Candlelites

Everything from Everywhere

cyber - Search

cyber Searched between all the resources and sites across the web. To view the full text news click on the links searched. All links are displayed with the source site.



trump cybersecurity executive order expected to be signed today


the president is expected to sign an executive order on cyber security at 3:15 p.m. the order will advise agency and department heads that they will be held accountable for cyber security, cbs news’ mark knoller reports.agency and department heads will be directed by the executive order to use the best practices from the private sector to enhance cyber security. they will also be required to prepare for the modernization of cyber security in their agencies. the office of mana ent and budget will oversee government-wide efforts to enhance cyber security. no vulnerability study has yet been made, according to a white house official said. just before he signs the order, he’ll hold a “listening session” with cyber security experts.






trump expected to sign cyber security executive order tuesday: source


president donald trump is expected to sign an executive order on cyber security on tuesday, a source familiar with the situation said, marking the first action to address what he has called a top priority of his administration.the order is expected to commission several different reviews of the government’s offensive and defensive cyber capabilities, according to two other sources briefed on a draft of the order that circulated last week.(reporting by steve holland and dustin volz; editing by chris reese)






reports: russian cyber-spy treason cases linked to cia


moscow (ap) — russian cybersecurity intelligence officers reportedly detained on treason charges are being accused of p ing secrets to the cia.sergei mikhailov and dmitry dokuchaev, who worked for the cyber wing of russia’s fsb domestic intelligence service until their arrests in december, are accused of cooperating with the cia, according to unnamed sources cited tuesday by interfax news agency.no officials have publicly commented, but russian media outlets with links to the security services have reported in detail on the case. an executive from cyber-security firm kaspersky lab has also reportedly been arrested on linked treason charges.u.s. intelligence agencies have alleged that russian president vladimir putin ordered a paign to influence the u.s. presidential election in favor of do






reports: russian cyber spy treason cases linked to cia


moscow (ap) — russian cybersecurity intelligence officers reportedly detained on treason charges are being accused of p ing secrets to the cia.sergei mikhailov and dmitry dokuchaev, who worked for the cyber wing of russia’s fsb domestic intelligence service until their arrests in december, are accused of cooperating with the cia, according to unnamed sources cited tuesday by interfax news agency.no officials have publicly commented, but russian media outlets with links to the security services have reported in detail on the case. an executive from cyber-security firm kaspersky lab has also reportedly been arrested on linked treason charges.u.s. intelligence agencies have alleged that russian president vladimir putin ordered a paign to influence the u.s. presidential election in favor of do






trump expected to sign cyber security executive order tuesday: source


trump news, u.s. news, worldtrump expected to sign cyber security executive order tuesday: sourcereuters30 jan 2017 at 18:42 etpresident donald trump is expected to sign an executive order on cyber security on tuesday, a source familiar with the situation said, marking the first action to address what he has called a top priority of his administration.the order is expected to commission several different reviews of the government’s offensive and defensive cyber capabilities, according to two other sources briefed on a draft of the order that circulated last week.(reporting by steve holland and dustin volz; editing by chris reese)report typos and corrections to [email protected] fires acting ag sally yates for refusing to back travel bannewest videosnewest stories






zero days, film review: stuxnet, secrecy and the new era of cyber war


zero days • written and directed by alex gibney • magnolia pictures • 116 minutesthere's a simple but obvious principle that makes cyber attacks different from nuclear attacks: if we can do it to them, they can do it to us. very few countries would have had the expertise to write stuxnet, the malware that was discovered to be infecting iranian uranium centrifuges in 2010. but once it's out there...it can be copied and reused by any country that cares to act like a 'script kiddie'. according to the evidence presented in alex gibney's film zero days, this wasn't the risk us president george w. bush was focused on in 2005. at that time, the world looked like this to him: either israel would attack iran with the us's help, or israel would attack iran on its own and the us would be forced to jo






