Hackers can breach air-gapped voting machines and tallying systems in an attempt to alter ballots to sway the outcome of an election, a Senate panel has learned. Also, at the hearing, DHS discloses that Russian hackers targeted 21 state election systems before the 2016 election.
Concerns over Russian hacking of state election systems are mounting. In New York, Gov. Andrew Cuomo has ordered a review of security efforts related to state elections. On Capitol Hill, Sen. Mark Warner wants DHS to release additional details relating to cyberattacks targeting state election systems.
A new dump from WikiLeaks has revealed an apparent CIA project - code named "CherryBlossom" - that since 2007 has used customized, Linux-based firmware covertly installed on business and home routers to monitor internet traffic and exploit targets' devices.
Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
Good news: The Neutrino exploit kit - once a major exploit kit player - appears to have disappeared from the cybercrime scene. While it's unclear if Neutrino is gone for good, rivals have already filled any gaps in the market.
With the growth in the number and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of the most significant risks that organizations face. Faced with a constant
stream of evolving threats, many businesses spend millions of dollars annually on people, processes, and...
Russian hackers struck election systems in almost twice as many states as previously reported, according to a news report. The breaches could undermine confidence in the election process, one cybersecurity expert warns.
Two security firms have investigated what they describe as a malware platform for attacking the industrial control systems that run electricity plants. They warn that the platform was the likely culprit behind the December blackouts in Ukraine.
Bad security habits of consumers whose use of apps is skyrocketing is leading to increased risks for businesses as they ramp up their use of apps as well, says Neil Wu Becker, a global vice president at A10 networks, who emphasizes the need to enforce best practices.
A lot of the risk to an organization's reputation is caught up in how an organization is able to respond to a cyber attack. Over the years, organizations have suffered serious consequences from a cyber attack. They've lost a lot of data, and the public response to those incidents has really further damaged the...
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
The two primary teams responsible for blocking security breaches in organizations have different priorities, timelines, and objectives. However, businesses are starting to take a new approach to bridge the gap between security and operations teams, and ensure that systems are running and secure.
SecOps is the...
Infosecurity Europe 2017 in London drew an estimated 18,000 attendees. Here are 13 visual highlights from the annual information security conference, ranging from tchotchkes and keynotes to 19th century architecture and live hacks of internet-connected devices.
Intelligence agencies, governments, military and defense agencies, law enforcement, and commercial enterprises worldwide need to utilize a proactive, intelligence-driven offense to prevent and disrupt today's sophisticated threats.
Cyber threats vary greatly, and so do the methods of attack. To counter various...