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1Wildfire0.817
2slope0.798
3natural elevation0.798
4nature0.79
5coal black color0.862
6black color0.799

Even Realistic Videogames like Call of Duty Won’t Help Us Win Wars

In Business, Emerging Technology, Gaming, Government, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Millennials can now storm the beaches of Normandy and fight Nazis with a new level of realism. Sure, past games like like Castle Wolfenstein let them role play America’s Greatest Generation. But the recently released Call of Duty: WWII provides a more human and realistic dimension of war, whereas previous videogames delved into fantasy or featured cyber-mutant soldiers out of a bad '90s movie. Will all this realism help future soldiers perform more effectively on the battlefield? To answer this question, a team of West Point researchers headed for the wooded hills that encircle the upstate New York campus, where every summer cadets must perform a series of challenges and exercises to... Read More
View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1milling machine0.604machine, machine tool, shaping machine, milling machine
2shaping machine0.606
3machine tool0.637
4machine0.762
5gray color0.753

Computer chip bugs: Tech firms scramble to fix flaws

In Business, Events, Legal, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , , ,

Tech firms have admitted to a serious flaw in chips that could expose sensitive information from billions of computers, servers and smartphones around the world. Experts are now scrambling to fix the issues before they become vulnerable to hackers. Because the issue is in hardware, not software, all platforms are at risk - including both Apple and Microsoft.Al Jazeera's Rob Reynolds reports.- Subscribe to our channel: http://aje.io/AJSubscribe... Read More
View Post

Air Force to unveil plan to revamp ISR enterprise this spring

In Security by Defense NewsLeave a Comment

Tech News Keywords: , ,

WASHINGTON — The Air Force will roll out an “ISR flight plan” this spring that will spell out the service’s way forward on future intelligence platforms and key technologies like artificial intelligence, a service official announced Thursday. The blueprint, which will look at five year increments up until 2035, isn’t about modernizing the service’s ISR enterprise, so much as it is about transforming it to meet future threats, said Lt. Gen. VeraLinn “Dash” Jamieson, Deputy Chief of Staff for ISR. ... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification

Who’s affected by computer chip security flaw

In Business, Education, Events, Legal, Mobile Technology, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

Technology companies are scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers and found in many of the world’s personal computers and smartphones. The two hardware bugs discovered can be exploited to allow the memory content of a computer to be leaked. Such a leak could potentially expose stored passwords and other sensitive data, including personal photos, emails and instant messages. ... Read More
View Post

Meltdown and Spectre: How chip hacks work

In Business, Education, Government, Security by BBCLeave a Comment

Tech News Keywords: , , , , , , ,

As technology companies race to fix two major vulnerabilities found in computer chips, the ways in which those chips could theoretically be targeted by hackers are becoming clear. Collectively, Meltdown and Spectre affect billions of systems around the world - from desktop PCs to smartphones.So why are so many different devices vulnerable - and what is being done to fix things?What part of my computer is at risk?When it is working, a computer shuffles aro... Read More
View Post

Alexa, how does the US lead in military AI?

In Business, Finance, Government, Security, Uncategorized by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON – With a special mention in the White House’s National Security Strategy, artificial intelligence has officially become a national priority. But how the Trump administration plans to advance the technology remains unclear. The National Security Strategy, released in December, identified artificial intelligence as an emerging technology “critical to economic growth an... Read More
View Post

Why Congress won’t reopen the Clinton email investigation

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Detected Closed Captioning: LOU: NO WORD FROM DEPARTMENT OF JUSTICE ON HUMA ABEDIN'S MISHANDLING OF CLASSIFIED MATERIAL, TOLL HILLARY CLINTON AIDE FORWARDED STATE DEPARTMENT E-MAILS AND PASSWORDS TO HER PERSONAL YAHOO! E-MAIL ACCOUNT, BEFORE EVERY YAHOO! ACCOUNT WAS HACKED IN 2013, SEVERAL FOUND ON A LAPTOP BELONGING TO ABEDIN'S HUSBAND AT THE TIME, ANTHONY WEINER. OUR KNOCKS GUEST OUR NNOCKS GUEST OUR NEWCKS GUEST OUR NEW YS GUEST OUR NEW YORGUEST OUR NEW YORK EST OUR NEW YORK STT OUR NEW YORK STOCK EXCHANGE -- OUR NEXT GUEST HAS WRITTEN ON E-MAIL ECMAIL ECONIL ECONOMY SCANDAL. LET'S START WITH WHY BASED ON WHAT WE KNOW NOW, AND LARGELY BECAUSE OF WHO BECAUSE WF WHO BECAUSE WHAWHO BECAUSE WHATHO BECAUSE WHAT THE HOUSE INTEL ... Read More
View Post