throwback thursday: five era accessories you probably didn't need: digital p og


plenty of useful era accessories come on to the market every year – but among them are some real duds. so let's take a look back at some of the worst offenders, shall we? the first product that comes to mind, at least around here, is the sony party-s .the party-s , introduced in 2009, was actually pretty clever. you popped on a compatible era (originally the cyber-s dsc-wx1 and tx1) and off it went. the 'personal p og her' could rotate 360° and tilt up or down 24°, and would use the era's face and smile detection features to follow subjects and take a p o at the right moment. it even used the rule of thirds for proper composition! the party-s was portable, making it the thing to talk about at parties (no pun intended).oh, and be sure to watch this:






us no longer has geog hy as defense, ally in cybercombat


washington — the united states has long relied on its borders and superior military might to protect against and deter foreign aggressors. but a lack of boundaries and any rulebook in cyberspace has increased the threat and leveled the playing field today.it's unclear how president donald trump, who has emphasized an "america first" approach to domestic issues, will respond to cyberspace threats, which transcend traditional borders and make it easier and cheaper than ever for foreigners to attack the u.s. whatever the approach, it will set the tone and precedent for global policies during a critical time when the ground rules are still being written.at a hearing this month on foreign cyberthreats, the chairman of the senate armed services committee, sen. john mccain, r-ariz., ran through a






singapore business cyber confidence is probably cyber delusion


"singapore companies are confident of their ability to detect a sophisticated cyber attack," read an enthusiastic press release earlier this month. "80 percent of the singapore respondents share that sentiment, surp ing the global average of 50 percent." on face value, that sounds like a big thumbs-up for doing business in singapore. but let's dig down into this. first, though, some background. the press release was from the singapore office of ey -- that's the global brand of the various companies in the ernst & young group -- and the figures are from their report path to cyber resilience: sense, resist, react: ey's 19th global information security survey 2016-17 (giss). the report is cl ic of the corporate cybersecurity genre. the pdf and you'll get 38 richly-designed pages. these r






trump decides the cyber will be fixed another day


image: gettypresident trump was scheduled to sign an executive order on cybersecurity today, following a “listening session” with cybersecurity experts. that signing was abruptly canceled, with no reason given.advertisementthe meeting with experts went ahead as planned. according to a white house email, the attendees included many of trumps’ top advisers and appointees, as well as rudy giuliani, trump’s cybersecurity adviser, and two people from the national security council’s cybersecurity policy team whose occupations were strangely listed only as “#cyber.” but after the meeting and the brief appearance before the press, trump simply left the room, saying he would see reporters again tonight for his supreme court pick announcement.last week, a draft of the executive order on cybersecurit






nss labs caws 2.2 update improves cyber threat protection platform


understanding how a potential threat will be handled by enterprise security technologies is a challenge that nss labs' cyber a nced warning system (caws) platform aims to help solve. the caws 2.2 platform debuted on jan. 24, providing new capabilities to help improve enterprise security. nss labs defines caws as a cyber threat protection platform and cyber threat impact product. caws makes use of nss labs' baitnet technology backend which crawls the internet looking for malicious web addresses and files. nss labs will then re-visit the malicious addresses and files in a virtual environment to discover how various security technologies will react to the threats. caws provides a user-interface into baitnet, giving organizations with insight into potential indicators of compromise. "caws is






americans resigned to insecurity of personal data, pew survey finds


americans have become resigned to the fact that the security of their data is beyond their control. in a study released on jan. 26, pew research found that 64 percent of americans have personally experienced a data breach, including fraudulent charges on their credit cards, received notifications that their email or social-media accounts have been ed or warned that their personal information had been exposed. as a result, 51 percent of u.s. citizens do not trust social media sites to protect their information and 49 percent do not think the government can secure their data. “people feel that they have lost control of their personal information in a lot of ways in the modern information environment,” aaron smith, ociate director of pew research, told eweek.“whether we are talking about cyb






data61 wants australia to go all-in on fintech and cybersecurity innovation


data61 has published a guide on how australia can leverage the cybersecurity and fintech talent present in the country's startup scene, highlighting in particular the need to combine the two sectors with the strong backing of both industry and government to a nce australia's global competitiveness.latest australian newsin startup secrets: how australia can create new businesses with fintech and cyber security industry collaboration, the country's peak innovation group says it is important to look at the intersection of fintech and cybersecurity to solve complex problems via collaboration, rather than by competing. according to australia's special adviser to the prime minister on cyber security alastair macgibbon, cybersecurity is the foundation of the country's information economy and simi






