Tech groups present 'Technology Sector Presidential Platform' to candidates

Tech groups present 'Technology Sector Presidential Platform' to candidates

The leaders of a group of tech industry associations asked the presidential candidates to strengthen the United States' cybersecurity posture, and attached a "Technology Sector Presidential Platform" that lays out recommendations.

Wyden plans bill opposing law enforcement hacking expansion

Wyden plans bill opposing law enforcement hacking expansion

Sen. Ron Wyden is planning to introduce legislation to reverse proposed amendments to Rule 41 within days, an aide to Sen. Wyden told SCMagazine.com.

Guccifer hacker boasts he hacked into Hillary Clinton's email server

Guccifer hacker boasts he hacked into Hillary Clinton's email server

Marcel Lehel Lazar, better known as the Romanian hacker Guccifer, has claimed in an interview with NBC News that he didn't just publicly expose U.S. presidential candidate Hillary Clinton's email address, but actually broke into her email server.

DoJ sought administrative penalties for whistleblowers

DoJ sought administrative penalties for whistleblowers

Documents declassified on Tuesday reveal that the Justice Department aggressively sought to impose administrative penalties on whistleblowers, rather than pursue criminal penalties.

Swiss defense department was victim of cyber attack

Swiss defense department was victim of cyber attack

The Swiss defense department was hit with a cyber attack.

WhatsApp shut down in Brazil affecting 100M

WhatsApp shut down in Brazil affecting 100M

A judge in Brazil ordered mobile phone operators to shutter the WhatsApp chat service for three days.

Court decisions erode Privacy Shield support

Court decisions erode Privacy Shield support

The long-besieged Privacy Shield agreement proposed by U.S. and European officials faces a new round of challenges following recent decisions by the U.S. Foreign Surveillance Intelligence Court and the Supreme Court.

Chaffetz, Cummings ask SSA for complete OIG report, pen test results

Chaffetz, Cummings ask SSA for complete OIG report, pen test results

House Oversight Committee asked SSA Acting Commissioner Carolyn Colvin to hand over the unredacted version of a penetration testing recently done at the agency.

Bernie Sanders drops DNC suit after probe confirms campaign's claims

Bernie Sanders drops DNC suit after probe confirms campaign's claims

After an investigation confirmed that data was exported during a December breach of the DNC voter file system but cleared the Sanders campaign of wrongdoing, the presidential hopeful withdrew a lawsuit it had filed against the DNC.

Unsuitable addendum: Wassenaar Arrangement

Unsuitable addendum: Wassenaar Arrangement

A contentious amendment to an international export treaty has been causing an uproar in the security communities, reports Karen Epper Hoffman.

Mich. bill would make car hacking a felony punishable by life in prison

Mich. bill would make car hacking a felony punishable by life in prison

Hacking a connected car in Michigan could warrant a life sentence behind bars if recently proposed legislation is passed into law.

Belgian minister of defence stresses investing in cyber-security

Belgian minister of defence stresses investing in cyber-security

Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.

Updated: ISIS hackers join together in 'United Cyber Caliphate', issue hit list

Updated: ISIS hackers join together in 'United Cyber Caliphate', issue hit list

Several ISIS hacking groups announced that they have joined forces to form a large hacking group.

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech

U.S. Chief Information Officer Tony Scott Tuesday hinted his office may be working to help guide federal agencies to adopt "bimodal IT."

Senate committee leaders ask OMB to update 15-year-old cyber policy

Senate committee leaders ask OMB to update 15-year-old cyber policy

In a letter to the OMB, Senate Homeland Security Committee Chairman Ron Johnson and ranking member Tom Carper asked the agency's director Shaun Donovan to complete changes to a privacy and cyber policy framework.

Trade secret anti-theft bill passes House, awaits Obama's signature

Trade secret anti-theft bill passes House, awaits Obama's signature

The U.S. House yesterday passed the Defend Trade Secrets Act of 2015, which creates a single U.S. standard for protecting companies from intellectual property theft through civil recourse against the offending parties in federal court.

