5 things to remember during Tuesday’s hearing pitting Apple against the FBI
Apple and the U.S. Department of Justice will argue in court Tuesday about whether a judge should require the tech giant help the FBI unlock an iPhone used by the San Bernardino, California, mass shooter. The hearing, before Magistrate Judge Sher Pym of U.S. District Court for the Central District of California, is the end […] more…Crypto battle presents ‘hard choices,’ says federal CIO
The clash between the FBI and Apple over opening up a terrorist killer’s locked iPhone presents a hard choice between compelling arguments, according to Federal CIO Tony Scott. “It’s a really hard, hard topic,” he said. “I could make an argument on both sides. Strong encryption is important and a backdoor might be a problem,” […] more…5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines
In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples. “We’re attacked about every 7 seconds, 24 hours a day,” says John Halamka, CIO of the Boston hospital Beth Israel Deaconess. And the strikes come from everywhere: “It’s hacktivists, organized crime, cyberterrorists, MIT students,” he says. Tags: Security more…Apple fires back: “Government is adept at devising new surveillance techniques”
In its final court filing before oral arguments scheduled for next week, Apple argued that the government’s interpretation of an obscure 18th-Century law goes too far, and it should not be able to authorize the forced creation of a customized iOS firmware to aid in the opening of a seized iPhone linked to a 2015 […] more…Defense Dept. wants your help in imagining the worst
Uncle Sam wants your brain power, technical expertise and imagination to help defend the U.S. No enlistment required. The Department of Defense says it needs to understand how everyday objects and available technologies can be used by terrorists. The range of technologies is so vast that the military’s main scientific agency, the Defense Advanced Research […] more…All your creds are belong to us
Download the full report (PDF) With astonishing annual revenues of over a hundred billion dollars, the gaming industry has in the past been compared to Hollywood’s burgeoning business, repeatedly demonstrating the influence behind its ever expanding and loyal fan base. Having an endless list of “big hit” video-games coexisting peacefully with humble but still fun-filled […] more…“All your creds are belong to us”
Download the full report (PDF) With astonishing annual revenues of over a hundred billion dollars, the gaming industry has in the past been compared to Hollywood’s burgeoning business, repeatedly demonstrating the influence behind its ever expanding and loyal fan base. Having an endless list of “big hit” video-games coexisting peacefully with humble but still fun-filled […] more…Former cyber czar says NSA could crack the San Bernadino shooter’s phone
Another former national security official has spoken out forcefully against the FBI’s quest to get Apple to write code to unlock the iPhone 5c used by San Bernardino mass shooter Syed Farook. Richard Clarke served as the National Security Council’s chief counter-terrorism advisor to three presidents (George H.W. Bush, Bill Clinton, and George W. Bush) […] more…Scientists Search for Signatures of Alien Life Hidden in Gas
Huddled in a coffee shop one drizzly Seattle morning six years ago, the astrobiologist Shawn Domagal-Goldman stared blankly at his laptop screen, paralyzed. He had been running a simulation of an evolving planet, when suddenly oxygen started accumulating in the virtual planet’s atmosphere. Up the concentration ticked, from 0 to 5 to 10 percent. “Is […] more…Feds fire back on San Bernardino iPhone, noting that Apple has accommodated China
As expected, federal prosecutors filed their formal response on Thursday in the ongoing case involving the seized iPhone 5C that was used by one of the shooters in the San Bernardino terrorist attack in December 2015. Tags: Industry News more…ISIS Data Breach Identifies 22,000 Members
As Snowden taught the NSA, a single insider can obliterate the data security of even the most secretive organizations. Now ISIS may have sprung a Snowden-sized leak of its own, one that could give security agencies fighting the brutal terrorist group some highly useful intelligence. Tags: Security more…FBI Sets Off Snowden’s BS Detector
The buzz surrounding the FBI’s lawsuit to compel Apple to help it unlock an iPhone used by one of the San Bernardino terrorists increased on Tuesday, when NSA whistleblower Edward Snowden dismissed the agency’s stance as “bullsh*t.” He made the remark during a video conversation with Malkia Cyril, executive director of the Center for Media […] more…US Argues for ‘Modest’ Apple Help in Attacks Probe
The Justice Department argued Thursday that compelling Apple to help unlock an iPhone in California is a modest demand which may turn up evidence of a terrorist attack. read more more…Nations ranked on their vulnerability to cyberattacks
Some nations are better prepared than others to deal with damaging cyberattacks from criminals, terrorists and rogue nations. Data experts have ranked the vulnerability of 44 nations to cyberattacks. The United States ranked 11th safest, while several Scandinavian countries (Denmark, Norway and Finland) ranked the safest. China, India, Russia, Saudi Arabia and South Korea ranked […] more…DOJ appeals New York court order in favor of Apple
The U.S. Department of Justice has appealed an order by a court in New York that turned down its request that Apple should be compelled to extract data from the iPhone 5s of an alleged drug dealer. The case in New York is seen as having a bearing on another high-profile case in California where […] more…Salesforce encryption platform Shield gets expanded event monitoring services
With transaction security, IT administrators have the ability to interrupt user actions in real-time and instantly restrict access if they suspect questionable behavior. more…More information
- ANGEL to be unavailable from 5 – 7 am ET on Wednesday, 6/21
- Travelex Says Financially Unaffected by Hacking
- Oregon Man Pleads Guilty to Hacking Celebrity Email Accounts
- Clearview Stole My Face and the EU Can’t Do Anything About It
- Royal Mail malware attack distributed via email
- New Crypto-Ransomware JIGSAW Plays Nasty Games
- Privacy Watchdogs Warn Facebook Over Libra Currency
- Resolved: Sites Alert
- Takeaways From the Shopify Hack
- Microsoft’s crusade against malware advances to Kuwait, Algeria