report: spam and cloud attacks rising, 4 steps to protect your business


image: istockp o/krulua cyber attacks via cloud-based applications and spam are on the rise this year, according to cisco's 2017 annual cybersecurity report, released tuesday.some 27% of connected third-party cloud applications introduced by employees into enterprises in 2016 posed a high security risk, the report found. more about it securityand, after dropping to their lowest level in a decade in 2015, spam attacks are on the rise once again, cisco stated. today, nearly two-thirds of emails are spam, with 8-10% marked as malicious, according to the report. spam's resurgence is due in part to the rise of large and spreading botnets, the report said. why the rise in attacks? in part, it's because enterprise security departments are growing in complexity: 65% of businesses surveyed use any






survey reveals gap in midmarket companies' true security capabilities


posted 2017-01-31 1 of survey shows gap between perception, reality in midmarket securityarctic wolf networks survey provides insights into how mid-market companies think about security and what they actually do to enforce it security.most organizations are confident in their security posturewhen asked about security posture, 95 percent of respondents indicated that they believed their organizations were above average. mid-market organizations trust perimeter security productslooking deeper into the perceptions of mid-market companies, the arctic wolf networks study asked it professional if the perimeter security products they us can combat all cyber-security threats. the majority of respondents agreed with the statement that perimeter security works, with 43 percent agreeing strongly and






enterprises won't find magic bullet against today's cyber-threats


as the annual rsa conference approaches and vendors gather to sing the praises of their security products, let's pause and reflect on some recent cyber-security news items. item: oracle released a near-record number of patches in its quarterly critical patch update: 270 in all, with 118 that are remotely exploitable in e-business suite. item: the same day, at the oracle cloudworld in new york city, ceo mark hurd told the embled attendees that the average oracle customer is 13 months behind in rolling out security patches. this is meant as a reason to switch to cloud or software-as-a-service software, which can be patched and kept up to date with the latest security fixes. but still, that's 270 flaws that had to be found and patched—for this quarter.of course, oracle and its users are not






7 email security risks you need to defend against in 2017


posted 2017-01-30 1 of email security threats to watch out for in 2017email breaches were big news during the 2016 presidential election, but it's not just senior government officials who need to protect themselves from exposure.phishing phishing attacks impersonate a legitimate company or individual and attempt to steal people's personal information or login credentials. employees and high-level executives must remain vigilant and scrutinize all emails carefully for signs of phishing. this means checking email addresses carefully and, if the email is suspicious, confirming with the supposed sender of the email.man-in-the-middle attacksin general, most employees aren't aware that "bad guys" can access their email as it travels over the internet using a man-in-the-middle (mitm) attack, only






top 10 companies hiring cybersecurity professionals


image: istockp o/leowolfert we are currently facing a global cybersecurity shortage, according to a recent report from indeed. job postings in the cybersecurity field have gone up 74% over the past five years, and a cisco report estimates that there are currently 1 million unfilled cybersecurity jobs worldwide. symantec predicts that this shortage will only grow, and that we will see 1.5 million unfilled jobs in the field by 2019.in the report, indeed examined demand for cybersecurity professionals across 10 countries. israel, ireland, the uk, the us, and germany were the top five nations with the largest shortages. more about it securitythe us faces a 33% skills shortage for crucial security roles, the report found. however, the gap appears to be slowly closing: job seeker interest in cy






techdemocracy launches intellicta security risk platform


understanding security risk across an organization is often a complex task, but a new platform announced jan. 30 by techdemocracy could make it easier. the techdemocracy intellicta platform aims to provide organizations with insight and visibility into security risks and compliance. "the intent of intellicta is to provide an end-to-end holistic view of an organization from a risk mana ent perspective," ken pfeil, chief architect at techdemocracy, told eweek. pfeil added that the intellicta platform incorporates a wide range of existing standards, including iso and nist guidelines, as well providing techdemocracy's own insights and enabling organizations to define their own policies. a core premise of the platform is to provide business-level context and insight, rather than just having te






