Reality of DNC ‘hack’ a simple phishing scam that’s landed in your inbox

Hacking has become a buzzword in our society and it’s been misplaced on the leaked DNC emails that were almost given away, not stolen. The reality of this hack was it was simple, so simple your twelve-year-old daughter or son probably would have caught it. However, a DNC staffer fell for it. This is something […]

Attacking the digital dragon: Protecting against cyber attacks

Any modern country has a wide variety of assets to protect. Some of those assets are more necessary than others for the country’s security, welfare, and economy in general. Such critical assets include power grids, water supplies, public-transit systems, and telecommunications, to name a few. Critical infrastructure has to be protected from a wide variety of […]

The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror

When the Islamic State was seeking volunteers for a holiday killing rampage in Europe, it sent word over its favorite social-media channel: the messaging service known as Telegram. “Christmas, Hanukkah, and New Years Day is very soon,” began a Dec. 6 posting on one of the terrorist group’s usual Telegram bulletin boards. “So let’s prepare a […]

Sailors’ personally identifiable information stolen by Ricky Ninja

On October 27, 2016, an unknown person or persons of interest stole 134,386 names and social security numbers of US Navy sailors from a laptop of a contractor working for Hewlett Packard and under contract by the Navy. The exfiltrated data derives from the Career Waypoints database (C-WAY). The C-WAY database is used to for re-enlistment […]

Tech titans join forces to battle online terrorist content

Facebook, Microsoft, Twitter and YouTube have joined forces in an attempt to curb the spread of terrorist content on the Internet. The tech giants have announced the creation of a shared industry database to tackle terrorist content. The database will use “hashes,” or unique digital “fingerprints,” for violent terrorist imagery, recruitment videos or videos that […]

The Pentagon’s Long, Slow Process of Getting New Tech Is About to Change

It takes what feels like an eternity for the Pentagon to adopt new technology. Often a system is already outdated by the time it is ready for combat. “It takes us a really long time to build anything new, usually between five to eight years for new technology to get to our warfighters,” Col. Bruce […]

Panel urges better cybersecurity to President-elect Trump

A presidential commission on Friday made 16 urgent recommendations to improve the nation’s cybersecurity, including creating a nutritional-type label to help consumers shop wisely and appointing a new international ambassador on the subject — weeks before President-elect Donald Trump takes office. The release of the 100-page report follows the worst hacking of U.S. government systems […]

Cyber center project a ‘turning point’ for Army capability

The groundbreaking for Army Cyber Command’s new complex at Fort Gordon, Georgia, represents a crucial turning point for the nation’s ability to fight in the cyber domain and diminish gaps in capability, Army leaders said Tuesday at the event. “We are demonstrating to our adversaries that no matter how warfare may change, we intend to […]