Editorial

Why Trump’s Travel Ban Dismays Security Execs
Editorial Why Trump’s Travel Ban Dismays Security Execs

On Friday, January 27th, President Trump signed an executive order that temporarily blocks travel for immigrants from seven Muslim countries and suspends the US refugee system. This attempt to “keep radical Islamic terrorists out of the US” has been met with plenty of infuriated reactions from all o

Here’s why Silicon Valley loves Hillary Clinton’s tech plan
Editorial Here’s why Silicon Valley loves Hillary Clinton’s tech plan

In a time when other political candidates are polishing their golf clubs in Scotland – or rather have other people polish them, and describe Brexit as a “great thing”, Hillary Clinton announced her tech agenda. Friendly for the commercial technology sector – with better incentives for startups, impr

Security firm on DNC breach: ‘This wasn’t Script Kiddie stuff’
Editorial Security firm on DNC breach: ‘This wasn’t Script Kiddie stuff’

In an ongoing chain of twists, the Democratic National Committee (DNC) breach got another development today. After a lone hacker named Guccifer 2.0 claimed he was responsible for the breach, another security firm reinforces the original findings – that Russian hacker groups, codenamed “Cozy Bear” an

Hacker claims responsibility for DNC breach. Sends files to Wikileaks
Editorial Hacker claims responsibility for DNC breach. Sends files to Wikileaks

One of this week’s top stories featured the Democratic National Committee (DNC) breach, where allegedly a group of Russian hackers stole opposition research on Donald Trump, the Republican president candidate. Security firm Crowdstrike was hired to mitigate the data breach – and informed that their

GAO study: US nuclear forces are still controlled by floppy disks
Editorial GAO study: US nuclear forces are still controlled by floppy disks

Over $80 billion are invested in government IT annually – a large amount reportedly for maintaining existing systems, therefore efficiency studies are required at some points. The United States Government Accountability Office assessed federal agencies’ IT O&M spending, evaluated the oversight o

Hackers break into congressman’s smartphone using just his phone number
Editorial Hackers break into congressman’s smartphone using just his phone number

Remember those movie scenes where the protagonists are trying to track someone down, and they have to keep them on the phone until the police or agency can pinpoint the perp’s location? They usually need about 1 minute or so for the tracking software to work, but the bad guys always seem to know e

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later