techdemocracy launches intellicta security risk platform


understanding security risk across an organization is often a complex task, but a new platform announced jan. 30 by techdemocracy could make it easier. the techdemocracy intellicta platform aims to provide organizations with insight and visibility into security risks and compliance. "the intent of intellicta is to provide an end-to-end holistic view or an organization from a risk mana ent perspective," ken pfeil, chief architect at techdemocracy told eweek. pfeil added that the intellicta platform incorporates a wide range of existing standards including iso and nist guidelines, as well providing techdemocracy's own insights and enabling organizations to define their own policies. a core premise of the platform is to provide business-level context and insight, rather than just having tech






giuliani admits trump called to implement muslim ban legally


rudy giuliani is currently serving as donald trump’s “white house security cyber advisor,” and has been a day one supporter of the president. on sunday (jan. 29) the former new york city mayor admitted to fox news trump called him to “put a commission together, show me the right way to do it legally,” regarding the recently implemented muslim ban.read: rudy giuliani on donald trump: “men at times talk like that”the executive order will bar refugee entry from syria indefinitely, and all travel from iran, iraq, libya, somalia, sudan and yemen will be on hold for 90 days. fox news host jeanine pirro questioned whether or not the ban had anything to do with the muslim religion.“i’ll tell you the whole history of it. so when [trump] first announced it, he said, ‘muslim ban.’ he called me up. he






reported treason arrests fuel russian ing intrigue


moscow — in the days since it emerged that four men had been arrested on treason charges linked to cyber intelligence and russia's domestic security agency, conspiracy theories and speculation about the case have swept through moscow.was it some fallout from the alleged russian ing of the u.s. presidential election? were they part of a hunt for a possible mole who tipped off american intelligence agencies? was it a power struggle within russia's security services?specifics of the case are murky, and no russian government officials have commented publicly. russian media have been filled with lurid, often contradictory, details that most ume are leaked by warring factions of intelligence officers.linking the arrests to the u.s. vote would mean joining the dots between a series of shadowy act






reported treason arrests fuel russian ing intrigue


moscow (ap) — in the days since it emerged that four men had been arrested on treason charges linked to cyber intelligence and russia’s domestic security agency, conspiracy theories and speculation about the case have swept through moscow.was it some fallout from the alleged russian ing of the u.s. presidential election? were they part of a hunt for a possible mole who tipped off american intelligence agencies? was it a power struggle within russia’s security services?specifics of the case are murky, and no russian government officials have commented publicly. russian media have been filled with lurid, often contradictory, details that most ume are leaked by warring factions of intelligence officers.linking the arrests to the u.s. vote would mean joining the dots between a series of shadow






russian cyber spies detained on treason charges accused of p ing secrets to cia,


please confirm your details below. already have an account? sign in. {* #registrationform *} {* firstname *} {* lastname *} {* emailaddress *} {* displayname *} {* newp word *} {* newp wordconfirm *} postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. the information below will be used to optimize the content and make ads across the network more relevant to you. you can always change the information you share with us by editing your profile.birthdate{* birthdate *}gender{* gender *}attention print newspaper subscribersfor verification of print subscriber offers (e.g. epaper, digital access, subscriber rewards), please input your print newspaper subscription phone number and postal code. {* phone *} {* addressposta






trump to sign yet another trash executive order, this time on 'the cyber' / boin


'president' donald trump is expected to sign an executive order addressing cybersecurity today, reuters reports in an item that cites "two sources familiar with the situation.” the eo is expected to be trump's first action to address what he called a top priority of his administration during the presidential paign.report this ad “the order is expected to commission several different reviews of the government's offensive and defensive cyber capabilities,” reuters says, citing those sources and a third who was “briefed on a draft of the order that circulated last week.” u.s. president donald trump signs an executive order cutting regulations, accompanied by small business leaders at the oval office of the white house in washington u.s., january 30, 2017. reuters/carlos barria from reuters:






trump to sign yet another trash executive order, this time on 'the cyber' / boin


'president' donald trump is expected to sign an executive order addressing cybersecurity today, reuters reports in an item that cites "two sources familiar with the situation.” the eo is expected to be trump's first action to address what he called a top priority of his administration during the presidential paign.report this ad “the order is expected to commission several different reviews of the government's offensive and defensive cyber capabilities,” reuters says, citing those sources and a third who was “briefed on a draft of the order that circulated last week.” u.s. president donald trump signs an executive order cutting regulations, accompanied by small business leaders at the oval office of the white house in washington u.s., january 30, 2017. reuters/carlos barria from reuters:






forescout technologies filed confidentially for ipo


foresscout has filed confidentially for an ipo, techcrunch has confirmed. the security company has submitted its s-1 and will be unveiling it to the public closer to its debut.the ipo is likely to happen in the next few months, with an exact date yet-to-be-determined. the jobs act from 2012 made it so that the companies could work on revisions to their filings without public scrutiny.it has been rumored for a while that forescout has been considering an ipo, but the filing shows that that they are serious about moving forward with the process.a “unicorn,” forescout’s last private round valued the company at $1 billion. the company says they have raised over $158 million since it was founded in 2000. investors include accel partners, meritech capital partners and pitango venture capital.the






paypal q4 solid, revenue up 17 percent


paypal delivered solid fourth quarter and fiscal year financials after the bell thursday.what's on zdnetthe san jose, calif.-based payments company reported a net income of $390 million, or 32 cents per share.non-gaap earnings were 42 cents per share on revenue of $2.98 billion, up 17 percent year over year.wall street was looking for earnings of 42 cents per share on revenue of $2.98 billion.for the year, paypal brought in $10.84 billion in revenue on non-gaap earnings of $1.15 per share.paypal says it processed $99 billion in total payment volume (tpv) during the fourth quarter and $354 in tpv for the fiscal year. the company says it added 18 million new customers in 2016, ending the year with 197 million active customer accounts.venmo, the company's social payments platform, processed $






trump to sign order strengthening cybersecurity


washington — president donald trump is planning to sign an executive order aimed at improving the government's ability to protect its computer networks and fend off ers.the move puts the head of the office of mana ent and budget in charge of cybersecurity efforts within the executive branch and directs federal agency directors to develop their own plans to modernize their infrastructure.such a review has become a familiar move for an incoming administration wanting to put its own stamp on cybersecurity. but this year, the push follows allegations of election-season ing by the russian government.u.s. intelligence officials have told trump that moscow tried to influence voters by ing democratic emails and trolling social media sites. trump has sought to downplay the role russia played in the






trump sets 5-year and lifetime lobbying ban for officials


president donald trump acted urday to fulfill a key portion of his pledge to "drain the swamp" in washington, banning administration officials from ever lobbying the u.s. on behalf of a foreign government and imposing a separate five-year ban on other lobbying.administration officials described the bans as historic in scope. but it was not immediately clear how either one would be enforced.trump has said individuals who want to aid him in his quest to "make america great again" should focus on the jobs they will be doing to help the american people, and not thinking about the future income they could rake in by peddling their influence after serving in government."most of the people standing behind me will not be able to go to work," trump joked, referring to an array of white house offici






trump sets lobbying bans for officials


by darlene supervillewashington (ap) — president donald trump acted urday to fulfill a key portion of his pledge to “drain the swamp” in washington, banning administration officials from ever lobbying the u.s. on behalf of a foreign government and imposing a separate five-year ban on other lobbying.administration officials described the bans as historic in scope. but it was not immediately clear how either one would be enforced.trump has said individuals who want to aid him in his quest to “make america great again” should focus on the jobs they will be doing to help the american people, and not thinking about the future income they could rake in by peddling their influence after serving in government.“most of the people standing behind me will not be able to go to work,” trump joked, refe