Intel working with rivals to fix flaw

In Business, Education, Legal, Security by BBCLeave a Comment

Tech News Keywords: , , , , ,

Chip-maker Intel has said it is working with other major tech firms to fix flaws that could allow hackers to steal personal data from computer systems.The issue was originally linked to a flaw in Intel's chips, but the firm said this was "incorrect"."Many types of computing devices - with many different vendors' processors and operating systems - are susceptible to these exploits," Intel said. Google researchers first discovered the flaw last year. Google said the problem affected the basic elec... Read More
View Post

Peter Thiel places big bet on bitcoin

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: ,

Detected Closed Captioning: DAGEN: BITCOIN ALREADY SURGING IN PRICE AS WE ENTER 2018. ONE OF THE BIGGEST NAMES IN VENTURE CAPITALIST PETER THIEL MADE A GIANT BET ON THE VOLATILE CRYPTOCURRENCY. HILLARY VAUGHN HAS THE DETAILS. >> HEY, DAGEN, "THE WALL STREET JOURNAL" REPORTS THAT PETER THIEL'S VENTURE CAPITAL FIRM, FOUNDERS FUND, BOUGHT $15 BILLION WORTH OF BITCOIN CURRENCY SEVERAL MONTHS AGO. NEIL TOLD INVESTORS THAT THAT INVESTMENTS IS WORTH HUNDREDS OF BITCOIN JUMPED 11% ON THE NEWS THAT UP WITH OF SILICON VALLEY'S ELITE IS PUTTING HIS MONEY WHERE HIS MOUTH IS. NEIL IN OCTOBER TOLD FOX BUSINESS'S MARIA BARTIROMO LAST FALL THAT HE THINKS THE CRYPTOCURRENCY IS A SAFE BET. >> THIS BITCOIN END UP BEING THE CYBER EQU... Read More
View Post

Major flaw in millions of Intel chips revealed

In Business, Education, Legal, Security by BBCLeave a Comment

Tech News Keywords: , , ,

A serious flaw in the design of Intel's chips will require Microsoft, Linux and Apple to update operating systems for computers around the world.The full details of the vulnerability are yet to be released by Intel, but it is believed to affect chips in millions of computers from the last decade.The UK's National Cyber Security Centre (NCSC) said it was aware of the issue and that patches were being produced. Some experts said the fix could slow down computers."We are aware of reports about a potential flaw affecting some computer processors. At this stage there is no evidence of any ... Read More
View Post

Law firm with LI office expands to California

In Emerging Technology, Gaming, Legal, Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , ,

A law firm with offices in 10 states, including in New York on Long Island, has opened an office in California. Goldberg Segalla, with offices in Garden City and Manhattan, has expanded into Los Angeles, marking the firm’s 20th location. The office offers expertise in cyber risk, sports and entertainment, and complex product liability litigation, and will ultimately include civil litigation, corporate transactions, regulatory compliance, and risk-avoidance counsel. John Stephens, previously of Sedgwick, will lead the office, and also serve as vice chair of the firm’s sports and entertainment practice group. “We’re lucky to have somebody as talented as John, nationally recognized for both his comman... Read More
View Post

U.S. blocks MoneyGram sale to China’s Ant Financial over national security concerns

In Business, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — A U.S. government panel rejected Ant Financial’s acquisition of U.S. money transfer company MoneyGram International over national security concerns, the companies said on Tuesday, the most high-profile Chinese deal to be torpedoed under the administration of U.S. President Donald Trump. The $1.2 billion deal’s collapse represents a blow for Jack Ma, the executive chairman of Chinese internet conglomerate Alibaba Group Holding, who owns Ant Financial together with Alibaba executives. He was looking to expand Ant Financial’s footprint amid fierce domestic competition from Chinese rival Tencent Holdings’ WeChat payment platform. Ma, a Chinese citizen who appears frequently with leaders from the h... Read More
View Post

