James Comey: FBI Faces Deep Tech-Related Questions
Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age. READ MORE HERE…
Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age. READ MORE HERE…
The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote. READ MORE HERE…
The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors. READ MORE HERE…
Researchers have discovered a set of custom surveillanceware tools being deployed against Android and iOS devices primarily in the Middle East. READ MORE HERE…
Sources said the funds were diverted to fraudulent accounts in a coordinated heist that involved hundreds of wire transfers and on-the-ground accomplices. READ MORE HERE…
The actors behind this kind of code, whether they’re bent on sending a political message or simply wanting to cover their tracks after data exfiltration, have adopted various techniques to carry out those activities. READ MORE HERE…
The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack. Read More HERE…
Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million. Read More HERE…
Secure-messaging firm Signal was told by Amazon not to use its AWS servers for domain-fronting, a technique used to enable communications in countries such as Egypt, Oman, Qatar and UAE where the service is banned. Read More HERE…