trump sets 5-year and lifetime lobbying ban for officials – the denver post


by darlene supervillewashington (ap) — president donald trump acted urday to fulfill a key portion of his pledge to “drain the swamp” in washington, banning administration officials from ever lobbying the u.s. on behalf of a foreign government and imposing a separate five-year ban on other lobbying.administration officials described the bans as historic in scope. but it was not immediately clear how either one would be enforced.trump has said individuals who want to aid him in his quest to “make america great again” should focus on the jobs they will be doing to help the american people, and not thinking about the future income they could rake in by peddling their influence after serving in government.“most of the people standing behind me will not be able to go to work,” trump joked, refe






trump to sign order strengthening cybersecurity


washington (ap) — president donald trump is planning to sign an executive order aimed at improving the government’s ability to protect its computer networks and fend off ers.the move puts the head of the office of mana ent and budget in charge of cybersecurity efforts within the executive branch and directs federal agency directors to develop their own plans to modernize their infrastructure.such a review has become a familiar move for an incoming administration wanting to put its own stamp on cybersecurity. but this year, the push follows allegations of election-season ing by the russian government.u.s. intelligence officials have told trump that moscow tried to influence voters by ing democratic emails and trolling social media sites. trump has sought to downplay the role russia played i






necesito 31 semanas para ver todas las series que quiero ver en 2017


en 1986 se produjeron en torno a 50 series. en 2006 el número había subido a 192. en 2006 hubo 455 series. sólo en estados unidos. a eso hay que sumarle todas las series producidas en españa, las siempre prestigiosas series inglesas, la revolucionaria ficción televisiva nórdica, el anime japonés... muchas series, demasiadas series y además cada vez es más fácil acceder a ellas a través de internet.lo que hace tan sólo unos años era sólo un sueño ahora mismo se ha convertido en realidad... y casi en pesadilla. porque seamos sinceros, no nos da la vida para tanta serie. drama. first world problem que diría un cínico pero problema al fin y al cabo.de megaupload a netflixlejos quedan los tiempos en los que sólo tenías dos opciones para acceder a tus series internacionales favoritas: o esperar






necesito 31 semanas para ver todas las series que quiero ver en 2017


en 1986 se produjeron en torno a 50 series. en 2006 el número había subido a 192. en 2016 hubo 455 series. sólo en estados unidos. a eso hay que sumarle todas las series producidas en españa, las siempre prestigiosas series inglesas, la revolucionaria ficción televisiva nórdica, el anime japonés... muchas series, demasiadas series y además cada vez es más fácil acceder a ellas a través de internet.lo que hace tan sólo unos años era sólo un sueño ahora mismo se ha convertido en realidad... y casi en pesadilla. porque seamos sinceros, no nos da la vida para tanta serie. drama. first world problem que diría un cínico pero problema al fin y al cabo.de megaupload a netflixlejos quedan los tiempos en los que sólo tenías dos opciones para acceder a tus series internacionales favoritas: o esperar






trump sets 5-year and lifetime lobbying ban for officials


washington (ap) — president donald trump acted urday to fulfill a key portion of his pledge to “drain the swamp” in washington, banning administration officials from ever lobbying the u.s. on behalf of a foreign government and imposing a separate five-year ban on other lobbying.administration officials described the bans as historic in scope. but it was not immediately clear how either one would be enforced.trump has said individuals who want to aid him in his quest to “make america great again” should focus on the jobs they will be doing to help the american people, and not thinking about the future income they could rake in by peddling their influence after serving in government.“most of the people standing behind me will not be able to go to work,” trump joked, referring to an array of






trump’s draft cybersecurity order raises policy questions


president trump is expected to sign an executive order today on cybersecurity that will commission a review of the federal government’s capabilities and defenses, similar to reviews ordered by obama when he took office and again last year.a draft of the order, obtained by the washington post, summarizes review measures trump wants federal agencies to take and raises more questions about his policy on cybersecurity than it answers.although the document offers a definition of critical infrastructure, it does not mention voting systems and it’s unclear if the new administration will honor former department of homeland security secretary jeh johnson’s cl ification of election systems as critical infrastructure. trump questioned intelligence community reports that the russian government ordered






