Navy SEALs to Shift From Counterterrorism to Global Threats
Navy SEAL platoons are beefing up capabilities in cyber and electronic warfare and unmanned systems, honing their skills to collect intelligence read more more…Canada-EU counter-terror data exchange is illegal, says top EU judge
An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said. That’s because parts of the draft agreement are incompatible with EU citizens’ fundamental privacy rights, according to Paolo Mengozzi, Advocate General of the […] more…Dutch Deputy National Coordinator for Security and Counterterrorism to Deliver Welcome Address at #HITB2016AMS
Amsterdam – 24 May 2016: On the 26th of May, the 7th Annual HITB Security Conference in The Netherlands will kick off with a Welcome Address by Patricia M. Zorko, MPA – The Netherlands Deputy National Coordinator for Security and Counterterrorism and Director Cyber Security. Held at the NH Grand Krasnapolsky in Amsterdam, Ms Zorko’s […] more…Belgium’s Nuclear Plants Face Threat of Cyber-attack: EU Counter-terror Chief
Belgium’s network of nuclear power plants and other major infrastructure face the threat of a cyber-attack over the next five years, the European Union’s counter-terror chief said in an interview published Saturday. read more Incoming search termshimalaya teersoling teerjuawi teershling terdeunoposte18steer solingtir selongteer cuanter com bormaBharma teercounterwww sultan Khan teer counter com more…China Adopts First Counter-Terrorism Law
Draft Legislation Could Require Tech Firms to Install Backdoors in Products or Turn Over Encryption Keys to Beijing China adopted its first counter-terrorism law Sunday after early drafts of the bill attracted strong criticism for provisions that may tighten media controls and threaten the intellectual property of foreign firms. read more more…How Rickrolling is hindering counter-terrorism
Launching DoS and Rick Astley attacks at IS sites may be good for the lulz, but it’s also harming efforts to infiltrate and monitor terrorists, say experts. more…Counterterrorism expert wants to arm US companies with hack-back capabilities
Deputizing for-profit companies to give out cyberwarrants and trusting that they have the capability to even determine the source of a cyberattack: Bad idea, good idea? more…Counterterrorism expert says it’s time to give companies offensive cybercapabilities
The U.S. government should deputize private companies to strike back against cyberattackers as a way to discourage widespread threats against the nation’s businesses, a former government official says. Many U.S. businesses have limited options for defending their IP networks, and the nation needs to develop more “aggressive” capabilities to discourage cyberattacks, said Juan Zarate, the […] more…Microsoft, NYPD develop counterterrorism and crime prevention system
Microsoft and the New York Police Department (NYPD) have jointly developed a counterterrorism and crime prevention system that will for example notify about suspicious packages and vehicles, and allow NYPD personnel to search for suspects using technologies like smart cameras and license plate readers. read more more…‘Slingshot’ Is U.S. Government Operation Targeting Terrorists: Report
The Slingshot cyber espionage campaign exposed recently by Kaspersky Lab is a U.S. government operation targeting members of terrorist organizations, according to a media report. Earlier this month, Kaspersky published a report detailing the activities of a threat actor targeting entities in the Middle East and Africa — sometimes by hacking into their Mikrotik routers. […] more…‘Slingshot’ Campaign Outed by Kaspersky is U.S. Operation Targeting Terrorists: Report
The Slingshot cyber espionage campaign exposed recently by Kaspersky Lab is a U.S. government operation targeting members of terrorist organizations, according to a media report. Earlier this month, Kaspersky published a report detailing the activities of a threat actor targeting entities in the Middle East and Africa — sometimes by hacking into their Mikrotik routers. […] more…Terrorists are winning the digital arms race, experts say
Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said. Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob […] more…Spy chief: US should use all tools to counter Russian hacking
The U.S. government should consider a broad range of retaliations against Russia for its attempts to interfere with November’s presidential election, the outgoing director of national intelligence recommended. The default response to cyberattacks shouldn’t necessarily be a cyber one, intelligence director James Clapper said Thursday. “We should consider all instruments of national power,” he told a Senate […] more…Microsoft Tells UN More Can be Done to Combat Digital Terror
Microsoft told the United Nations on Wednesday that technology companies can do more to combat digital terror, but warned there was no single solution to prevent terrorists from using the web. “There is no silver bullet that will stop terrorist use of the Internet,” Microsoft’s vice president Steven Crown told a special Security Council debate […] more…French legislators want to compel companies to decrypt data, because terrorism
Legislators in France are trying to make the U.S. Federal Bureau of Investigation jealous of its French counterparts. The poor old FBI has to rely on a loosely drafted law two centuries old in its effort to compel Apple to help it unlock data held in a dead terrorist’s smartphone. In France, refusing to hand […] more…FBI Director entreats tech firms to release encrypted data used in crimes and terror
FBI Director James Comey again implored tech companies on Tuesday to comply with court orders to reveal encrypted communications that law enforcement considers vital to solving heinous crimes and stopping terrorism. “We’d like a world where people are able to comply with court orders,” Comey said in testimony before the U.S. Senate Intelligence Committee. “It’s […] more…More information
- Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products
- Many Vulnerabilities Discovered in Moxa Industrial Switches
- Fake news Facebook accounts used coronavirus to attract followers
- Hackers Used to Be Humans. Soon, AIs Will Hack Humanity
- ARM builds up security in the tiniest IoT chips
- N.Korea unveils ‘secure, homemade’ smartphone
- Apple officially axes 17-inch MacBook Pro from notebook lineup
- Apple apologizes for humans listening to Siri clips, changes policy
- North American Malware Trends: Taking a Proactive Approach to Modern Threats
- Researchers Bypass All Windows Protections by Modifying a Single Bit