RSA Summit: Gibson urges information sharing to beat ransomware

RSA Summit: Gibson urges information sharing to beat ransomware

The director of CERT UK laid out some of the problems facing UK cyber-space and outlined what cyber-security could do to help fix them.

U.S. Cyber Command closer to break from NSA

U.S. Cyber Command closer to break from NSA

A defense authorization bill could split off the U.S. Cyber Command from under the direction of U.S. Strategic Command and the NSA.

DDoS attacks still growing...and stronger, Kaspersky

DDoS attacks still growing...and stronger, Kaspersky

Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

House passes EPA in unanimous vote

House passes EPA in unanimous vote

The House Wednesday passed the Email Privacy Act (EPA) 419-0, a reformation of the aging Electronics Privacy Act (ECPA) and drew immediate praise from rights groups.

Budget approval sought for training U.S. cybersecurity troops

Budget approval sought for training U.S. cybersecurity troops

Lawmakers are requesting an addendum to a defense authorization bill to mandate specialized training for U.S. cybersecurity troops engaged in war games.

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

FBI won't reveal method used to crack iPhone, alerts Apple to iPhone, Mac flaws

The Federal Bureau of Investigation won't share the method that was used to unlock an iPhone 5c used by one of the San Bernardino shooters because the mechanism belongs to the third party who cracked the phone.

UK public approve of Investigatory Powers Bill 'in spirit'

UK public approve of Investigatory Powers Bill 'in spirit'

Though deeply unpopular in some circles, a new YouGov poll has shown broad approval for the enumeration of government surveillance powers in the Investigatory Powers Bill.

Defense to judge: Make feds disclose hacking technique in child porn case or dismiss charges

Defense to judge: Make feds disclose hacking technique in child porn case or dismiss charges

More than two months after a federal judge ruled the U.S. must privately disclose the hacking technique the FBI used to identify patrons of the child porn site Playpen, lawyers have filed a motion urging the case be dismissed if the government does not comply or drop the charges.

Smart cities still dumb enough to be hacked

Smart cities still dumb enough to be hacked

The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

Clapper: U.S. mulling ways to disclose info on Americans caught up in gov't spy net

The U.S. government is mulling ways it might disclose the number of Americans who have been caught up in government surveillance under the Prism program, set to expire in 2017.

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

Justice drops case against Apple after cracking iPhone in Brooklyn investigation

The Justice Department told a federal court that it was dropping its case against the tech giant after it received a passcode for the device from an unnamed source.

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Cybersecurity Caucus: FDA guidelines protect medical devices from hackers

Rep. James Langevin wrote an open letter to the Food and Drug Administration's (FDA) praising draft guidance that would strengthen the cybersecurity of medical devices.

Hong Kong democracy activists targeted by Poison Ivy variant

Hong Kong democracy activists targeted by Poison Ivy variant

Pro-democracy activists in Hong Kong are being targeted by a new variant of Poison Ivy, a malware package that previously hadn't seen an update in six or seven years.

SpyEye authors headed to prison

SpyEye authors headed to prison

The two men responsible for the SpyEye banking trojan, used to steal user information from financial institutions, were sentenced to a combined 24-1/2 years in prison.

Records of 93.4M Mexican voter discovered in public database

Records of 93.4M Mexican voter discovered in public database

MacKeeper Security Researcher Chris Vickery claimed to have discovered 93.4 million Mexican voter registration records.

FBI iPhone hack may have cost more than $1.3M

FBI iPhone hack may have cost more than $1.3M

Published reports are using an odd methodology in an attempt to decipher exactly how much the Federal Bureau of Investigation (FBI)paid to unlock the iPhone 5c belonging to one of the San Bernardino terrorists.

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

Industry groups call Burr-Feinstein encryption bill 'ultimately unworkable'

A coalition of industry groups representing some of the largest tech companies in Silicon Valley penned an open letter to Sen. Richard Burr (R-NC) and Sen. Dianne Feinstein (D-Calif.).