trump’s draft cybersecurity order raises policy questions


president trump is expected to sign an executive order today on cybersecurity that will commission a review of the federal government’s capabilities and defenses, similar to reviews ordered by obama when he took office and again last year.a draft of the order, obtained by the washington post, summarizes review measures trump wants federal agencies to take and raises more questions about his policy on cybersecurity than it answers.although the document offers a definition of critical infrastructure, it does not mention voting systems and it’s unclear if the new administration will honor former department of homeland security secretary jeh johnson’s cl ification of election systems as critical infrastructure. trump questioned intelligence community reports that the russian government ordered






ers launch major attack against paypal users


ers have launched a major attack against paypal users that’s meant to trick the company’s customers into providing information that could end up costing them money and their identity.the internet security company eset says that ers have designed fairly slick malicious email that ask paypal users to provide their credentials to continue getting access to their accounts. customers who do so are diverted to a different website that tries to coerce consumers into giving up more private information, including their social security number. ers used a similar email “phishing” paign to steal information from people with gmail and yahoo accounts.“we’ve seen these for years but this one is particularly well done, it’s quite convincing in the way it uses the language and the imagery of paypal”, said






facebook challenges email for control of your online identity


getting locked out of your account s. almost everyone has experienced the frustration of forgetting a p word, losing the phone on which they receive two-factor authentication codes, or jumbling the answer to a security question.but as exasperating as it is to lose access to your account, none of the widely-available measures for account recovery are very secure. major breaches like the recently-disclosed yahoo s often include not only p words but also answers to security questions, which ers can recycle across other sites to compromise your accounts. many sites will respond to a lost p word report by sending a recovery link to the user’s email, which could itself be compromised.facebook wants to fix the process of account recovery — and replace email as the hub of online identity mana ent






microsoft reports some pdf documents hiding phishing s s


yahoo topped record list of data breaches in 2016, report findsnews analysis: yahoo, others make 2016 a record year for data breaches, report finds; facebook... hpi recalls 101,000 notebook pcs with defective batteriesdaily video: hpi has samsung-like problem: overheating batteries; iphone production volume slid 11.5... linkedin executive kevin scott named microsoft ctodaily video: microsoft promotes linkedin's kevin scott to cto; google says new chromebook models to... samsung says battery manufacturing flaws caused galaxy note7 firesdaily video: samsung reveals cause of galaxy note7 battery fires, explosions; apple latest to 'pile... linkedin brings mobile experience to social network desktop uidaily video: linkedin adding mobile look to social network desktop experience; avaya bankruptc






how to avoid fake apps and keep your online data private


urday, jan. 28, is international data privacy day, a project of the national cyber security alliance. the idea is to draw attention to all the personal information you own, be sure you know where's it all located and how secure it is (or isn't), and to know what you're doing when you a new app. virtually all apps for ask the user for permissions to record and use items such as location, contact lists, use of a era and so on. the longer the list of "permissions," the more skeptical a er should be about the purposes of an app. for example, if an app that offers free wallpaper for your smartphone also asks for a list of your friends or use of your era, then something is amiss, and you probably ought to skip it. there is also a big problem now with fake apps--apps that are simply fronts for m






the new a-team: agile teams of machines


sylvester kaczmarekcrunch network contributorsylvester kaczmarek is an award-winning entrepreneur and product leader with more than a decade of international, quality-driven it industry experience. how to join the networkone of the most popular shows on television 30 years ago was “the a-team” — the story of five rogue military commandos who teamed together to form an elite fighting unit. now, a generation later, darpa and the u.s. military are in search of a new “a-team” — only this team won’t be comprised of just humans, it will include a few machines, as well.a-team refers to “agile team,” which darpa refers to as hybrid teams of humans teamed with intelligent machines. what darpa recognizes is that intelligent machines are not just “agents” carrying out the simple commands of humans, b






trump’s draft cybersecurity order raises policy questions


president trump is expected to sign an executive order today on cybersecurity that will commission a review of the federal government’s capabilities and defenses, similar to reviews ordered by obama when he took office and again last year.a white house official acknowledged the similarities between trump’s order and the obama administration’s previous work during a briefing. “the changes are in mana ent philosophy, in enterprise risk mana ent, and modernizing federal it. not that that’s something previous presidents haven’t tried, but president trump has a plan for accomplishing it,” the official said.a draft of the order, obtained by the washington post, summarizes review measures trump wants federal agencies to take and raises more questions about his policy on cybersecurity than it answ






