AUTHOR ARCHIVES

Results 11-20 of 252

Hackers Plunder Cryptocurrency Exchange and Car Insurance Data

July 10, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: School Board Association Suffers Data Breach Employees of a Texas school board association late last month had their personal information compromised in what appears to be a data breach that inadvertently posted their...

Hackers Take Aim at County Website, Europe and U.K. Parliament

July 3, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Hackers Deface LA County Website with Pro-ISIS Messages Hackers this week defaced a Los Angeles County government website, posting what seem to be pro-ISIS messages, ABC7 reports. The county joins a string of...

Kaspersky: Stop Russian to Judgment on Our Products

June 30, 2017 FROM NEXTGOV arrow The Russian anti-virus magnate Eugene Kaspersky shot back Friday after a Senate committee urged banning his company’s products from U.S. Defense Department servers because of alleged ties to the Russian government. The move, Kaspersky charged, amounted to “allegations, ungrounded speculation and all sorts of other made-up things” driven by broader...

Ransomware Stops Car Factory, Phones Spy on Activists and 198M Voters' Info Leak

June 26, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: WannaCry Ransomware Stops Honda Manufacturing Plant The global WannaCry ransomware outbreak forced Honda to hit the brakes at one of its vehicle production plants. Honda Motor Company announced Wednesday it stopped production Monday...

Lawmakers: How Many Cyber Threat Centers Does the Government Need?

June 23, 2017 FROM NEXTGOV arrow The Health and Human Services Department’s cyber threat sharing center hasn’t reached initial operating capacity yet, but a pair of senators already wonder if it’s a redundant effort. “It’s not clear that this new [HHS] cyber center is necessary or that it adds value,” Sen. Claire McCaskill, D-Mo., said at...

Hackers Steal Info on 1M Survey Participants, Target Microsoft Operating Systems and Online Shoppers

June 19, 2017 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: 1M Survey Participants' Info Stolen in Washington State University Safe Theft A burglar made off with a USB drive with the sensitive information of about 1 million Washington State University survey participants, though...

Lawmakers Question Cuts to Federal Retirement Plans and Allowing Ringless Voicemails

June 16, 2017 FROM NEXTGOV arrow House Democrats—100 of them—wrote a letter to House leadership with concerns about the proposed cuts to federal employee retirement plans that include upping contributions and eliminating cost-of-living adjustments. “We should not alter policies that families have planned their lives around, particularly when it affects current retirees with limited ability to...

Hackers Attack Al Jazeera and Find Ways into Subaru's Connected Car App

June 12, 2017 FROM NEXTGOV arrow The National Security Agency wasn't the only one dealing with leaks last week. Here's a roundup of cyber incidents from Nextgov's Threatwatch. Al Jazeera Media Under 'Systematic and Continual' Cyberattack Al Jazeera Media Network platforms remain operational despite “undergoing systematic and continual hacking attempts,” the company said Thursday. The network...

Lawmakers Ponder New Oversight Chairman, Russian Compounds and Texas-less SXSW

June 9, 2017 FROM NEXTGOV arrow The House Republican Steering Committee announced its choice for a new chairman of the House Oversight and Governmental Affairs Committee: Rep. Trey Gowdy, R-S.C. Gowdy previously served as chairman of the House select committee on the Benghazi attacks in Libya and would replace the former chair, Rep. Jason Chaffetz, R-Utah,...

Automated Cybersecurity: Removing Humans from the Equation

June 8, 2017 FROM NEXTGOV arrow What if software was secure from the get-go? The traditional approach to securing software doesn’t focus on rooting out vulnerabilities during the design phase. Instead, vendors must play a cat-and-mouse patching game with hackers who discover and exploit those vulnerabilities, while organizations and people are using their software. This creates...