The U.S. military, building on the perceived success of its first "bug bounty" contest last year, has once again opened its cyber-defenses to scrutiny by outside hackers -- and this time not only by Americans. And, once again, the winner was a teenager. "Though inviting foreigners to hack military networks may sound unsafe, Air Force … Continue reading Pentagon opens ‘bug bounty’ to Five Eyes, teenager wins again
Last week's cyberattack on computers in multiple countries via ransomware known as "WannaCry" has made numerous headlines and sparked much discussion and criticism. One side of the story of this major security breach to receive less attention, however, is the light it shines on the cozy relationship between major tech companies and the National Security … Continue reading WCry ransomware attack exposes murky NSA-corporate ties yet again
Following the Edward Snowden leaks four years ago that revealed extensive and detailed information on the National Security Agency's mass surveillance programs, media reports surfaced indicating that Russia’s Federal Guard Service was reverting to using typewriters and paper documents in an attempt to avoid the pervasive monitoring of the digital age. But if Russia's response … Continue reading Wikileaks ‘Year Zero’ release reveals CIA hacking capabilities
At the end of this month, regulations will come into effect requiring defense contractors to implement "insider threat" detection and prevention programs, with the aim of stopping security breaches. Yet the approach the Pentagon is taking seems to favor its larger contractors, while potentially stifling innovation from smaller competitors and contributing to the problem it … Continue reading DoD ‘insider threat’ rules may favor biggest contractors, make problem worse
As US officials loudly argue over how to best go about hacking foreign governments, other countries are taking note, and an international hacking arms race seems to be picking up pace. Of the many unexpected topics that came into play in this year's cartoonish US presidential election, one that received considerable attention was Russian hacking … Continue reading Election hacking fears fuel cyber arms race
The risk of foreign hackers shifting the outcome of the U.S. presidential election has likely been exaggerated. Nevertheless, officials and policy makers reportedly "do anticipate so-called cyber mischief, including the possible release of fake documents and the proliferation of bogus social media accounts designed to spread misinformation," according to NBC News. To fight back against … Continue reading US warning to Russia a real threat or PR posturing for US public?
Another day, another media freakout over the alleged Wikileaks-Russian axis of hacking. On Monday, it was Marc Thiessen of the American Enterprise Institute and the Washington Post's turn to attack Wikileaks founder Julian Assange, who, according to Thiessen "is the devil." Thiessen asserts that the media is being hypocritical and irresponsible in not reporting on … Continue reading Assange ‘is the devil,’ but is he a ‘cyber combatant’?
Adm. Mike Rogers, the "dual-hatted" head of both the National Security Agency (NSA) and U.S. Cyber Command (Cybercom), repeated his position Tuesday that the two agencies should be split and run separately, saying it is only a matter of “the right time” and “the right process.” The proposed move is opposed by some including Senate Armed … Continue reading Proposed NSA-Cybercom split comes as govt. looks to justify cyberattacks
President Obama spoke at the "White House Frontiers Conference" in Pennsylvania on Thursday, discussing a wide range of technology-related issues with other panelists, from artificial intelligence to healthcare to cybersecurity. If you are reading this post, though, it may be because you maintain a healthy skepticism towards the "tech sector" or the "innovation space" or … Continue reading Obama talks tech, cybersecurity, censorship at White House conference
As hacking fears remain in the media spotlight leading up to the presidential election, a debate is raging in Washington, D.C. over how to best approach cybersecurity and other technological challenges. While there is no consensus, however, there seems to be a common thread among many suggestions: the answer is to hold somebody accountable for … Continue reading Officials, tech execs suggest more bureaucracy, scapegoating as cybersecurity solutions