trump’s draft cybersecurity order raises policy questions


president trump cancelled the signing of an executive order on cybersecurity without explanation, per pool reports. trump had been expected to sign the order today to commission a review of the federal government’s capabilities and defenses, similar to reviews ordered by obama when he took office and again last year.a white house official acknowledged the similarities between trump’s order and the obama administration’s previous work during a briefing. “the changes are in mana ent philosophy, in enterprise risk mana ent, and modernizing federal it. not that that’s something previous presidents haven’t tried, but president trump has a plan for accomplishing it,” the official said.a draft of the order, obtained by the washington post, summarizes review measures trump wants federal agencies t






government leases high-security space from foreign owners


rep. jason chaffetz, r-utah.(p o: chip somodevilla, getty images)washington — the federal government is leasing some high-security office space for the fbi, drug enforcement administration and other agencies from foreign owners in 20 buildings around the country, raising concerns about the risk to sensitive information, a government review concluded.the government accountability office also found that reliable ownership information was not readily available for property ociated with about a third of government’s 1,406 high-security leases.in cases where ownership could be identified, some of the space was controlled by firms based in china, israel, japan, south korea and canada, according to the review. six fbi field offices and three dea field divisions are housed in space owned by foreig






microsoft warns of emails bearing sneaky pdf phishing s s


on the heels of a disturbingly convincing gmail phishing s , microsoft is warning email users of other crafty schemes, this time involving pdf attachments. pdf, short for the portable document format pioneered by adobe, is a popular method of distributing content online. cyber-attackers are banking on its ubiquity, particularly in the workplace, to ensnare office workers. the latest phishing attempts may slip through an antivirus software's defenses. "unlike in other spam paigns, the pdf attachments we are seeing in these phishing attacks do not contain malware or exploit code," blogged alden asdoro, microsoft malware protection center team member. "instead, they rely on social engineering to lead you on to phishing pages, where you are then asked to divulge sensitive information," conti






questions multiply over strategist stephen bannon’s role in trump administration


by karen deyoung, the washington postpresident donald trump’s elevation of his chief political strategist to a major role in national security policy, and a white house order banning refugees from certain muslim-majority countries from u.s. entry, appeared to come together as cause and effect over the weekend.stephen bannon – whose nationalist convictions and hard-line oppositional view of globalism have long guided trump – was directly involved in shaping the controversial immigration mandate, according to several people familiar with the drafting who requested anonymity because they were not authorized to speak publicly.the order, which has ignited sweeping domestic and international backlash, e without the formal input of trump’s national security council, the committee of top national






government leases high-security space from foreign owners


rep. jason chaffetz, r-utah.(p o: chip somodevilla, getty images) 4 connectlinkedinemailmorewashington — the federal government is leasing some high-security office space for the fbi, drug enforcement administration and other agencies from foreign owners in 20 buildings around the country, raising concerns about the risk to sensitive information, a government review concluded.the government accountability office also found that reliable ownership information was not readily available for property ociated with about a third of government’s 1,406 high-security leases.in cases where ownership could be identified, some of the space was controlled by firms based in china, israel, japan, south korea and canada, according to the review. six fbi field offices and three dea field divisions are hous






these ers set a 't ' for security researchers probing their malware


the attack uses an usual 'nested' approach. image: getty images/istockp o security researchers have identified a ing paign seemingly targeted at nato members, which employs a sophisticated method to infect victims and lays a t for those investigating it.the researchers said the attack, in the form of a malicious word document, is unusual in that it attempts to avoid analysis and uses a non-embedded flash payload. governments and nation states are now officially training for cyberwarfare: an inside look europe, canada, usa, australia, and others are now running training exercises to prepare for the outbreak of cyberwar. locked shields is the largest simulation and techrepublic takes you inside.this document is titled 'nato secretary meeting' and the text mentions ukraine, leading the resea