Einar Tangen talks about the newly introduced law on nuclear safety and environment

In Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , ,

Detected Closed Captioning: To Make For A Sense Of The Laws And regulations Coming Into Effect CG Teams Current Affairs Commentator Ainít Engines Us From Beijing einar Let's Begin With This Waste And Recycling This New Law Is Really Affecting Other Countries And China Is Dealing With Its Own Trash And Recycling Issue Was This A Long Time Coming Oh Absolutely I Mean You've Seen A Number of Laws Which Are Concentrating On The Environment And Here In China That Go Into Effect There They're Changing The Way The Revenues Are Are Garnered In Terms Of Environmental Fees And Things like That More Going To Local Governments To Give Them More Incentive to Crackdown They're Cracking Down On As You Said Earlier On Water Pollution This ... Read More
View Post

Among Pentagon’s New Year’s resolutions: more cyber

In Business, Finance, Government, Healthcare, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — The Pentagon’s No. 2 expects to spend a chunk of time on cyber issues in 2018, amidst a broad reorganization of the department’s management and acquisition structure. Patrick Shanahan, the deputy secretary of defense, told reporters Dec. 21 that part of his focus for the new year will be making sure the Pentagon’s cyber security is up to snuff after years of what officials openly talk about as having fallen behind the commercial sector. ... Read More
View Post
Number of Items Identified: 13
Item #Item NameScoreItem Classification
1computer user0.676person, computer user
2person0.676
3office0.64building, office
4building0.64
5ultramarine color0.709
6sage green color0.65
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
144350.403753FEMALE0

How the “Original Internet Godfather” walked away from his cyber crime past

In Business, Education, Finance, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge / Brett Johnson tears up when he mentions the FBI special agent who helped him quit online fraud.Dionysios Demetis This article was originally published on ... Read More
View Post

ICYMI: Regulatory rollbacks, prickly tweets, reorgs and more didn’t take a holiday

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Though the year-end holidays generally indicate a massive slowdown in government activity, a few things of note slipped in under the wire: Last call for legislation Congress passed a number of bills just before heading off on holiday recess, including the ... Read More
View Post

McAfee to RT: ‘We live in a new world of sophisticated hacking & cryptojacking’

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

Cybersecurity guru John McAfee, who courted online ridicule after he was breached by a hacker seeking to promote obscure digital coins, told RT we are essentially defenseless in the face of advanced hacking techniques. READ MORE: https://on.rt.com/8vwsRT LIVE ... Read More
View Post

New in 2018: Army cyber expands training, gains EW soldiers

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

The Army’s growing cyber career field will gain the service’s electronic warfare soldiers in 2018. The 29 series EW force will transition to the 17 series MOS, the career field that is the baseline of Army cyber, said Maj. Gen. Patricia Frost, who leads the Army Cyber Directorate at the Pentagon. The 29 series soldiers will begin training to give them a foundation in cyber. Effective Oct. 1, 2018, they will transition to the 17 s... Read More
View Post

Why you’ll hear about a ‘cyber carrier’ in 2018

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

For the past several years, one of the top priorities of Cyber Command was building its 133 cyber mission force teams made up of roughly 6,200 personnel from the four services. All of those teams are expected to reach full operational capability by next year. Now, the command is expected to shift its focus and instead concentrate on developing the tools and infrastructure it will need in the near-term as well as developing concept... Read More
View Post

FERC proposes rule to expand cyber incident reporting

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

The Federal Energy Regulatory Commission wants to expand cyber incident reporting requirements to include any time an adversary attempts to break into an energy company’s networks, rather than only those that compromise the company’s critical operations. “The reporting of cyber-related incidents, in particular the lack of any reported incidents in 2015 and 2016, suggests a gap in the current mandatory reporting requirements. This reporting gap may result in a lack of timely awareness for responsible entities,” the proposed... Read More
View Post

4 Cyber Command storylines to watch for in 2018

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

The upcoming new year portends to be a big one for Cyber Command. After nearly eight years of existence, the organization is beginning to mature and develop in ways military leaders have long envisioned. Here are four story lines to watch as Cyber Command’s role continues to evolve: An increase in cyber operations T... Read More
View Post

