BITAG Outlines Steps to Dramatically Improve the Security and Privacy of IoT...
Broadband Internet Technical Advisory Group (BITAG) today released a report outlining a set of guidelines it believes could dramatically improve the security and privacy of IoT devices and minimize the...
View ArticleGermany’s Leading ISP Deutsche Telekom Under Cyberattack, Close to 900K...
Close to a million Deutsche Telekom customers have had trouble getting online since Sunday afternoon which the company on Monday confirmed to be the result of an "outside" attack. Around 900,000...
View ArticleCyberattack Cuts Off Thousands of TalkTalk, Post Office Customers in UK
Thousands of TalkTalk and Post Office customers in the UK have had their Internet access cut by an attack targeting certain types of Internet routers, according to a BBC report on Thursday. "A...
View ArticleInternet Society Urges for Increased Effort to Address Unprecedented...
The Internet Society urged the global Internet community to redouble its efforts in addressing the wave of unprecedented challenges facing the Internet during the 11th Internet Governance Forum (IGF),...
View ArticleSledgehammer DDoS Gamification and Future Bugbounty Integration
Monetization of DDoS attacks has been core to online crime way before the term cybercrime was ever coined. For the first half of the Internet's life, DDoS was primarily a mechanism to extort money from...
View ArticleYahoo Reveals Over One Billion More Accounts Have Been Hacked
Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. In a...
View ArticleYahoo’s 1 Billion Accounts Hacked is a Chilling Warning: Start Doing Things...
Today, this is how easily "TRUST" by your users/customers can be shattered, your revenues devastated, your share value plunged into the abyss, and your business destroyed. Furthermore, conventional...
View ArticleThe Reality Virus
There's a new virus infecting the Internet that's more pernicious and more dangerous than any virus that has gone before. It's the first example ever of a hybrid Internet-human virus and probably the...
View ArticleTrump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity,...
"President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced...
View ArticleInternet Governance Outlook 2017: Nationalistic Hierarchies vs....
Two events, which made headlines in the digital world in 2016, will probably frame the Internet Governance Agenda for 2017. October 1, 2016, the US government confirmed the IANA Stewardship transition...
View ArticleCircleID’s Top 10 Posts of 2016
The new year is upon us and it's time for our annual look at CircleID's most popular posts of the past year and highlighting those that received the most attention. Congratulations to all the 2016...
View ArticleFormer New York City Mayor Rudy Guliani Appointed to "Chair" Cyber Task Force
Transition spokesman Sean Spicer told reporters today that former New York City Mayo, Rudy Giuliani will "chair" the cyber task force that Trump announced last Friday. The task force is given three...
View ArticleCyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are...
A Global Paradigm Change is Threatening us All While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological,...
View ArticleUkraine’s Power Outage Due to Cyberattack, Says Country’s National Power Company
A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack, according to Ukraine's National power company, Ukrenergo which hired investigators to help it determining the cause....
View ArticleCanadian Energy Firms at Bigger Risk of Cyberattack
The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. In an...
View ArticleNew Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT...
Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today...
View ArticleDispersing a DDoS: Initial Thoughts on DDoS Protection
Distributed Denial of Service is a big deal — huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are...
View ArticleCharacterizing the Friction and Incompatibility Between IoC and AI
Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area — in perception...
View ArticleData Breaches Reported During 2016 Exposed Over 4.2 Billion Records
2016 broke the previous all-time high, set back in 2013, for the number of records exposed from reported data breaches. Security firm, Risk Based Security, in a report released today says 4,149 data...
View ArticleUS Law-Enforcement Agencies Reported to be at Risk in Foreign-Owned Buildings
"US law-enforcement agencies are at risk of being spied on and hacked because some of their field offices are located in foreign-owned buildings without even knowing it." Sophie Tatum and Pamela Brown...
View Article