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

Judges tosses evidences in Tor child porn case; rules warrant to spy on users was void

A federal district court judge has ruled that an Eastern Virginia magistrate overstepped her authority when granting the FBI a warrant to collect data from the user of a child pornography site, because the data resided on a computer in Massachusetts, outside her jurisdiction.

Man arrested in data breach that exposed 55M Filipino voters

Man arrested in data breach that exposed 55M Filipino voters

Filipino authorities Thursday confirmed the arrest one of three people believed to be responsible for breaching the COMELEC website.

Australia's prime minister confirms Australian Bureau of Meteorology attack

Australia's prime minister confirms Australian Bureau of Meteorology attack

Australian Prime Minister Malcolm Turnbull confirmed that the Australian Bureau of Meteorology was indeed a target of a cyberattack last year.

Intelligence court affirms FBI's right to search Americans' emails without a warrant

Intelligence court affirms FBI's right to search Americans' emails without a warrant

In a declassified ruling, a federal judge of the Foreign Intelligence Surveillance Court (FISC) ruled that the FBI's search of Americans' emails without a warrant during criminal investigations is not contradictory to the Constitution or the FISA Amendments Act.

FCC set top box proposal could intrude on privacy, Americans say in DCA survey

FCC set top box proposal could intrude on privacy, Americans say in DCA survey

Americans are concerned that the FCC's Set-Top Box proposal, which will open the market to third-party vendors like Google, will compromise their privacy.

Ashley Madison class-action: plaintiffs must use real name or drop out

Ashley Madison class-action: plaintiffs must use real name or drop out

A federal judge has ruled that Ashley Madison class action plaintiffs must use their real names to continue lawsuit.

SC Congress: Are you ready for the new EU data protection regulation?

SC Congress: Are you ready for the new EU data protection regulation?

When Jamie Randall, CTO of the IASME Consortium, was asked to speak at yesterday's SC Congress Amsterdam on upcoming EU data protection regulation, he says that he, like many people, "promptly fell asleep".

CCOs fear increased liability from recent compliance changes in Washington

CCOs fear increased liability from recent compliance changes in Washington

Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.

Oculus exec says VR privacy questions will be answered 'in due time'

Oculus exec says VR privacy questions will be answered 'in due time'

Oculus exec says U.S. Senator's privacy policy questions on VR data collection will be answered "in due time."

Nine-year sentence for law firm's malicious insider

Nine-year sentence for law firm's malicious insider

A malicious insider was handed a nine-year prison sentence and a $1.7 million fine for hacking into the computer system of his former employer Locke Lord.

Senate subcomittee to discuss cybersecurity issues

Senate subcomittee to discuss cybersecurity issues

The Senate Subcommittee on Emerging Threats will meet today to hear testimony on cybersecurity issues and funding from Department of Homeland Security and U.S. Cyber Command representatives.

Hacker behind Hacking Team breach publishes how-to guide

Hacker behind Hacking Team breach publishes how-to guide

Phineas Fisher, the hacker who claimed responsibility for breaching Hacking Team last year, published a how-to guide detailing his process in executing the attack.

U.S., Russian officials to meet this week on cybersecurity issues, State Dept.

U.S., Russian officials to meet this week on cybersecurity issues, State Dept.

U.S. and Russian officials will meet this week in Geneva to discuss cybersecurity issues though not as a restart of the Bilateral Presidential Commission, a State Department official told SCMagazine.com.

Research: Over 6,000 data breaches in key industry sectors since 2005

Research: Over 6,000 data breaches in key industry sectors since 2005

The Identity Theft Resource Center (ITRC) and IDT911 said that to date, the financial services, business, education, government and healthcare industrial sectors have experienced over 6,000 data breaches since 2005.

Canada police decrypted a million BlackBerry messages

Canada police decrypted a million BlackBerry messages

The Royal Canadian Mounted Police intercepted and decrypted around one million PIN-to-PIN BlackBerry messages,

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

Cybersecurity is the greatest threat since the atom bomb, said Apple co-founder Steve Wozniak.