John McAfee says his Twitter account was hacked

In Business, Government, Legal, Security, Start Up by BBCLeave a Comment

Tech News Keywords: , , , , , , , ,

John McAfee has said his Twitter account was hacked and used to promote lesser-known crypto-currencies.The cyber-security pioneer has rebuffed suggestions that the alleged incident undermined his own credentials saying: "I have no control over Twitter's security".But he also posted that he believed his mobile phone had likely been compromised.Twitt... Read More
View Post

Tech 2017: BBC News Online’s biggest technology stories

In Business, Events, Government, Legal, Mobile Technology, Security by BBCLeave a Comment

Tech News Keywords: , , , , , , , , ,

For many, 2017 will be defined by fake news and the fight-back against it. Others will point to the blog that uncovered sexism and sexual harassment at Uber, helping force the resignation of the ride-hailing firm's founder and paving the way for other controversies to be uncovered.Gamers may prefer instead to celebrate Nintendo's revival thanks to its Switch console, and motorists to highlight Elon Musk's desire to electrify the trucking industry.But you, BBC Tech's readers, focused your attention elsewhere - at least as far as our figures on what you clicked on suggest.Below are the stori... Read More
View Post

Should Trump be credited for ISIS’s loss of territory?

In Business, Government, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

Published on Dec 27, 2017Lt. Gen. Jerry Boykin weighs in on whether President Trump deserves credit for ISIS’s loss of about 80% of its territory. Category License Standard YouTube License Detected Closed Captioning: LEA: ISIS OWN THE VERGE O... Read More
View Post

China lashes out at German ambassador over cybersecurity

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

BEIJING — China’s foreign ministry lashed out at the German ambassador on Wednesday after he said Beijing failed to respond to requests to discuss Chinese internet controls foreign companies worry will disrupt business. Ambassador Michael Clauss told the South China Morning Post newspaper of Hong Kong the two governments agreed in 2016 to set up a group to discuss cyber issues but it “has yet to see the light of day.” He said requests for a “meaningful dialogue” about Chinese curbs on virtual private networks, which ar... Read More
View Post

Sweden would militarily back allies, but expects the same in return, says defense report

In Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , ,

HELSINKI — Nonaligned Sweden stands ready to provide military support to Nordic and European Union partner nations who may come under attack, according to a new strategic report focusing on so-called total defense and submitted by the Swedish Defence Commission to the Swedish government. Moreover, Sweden would expect EU and Nordic partner nations to come to its assistance if the country’s sovereignty is at risk. The report, titled ”Resilience,” underscores the need to build a strong defense capability based on increased sp... Read More
View Post

Bitcoin, security, workplace sexism top tech’s biggest stories

In Finance, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , , , , ,

2017 has been a big year for technology. Tech stocks have outperformed the market and cryptocurrencies like Bitcoin hit all-time highs. But it hasn't all been smooth sailing with some major cyber breaches striking fear in both companies and consumers.Detected Closed Captioning: a Massive Launch Of The Spaceship Apple's New Five Billion Dollar Headquarters But The Star Of The Show was The Feature Product IPhone 10 It Is The Biggest Leap Forward Since The Original IPhone Apple Literally Raised The Bar With An IPhone Price Tag That hit 1000 U.s. Dollars It's Clearly Had A Huge Impact On The Market A Lot Of people Really Liked It At The Same Time it's Also Reflective Of The Fact That You Know... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1newsreader0.66person, newsreader
2person0.9
3claret red color0.605
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender Certainty
144350.403753FEMALE0.0179862

PBS NewsHour full episode December 26, 2017

In Video by PBS NewsHourLeave a Comment

Tech News Keywords: , , , , , , , , ,

Tuesday on the NewsHour, Russian intelligence operations continue to influence U.S. opinion. Also: The Boston Globe investigates how racism still plagues the city, the Church of Sweden moves to stop referring to God as male, the memoir of a young American living in Russia during the 1950s and a dancer's fresh take on an old artform.Detected Closed Captioning: HARI SREENIVASAN: Good Evening. I'm Hari Sreenivasan. Judy Woodruff Is Away. On The "NewsHour" Tonight: Russian Intelligence Operations Continue To Influence U.S. Opinion. Then: The History Of Boston's Longstanding Racial Problems And How They Permeate Everyday Life There. And The Woman Leading Tap Dancing's Renaissance Talks History,... Read More
View Post

