Home » Entries posted by Flash Critic
Stories written by Flash Critic

NATO’s largest cyber defence exercise: Cyber Coalition 16

Read More

The global push for cyber sovereignty Is the beginning of cyber fascism

Earlier this month, as much of the world’s attention was elsewhere, the Chinese government announced their new cybersecurity law. While the new law was ostensibly adopted to increase security, a range of features have been criticized by human rights and multinational groups alike. Indicative of China’s push for cyber sovereignty — the complete government control of the internet within their borders — the law requires (among other things) network operators to disclose the identities of users and corporations to adhere to data residence requirements, including potentially turning over source code…

Silencing the Messenger: Communication Apps Under Pressure

Internet freedom has declined for the sixth consecutive year, with more governments than ever before targeting social media and communication apps as a means of halting the rapid dissemination of information, particularly during anti-government protests. Public-facing social media platforms like Facebook and Twitter have been subject to growing censorship for several years, but in a new trend, governments increasingly target voice communication and messaging apps such as WhatsApp and Telegram. These services are able to spread information and connect users quickly and securely, making it more difficult for authorities to control…

The Cyber Threat: Congress should investigate failed Obama cyber policies and Russian hacking

The Cyber Threat: Congress should investigate failed Obama cyber policies and Russian hacking

By Bill Gertz 
  President Obama, under pressure from Congress, has directed U.S. intelligence agencies to conduct a deep-dive inquiry into Russian cyber attacks and their impact on the 2016 presidential election and to provide the results before Inauguration Day. 
  Any intelligence review should coincide with a companion investigation by Congress into why the president and his White House advisers for the past eight years rejected numerous calls from military, intelligence, and national security advisers to take aggressive action against states like Russia and China—action that could have prevented the kind…

Pentagon links Chinese cyber security firm to Beijing spy service

A Chinese cyber security firm is covertly working with Beijing’s Ministry of State Security intelligence service in conducting cyber espionage operations, according to Pentagon intelligence officials. The company known as Boyusec, officially the Bo Yu Guangzhou Information Technology Co., is also working with China’s global telecommunications company Huawei Technologies, which has been identified by U.S. intelligence agencies as linked to the Chinese military. According to an internal report by the Pentagon’s Joint Staff J-2 intelligence directorate, Boyusec and Huawei are working together to produce security products that will be loaded into Chinese-manufactured…

FBI, Pentagon counterspies hunt fraudulent Navy contractor

Counterintelligence agents from the FBI and Pentagon are pursuing a suspected foreign agent posing as a Navy officer who offered fraudulent contracts to defense contractors in a bid to obtain sensitive and embargoed American technology. The FBI on Wednesday sent a security alert about the scam uncovered recently by a contractor in Massachusetts to contractors engaged in secret defense work. An FBI counterintelligence agent stated in the alert that the contractor reported “an individual posing as U.S. Navy officer” was issuing fake Navy contracts for computer and telecommunications equipment. Full story…
The Washington…

Cyber security, nuclear modernization top Trump defense priorities

President-elect Donald Trump’s national security priorities are modernizing the aging U.S. nuclear arsenal and securing critical infrastructure from cyber attacks. According to Greatagain.gov, the presidential transition website opened Thursday, Trump also appears to have shifted rhetoric on terrorism. During the campaign, Trump loudly proclaimed radical Islam to be the key driver of terrorism. The transition website, however, refers only to “radical ideologies” as the inspiration behind the long-term threat of terrorism. Trump criticized the Obama administration during the campaign for its failure to use the term radical Islam in countering Muslim terrorism…

Securing ‘The Internet of Things’

The Department of Homeland Security issued a report this week outlining ways the Internet of Things can be made more secure. The Internet of Things, or IoT, includes millions of networked devices ranging from video cameras to television digital video recorders all connected to the internet. Unlike computers and handheld devices, most IoT devices lack security and can be easily hacked. Evidence surfaced last month of a major IoT hack of the domain name service company Dyn, which suffered a multiple-wave cyberattack that temporarily shut down its servers during a massive denial-of-service…

Page 1 of 133123Next ›Last »