No useful information discovered on San Bernardino iPhone

No useful information discovered on San Bernardino iPhone

The iPhone used by Syed Rizwan Farook, one of the shooters in the San Bernardino terror attack that left 14 people dead, was not found to contain any useful information, according to reports.

Sixth Circuit appeals court: Feds don't need warrant to collect cell location data

Sixth Circuit appeals court: Feds don't need warrant to collect cell location data

A U.S. federal appeals court ruled on Wednesday that the FBI did not violate the Constitution when it collected cell site location information without a probable cause warrant, in order to track the movements of multiple robbery suspects.

Lawmakers query IRS commissioner on cyber progress

Lawmakers query IRS commissioner on cyber progress

During a House committee hearing on Thursday, legislators questioned Internal Revenue Service Commissioner John Koskinen about measures taken to improve the agency's cybersecurity methods.

GM hires lobbyists to advocate for driverless cars

GM hires lobbyists to advocate for driverless cars

Lobbying firm The Fritts Group has contracted with General Motors to advocate for the introduction of self-driving vehicles on behalf of the Detroit-based automobile manufacturer.

House subcommittee examines preparedness for electrical grid cyberattack

House subcommittee examines preparedness for electrical grid cyberattack

A House subcommittee hearing Thursday examined state and local government preparedness in case of cyberattack on the U.S. electrical grid.

Report: Feds staying mum on possible Firefox vulnerability

Report: Feds staying mum on possible Firefox vulnerability

Experts are speculating that the FBI may be closely guarding a secret vulnerability in the Firefox browser that it can exploit for future law enforcement purposes, according to a Motherboard report yesterday.

Former Reuters editor sentenced to two years for helping Anonymous

Former Reuters editor sentenced to two years for helping Anonymous

Matthew Keys, a former social media editor at Reuters, received a two-year federal prison sentence for providing his username and login credentials to a hacker associated with the hacking group

FBI efforts to break encryption go way back

FBI efforts to break encryption go way back

Well before the FBI's recent demand that Apple give up the keys to the encryption used in an iPhone 5c, the bureau engaged in a similar effort.

Regulators requested data on 12M Uber riders and drivers, transparency report shows

Regulators requested data on 12M Uber riders and drivers, transparency report shows

During the last six months of 2015, Uber received 33 requests from regulatory authorities seeking trip data on more than 12 million drivers and riders.

California ransomware bill supported by Hollywood hospital passes committee

California ransomware bill supported by Hollywood hospital passes committee

A proposed California legislation imposing specific penalties for ransomware took a step forward yesterday when the state senate's Public Safety Committee passed the bill at a hearing featuring testimony from Hollywood Presbyterian Medical Center.

California nixes smartphone decryption bill

California nixes smartphone decryption bill

Lawmakers shot down California legislation seeking to coerce smartphone decryption by imposing a $2,500 penalty.

House Judiciary Panel passes Email Privacy Act 28-0

House Judiciary Panel passes Email Privacy Act 28-0

The House Judiciary Committee today passed the Email Privacy Act (H.T.699) by a 28-0 vote, a measure that would require a warrant for accessing anyone's electronic correspondence.

Sweden's airspace shut down by Russian APT, not a solar storm

Sweden's airspace shut down by Russian APT, not a solar storm

A cyberattack launched by a Russian APT group may have jammed Sweden's air traffic control capabilities, that was initially attributed to a solar storm.

Hacked Swedish military servers used in 2013 DDoS attacks

Hacked Swedish military servers used in 2013 DDoS attacks

Swedish military servers were used by hackers to launch 2013 attacks against U.S. financial institutions, according to reports.

FDIC breach of 44,000 customers caused by storage device

FDIC breach of 44,000 customers caused by storage device

A former employee of the Federal Deposit Insurance Corp. departed the agency with a storage device that contained data and information involving 44,000 FDIC customers.