ISIS could be using bitcoin to do business

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , , ,

Published on Dec 26, 2017TrustedSec Founder David Kennedy on the possibility that ISIS is using the cryptocurrency bitcoin to help fund their terror organization. Category License Standard YouTube License Detected Closed Captioning: ♪ DAVID:!... Read More
View Post

How to stop losing revenues and players to cyberattacks

In Business, Gaming, Government, Healthcare, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

The video game market has grown to $116 billion worldwide, and that makes it a big target for cyber criminals. Sony felt the sting of cyberattacks in 2011 when hacktivist group Anonymous took down its PlayStation Network. That forced Sony’s CEO to apologize to all of the company’s game customers. ... Read More
View Post

How DARPA sparked dreams of self-healing networks

In Business, Education, Finance, Government, Legal, Security, Start Up by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

On an August day in 2016, computer security gurus traveled to Las Vegas to prove that artificial intelligence, or AI, could find and fix flaws in software at machine speeds. There, teams battled for nearly 12 hours to see whose automated systems could best identify and patch vulnerabilities in software, with the top three prizes ranging from $750,000 to $2 million. Judges had winnowed a field of 100 teams to seven finalists for the Defense Advanced Research Projects Agency-hosted Cyber Grand Challenge (CGC) Final Event. ... Read More
View Post

The Dark Bounty of Texas Oil

In Business, Education, Energy, Events, Finance, Government, Healthcare, Legal, Science & Nature, Security, Start Up by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

For more than a century, the economic fortunes of Texas have depended on oil. The image of mighty geysers spewing depreciable assets out of the ground is forever linked to the state. In the popular imagination, a rich Texan is invariably an oil baron. The Austin Chalk, the Barnett Shale, the Wolfcamp: these layers of subterranean Texas have yielded up so much black gold that their names are recognized by oilmen and everyday citizens alike. In large part because of high oil prices, a disproportionate share of America’s economic growth over the past decade has come from Texas. The gross domestic product of the... Read More
View Post

3 disruptive industries that will thrive in the southern U.S. next year

In Business, Education, Events, Government, Healthcare, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the U.S., the Southeast’s tech ecosystem is traditionally strong in a few defined sectors: Fintech, SaaS, and health IT are among the industries thriving in terms of successful exits, high-growth companies, and venture dollars. But just as the broader tech scene is constantly changing, new industries will emerge and pick up steam in the region. Over the next year, driven by support from public and private entities, as well as innovation from new startups, these disruptive technology sectors stand to grow in the South. Cybersecurity It’s no secret that  cybersecurity is mission-critical to every compa... Read More
View Post

Should spies use secret software vulnerabilities?

In Business, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

The attack took advantage of a vulnerability in the Windows operating system that the federal government had been aware of for years but had chosen not to tell Microsoft about until just months before the WannaCry attack began. That history and the potential for more releases in the coming weeks have intensified the debate around how governments and spy agencies should act when they discover weaknesses in computer software. ... Read More
View Post

Should spies use secret software vulnerabilities?

In Business, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

The attack took advantage of a vulnerability in the Windows operating system that the federal government had been aware of for years but had chosen not to tell Microsoft about until just months before the WannaCry attack began. That history and the potential for more releases in the coming weeks have intensified the debate around how governments and spy agencies should act when they discover weaknesses in computer software. ... Read More
View Post

Russian hackers targeted more than 200 journalists globally

In Business, Events, Government, Legal, Mobile Technology, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

PARIS (AP) — Russian television anchor Pavel Lobkov was in the studio getting ready for his show when jarring news flashed across his phone: Some of his most intimate messages had just been published to the web. Days earlier, the veteran journalist had come out live on air as HIV-positive, a taboo-breaking revelation that drew responses from hundreds of Russians fighting their own lonely struggles with the virus. Now he’d been hacked. ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1shoes0.774footwear, shoes
2footwear0.79
3maroon color0.885
4dark red color0.705

The glitch that stole Christmas: How to handle smart tech gifts

In Government, Legal, Security by BBCLeave a Comment

Tech News Keywords: , , ,

Although the rush to connect everything from toys to toothbrushes, cars to sex toys, and any number of household appliances to the internet, seems inexorable, there is little regulation protecting your cyber-security.Not surprising then that there has been a raft of stories this year highlighting the vulnerabilities that are coming to light. Now, with Christmas upon us, it's highly likely that you've considered buying a connected device, or maybe Santa will leave one for you under the tree. But with no one else to rely upon to regulate the security of your new device, what should you do to prote... Read More
View Post

