Trump’s Homeland Security Purge Worries Cybersecurity Experts

Trump’s Homeland Security Purge Worries Cybersecurity Experts

“DHS’s voice is vital around the Situation Room table,” says Edelman “Looking ahead, as we consider issues like national security controls over AI, or limits to foreign investment, DHS is going to be more crucial than ever—and their absence of leadership could lead to some very skewed outcomes.”.

How An Entire Nation Became Russia's Test Lab for Cyberwar

How An Entire Nation Became Russia's Test Lab for Cyberwar

From that foothold, it appeared, the hackers had spread through the power companies’ networks and eventually compromised a VPN the companies had used for remote access to their network—including the highly specialized industrial control software that gives operators remote command over equipment like circuit breakers.

Turn On Auto-Updates Everywhere You Can

Turn On Auto-Updates Everywhere You Can

Turn On Auto-Updates Everywhere You Can Alyssa Foote This week, Google announced that it had patched a wicked vulnerability in Chrome, by far the most popular browser in the world.

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

(Like other open source code, though, expect it to have some bugs.) Joyce also noted that the NSA views the release of Ghidra as a sort of recruiting strategy, making it easier for new hires to enter the NSA at a higher level, or for cleared contractors to lend their expertise without needing to first come up to speed on the tool.

Quantum Physics Could Protect the Grid From Hackers—Maybe

Quantum Physics Could Protect the Grid From Hackers—Maybe

“It’s like working on a car with its engine running.” Sungjin Kim/Getty Images Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid. Peters’s group thinks that a utility company could use quantum-encrypted data to communicate with their hardware.

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

Furloughed cybersecurity employees returned to expired software licenses and web encryption certificates, colleagues burned out from working on skeleton crews, and weeks-worth of unanalyzed network activity logs.

The US Leans on Private Firms to Expose Foreign Hackers

The US Leans on Private Firms to Expose Foreign Hackers

He previously held counterterrorism and intelligence roles for the US government overseas and domestically.As government-backed hackers in Russia, China, Iran, and North Korea continue to infiltrate and attack American companies, it’s often private cybersecurity firms, rather than the US government, that are publicly assigning blame.

DOJ Indicts Hackers for Ransomware That Crippled Atlanta

DOJ Indicts Hackers for Ransomware That Crippled Atlanta

Regardless of the impact on the alleged SamSam hackers specifically, the Justice Department made a statement that should resound among cybercriminals who rely on bitcoin and the dark web for anonymity.“It absolutely adds a chilling effect,” Jarvis says.

Julian Assange Charges, Japan's Top Cybersecurity Official, and More Security News This Week

Julian Assange Charges, Japan's Top Cybersecurity Official, and More Security News This Week

Security News This Week: Japan's Top Cybersecurity Official Has Never Used a ComputerTOSHIFUMI KITAMURA/AFP/Getty ImagesThe US refused to join a new global cybersecurity agreement this week—maybe because it was created by French president Emmanuel Macron, with whom President Trump isn’t on great terms with.On the same day, internet traffic that was supposed to route through Google’s cloud servers instead went haywire, traveling through unplanned servers based in the likes of Russia and China.

The Hail Mary Plan to Restart a Hacked US Electric Grid

The Hail Mary Plan to Restart a Hacked US Electric Grid

After failures plague Utility B, Utility A then needs to step in, restarting to offer redundant power to that same critical customer.In order to interact and safely share electricity, utilities also need to get their electromagnetic frequencies in tune at around 60 hertz, so part of the exercise involved not just getting Utility A and B running, but syncing them."We had 18 substations, two utilities, two command centers, and we had two generation sources that we had to bring up a crank path and synchronize," says Stan Pietrowicz, a researcher at Perspecta Labs who is working on a black start network analysis and threat detection tool through RADICS.

The US Sits out an International Cybersecurity Agreement

The US Sits out an International Cybersecurity Agreement

“The private sector is now willing to say that we can and we will do more.”"Over the past three or four years, we’ve really seen a groundswell of private leadership."Megan Stifel, Public KnowledgeIn April, Microsoft announced the Cybersecurity Tech Accord, an agreement similar to the Paris Call that was signed by more than 60 technology corporations, which it dubbed a “a Digital Geneva Convention.” In July, the company publicly advocated for the regulation of facial recognition technology and said it was developing its own set of principles for how it should be used.