FBI, DHS launch series of briefings to raise awareness of Ukraine power grid attack

FBI, DHS launch series of briefings to raise awareness of Ukraine power grid attack

The FBI and DHS has scheduled a series of unclassified webinars and threat briefings across the U.S. addressing the 2015 cyberattack against Ukraine's power grid.

Costa Rica investigating rigged elections by political hacker

Costa Rica investigating rigged elections by political hacker

Costa Rica will be undergoing an investigation on whether or not hackers interfered with its 2014 elections.

Coalition opposes allowing NSA to share surveillance data

Coalition opposes allowing NSA to share surveillance data

Privacy groups oppose proposed changes to an executive order that would relax limitations on the NSA in sharing surveilled communications information with other agencies.

DHS issues three advisories warning of vulnerabilities in Industrial Control Systems

DHS issues three advisories warning of vulnerabilities in Industrial Control Systems

The DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, has issued security advisories on vulnerabilities in ICS technologies from Eaton Lighting Systems, Pro-face and Rockwell Automation.

German police arrest two in cybergang investigation, including main suspect

German police arrest two in cybergang investigation, including main suspect

German police Tuesday arrested the 22-year-old main suspect in a cybercriminal investigation spanning four countries.

Updated: Pentagon unclear on who will defend the U.S. against a cyberattack

Updated: Pentagon unclear on who will defend the U.S. against a cyberattack

If the U.S. military normally has one thing down pat it's knowing who is in charge at any given time. However, when it comes to handling a massive cyberattack on the country, the Pentagon is not quite sure who should be issuing orders.

Mossack Fonseca files complaint with AG, founder blames hackers in Europe

Mossack Fonseca files complaint with AG, founder blames hackers in Europe

Mossack Fonseca co-founder filed complaints with Attorney General's office in Panama and said the firm was hacked from Europe.

WhatsApp end-to-end encryption completed

WhatsApp end-to-end encryption completed

WhatsApp integrated the Signal Protocol into its online messaging service, delivering on a promise to provide end-to-end encryption to its users.

FBI observes major uptick in business email compromise scams

FBI observes major uptick in business email compromise scams

Between October 2013 and February 2016, 17,642 global businesses collectively lost $2.3 billion to business email compromise scams, according to the FBI.

Senate votes in trade secrets legislation

Senate votes in trade secrets legislation

Senate approved the Defend Trade Secrets Act, legislation that provides stronger protections for companies in protecting trade secrets.

U.S., Canada issue ransomware alert

U.S., Canada issue ransomware alert

The U.S. Department of Homeland Security, in collaboration with Canadian Cyber Incident Response Centre, issued an official ransomware alert.

Will the Panama Papers change legal firms' cyber practices?

Will the Panama Papers change legal firms' cyber practices?

Following the massive 2.6 terabyte leak from the Panamanian corporate service provider and legal firm Mossack Fonseca, a sentiment emerges among security professionals assessing the wreckage at the secretive firm.

Amidst calls for iPhone transparency, FBI offers anti-encryption help to local law enforcement

Amidst calls for iPhone transparency, FBI offers anti-encryption help to local law enforcement

Privacy advocates and digital rights proponents are leaning on the FBI to disclose the method it used to break into the iPhone of the San Bernardino killer, but the agency so far remains mum..

Ghost Squad Hackers hit Trump sites with DDoS attacks

Ghost Squad Hackers hit Trump sites with DDoS attacks

Ghost Squad Hackers claim to have taken down two websites belonging to Donald Trump.

MPAA says Minn. revenge porn bill would compromise free speech

MPAA says Minn. revenge porn bill would compromise free speech

Claiming that a revenge porn bill could stymie free speech, the Motion Picture Association of America (MPAA) urged Minnesota state lawmakers to include an "intent to harass" clause.

Guccifer appears in U.S. courtroom following extradition

Guccifer appears in U.S. courtroom following extradition

Marcel Lehel Lazar, the alleged hacker known as Guccifer who helped validate reports of Hillary Clinton's use of a private email account as Secretary of State, appeared in a U.S. courtroom on Friday after extradition from Romania.