Chinese hackers go after think tanks in wave of more surgical strikes

In Business, Finance, Government, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Communists.东方 2016 saw a significant drop-off in cyber-espionage by China in the wake of a 2015 agreement between US President Barack Obama and Chinese Premier Xi Jingping. But over the course of 2017, espionage-focused breach attempts by Chinese hackers have once again been on the rise, according to researchers at CrowdStrike. Those attempts were capped off by a series of attacks ... Read More
View Post

Air Force wants cyber to have impact, tools measuring how hard it can hit

In Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

The Air Force, in cooperation with the RAND Corporation, is working on how to characterize nonkinetic effects akin to the way the military measures effects in the kinetic world. The effects of kinetic weapons, such as bombs, are widely understood. These include blast radius and the potential number of targets that could be affected, all of which makes their planning and employment easier given commanders understand what they do. For ... Read More
View Post

Networking simulators to create complex training environments on horizon

In Business, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

ORLANDO, Fla. -- Industry is heading down a path to weave together disparate virtual reality simulators to create more intricate training environments and missions that better resemble what real-world operations will look like in the future, especially as the services and allies work to operate more jointly across air, land, sea and cyber. What if an instructor training a pilot to fly a tactical jet could change the mission mid-flight, which would require more fuel for the aircraft to complete. The instructor could tap into a netw... Read More
View Post

North Korea vows to retaliate over US ransomware accusation

In Business, Government, Healthcare, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

SEOUL, South Korea (AP) — North Korea said Thursday that a U.S. accusation that it was behind a major ransomware attack was a “grave political provocation” and vowed to retaliate. Homeland security adviser Tom Bossert wrote in a Wall Street Journal op-ed published Monday that North Korea will be held accountable for May’s WannaCry ransomware attack that infected hundreds of thousands of computers worldwide and crippled parts of Britain’s National Health Service. ... Read More
View Post

3 cybersecurity trends agencies need to watch in 2018

In Business, Government, Legal, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

All organizations struggle to prioritize their cybersecurity efforts, but federal agencies do so with the twin burdens of added regulation and a smaller budget than most private organizations. As the world prepares for monumental data legislation to take effect, and as traditional, static security methods prove ineffective, it is becoming clear than privileged access management can no longer be ignored. These three forces will be explored below, along with how to strengthen network security against both immediate and future concerns. ... Read More
View Post

‘Porch Pirates’ Steal Holiday Packages as They Pile Up at Homes

In Business, Education, Emerging Technology, Legal, Security by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

“One of the outcomes is you’ve got one of the easiest ways to steal something ever,” said Nirav Tolia, chief executive of Nextdoor, a social network for neighborhoods that has become a popular outlet for residents to gripe about stolen boxes.The more efficient thieves follow UPS and other delivery trucks, scooping up packages as they are dropped off. Two weeks ago in Lincoln, two people were arrested in a car stuf... Read More
View Post

US short of options to punish NKorea for WannaCry cyberattack

In Business, Finance, Government, Healthcare, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON (AP) — The Trump administration vowed Tuesday that North Korea would be held accountable for a May cyberattack that affected 150 countries, but it didn’t say how, highlighting the difficulty of punishing a pariah nation already sanctioned to the hilt for its nuclear weapons program. The WannaCry ransomware attack infected hundreds of thousands of computers worldwide and crippled parts of Britain’s National Health Service. It was the highest-profile cyberattack North Korea has been blamed for since the 2014 hack of... Read More
View Post

US short of options to punish North Korea for serious cyberattack

In Business, Finance, Government, Healthcare, Legal, Security by Military TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — The Trump administration vowed Tuesday that North Korea would be held accountable for a May cyberattack that affected 150 countries, but it didn’t say how, highlighting the difficulty of punishing a pariah nation already sanctioned to the hilt for its nuclear weapons program. The WannaCry ransomware attack infected hundreds of thousands of computers worldwide and crippled parts of Britain’s National Health Service. It was the highest-profile cyberattack North Korea has been blamed for since the 2014 hack of Sony... Read More