Hacker 'The Jester' reroutes DoS attack to Mossad

Hacker 'The Jester' reroutes DoS attack to Mossad

A hacker known as The Jester, whose site became a target of a DoS attack, claimed he rerouted the assault to strike Mossad, but it's his site that is currently down.

States take the lead

States take the lead

Don't expect much action from Congress, it's an election year.

Apple vs. FBI: Too much to ask

Apple vs. FBI: Too much to ask

If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .

Apple vs. FBI: Comply!

Apple vs. FBI: Comply!

In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.

States take the lead

States take the lead

As Washington gets distracted, expect more activity at state legislatures on cybersecurity and privacy, reports Steve Zurier.

Hello, Privacy Shield

Hello, Privacy Shield

The new data transfer mandate presents challenges for enterprises, but global trade depends on its widespread adoption, reports Larry Jaffee.

Ready to rumble: Apple vs. FBI

Ready to rumble: Apple vs. FBI

As Apple and the FBI lace up their gloves for a fight that makes Ali vs. Frazier look like a schoolyard brawl, privacy and security hang in the balance. Teri Robinson reports.

Senator calls for national automotive cybersecurity lab

Senator calls for national automotive cybersecurity lab

U.S. Senator Gary Peters (D-Mich.) is pushing to establish a national automotive cybersecurity laboratory.

Former UK foreign secretary William Hague declares crypto enemy no.1

Former UK foreign secretary William Hague declares crypto enemy no.1

In an opinion piece for The Telegraph newspaper, William Hague, the Conservative former Foreign Secretary in the UK, says the latest Brussels terrorist attacks shows the need to crack terrorist communications.

Founder of Oilpro.com charged with hacking into competitor's database

Founder of Oilpro.com charged with hacking into competitor's database

David Kent, founder of networking website Oilpro.com, was brought up on charges relating to computer hacking and wire fraud.

Ukraine approves new cyber-security strategy

Ukraine approves new cyber-security strategy

New standards and cyber-security strategy approved in Ukraine to thwart Russians hacking infrastructure as Russian software purchases halted.

FBI investigating attack against computer networks at U.S. law firms

FBI investigating attack against computer networks at U.S. law firms

Hackers reportedly accessed computer networks at U.S. law firms, including Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP.

DOJ defies court order to turn over spyware code used against Tor

DOJ defies court order to turn over spyware code used against Tor

The DOJ filed a sealed motion requesting a federal judge reconsider an opinion that the FBI must reveal code used to subvert the Tor network's anonymity protections.

Apple, FBI put Cellebrite in the spotlight

Apple, FBI put Cellebrite in the spotlight

The tentative naming of the Israeli firm Cellebrite as the muscle behind the FBI's ability to hack into the iPhone used by San Bernardino, Calif. shooter Syed Farook without help from Apple, has brought this little known company into the spotlight.

Obama extends executive order for cyber sanction powers

Obama extends executive order for cyber sanction powers

President Obama Tuesday extended the duration of the economic sanctioning powers that were put in place last year to combat cyber threats.

Russia and U.S. to resume cybersecurity cooperation

Russia and U.S. to resume cybersecurity cooperation

Russia and the US are to revive a series of bilateral agreements on cyber-defence including the world's first non-aggression treaty on IT

Iranian dam hacker allegedly used 'Google dorking' to find vulnerabilities

Iranian dam hacker allegedly used 'Google dorking' to find vulnerabilities

Officials say the Iranian man charged with hacking into a New York dam used a technique called "Google dorking" to identify the vulnerable system.

Apple now on offense against FBI

Apple now on offense against FBI

The FBI might be pressed into providing Apple with the details of how its third-party hacker - now reportedly Cellebrite - will break into an iPhone so Apple can modify its security vulnerability.

NSA head secretly visited Israel last week

NSA head secretly visited Israel last week

Admiral Michael S. Rogers, commander of the U.S. Cyber Command secretly visited Israel last week to discuss cyber security issues.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US