Government

Government

Oracle will inherit TikTok security, privacy headaches

By partnering with the popular Chinese videosharing platform TikTok, Oracle will inherit a laundry list of security and privacy issues once the deal is approved, as soon as Sept. 20, by TikTok parent company ByteDance. TikTok boasts 100 million users in the U.S. and 689 million globally. Earlier this year President Trump threatened to ban…

All eyes on VA security measures after compromise of 46,000 accounts

The U.S. Department of Veterans Affairs (VA) disclosure that the information of 46,000 U.S. service people recently was breached through an apparent social engineering scheme underscores the need for government vigilance even when a significant investment has been made in state-of-the-art protection. Security experts said the relatively low number of impacted accounts – in comparison…

Homeland Security announces 5G strategy to manage the pending digital overhaul

The Department of Homeland Security announced a new 5G strategy Monday, providing a five point plan to handle confusion caused by the pending massive overhaul to digital infrastructure. The initiative, released by DHS’s Cybersecurity and Infrastructure Security Agency, or CISA, calls for the following: Support of 5G policy and standards development by emphasizing security and…

IBM pays up in tech, settles Weather Channel privacy lawsuit by LA

IBM will pony up $1 million worth of technology to the city of Los Angeles for COVID-19 contact tracing, and The Weather Channel app will change its privacy practices regarding use of user location data. The changes come with the settlement of a lawsuit that accused the app of misleading users as to how their…

U.S. urges Linux users to secure kernels from new Russian malware threat

Linux users should not assume they are safe from the ambitions and reach of reputed Russian hacking group Fancy Bear, which has been using a newly disclosed malware toolset to establish a command-and-control connection with infected Linux systems. Called Drovorub, the toolset essentially creates a backdoor that enables file downloads and uploads, the execution of…

electric power

A2V teams with utilities to secure supply chain

Utilities are gearing up to meet the security requirements laid out in the Critical Infrastructure Protection (CIP) Security Compliance Standards: NERC Critical Infrastructure (NERC-CIP) standards and waiting to see how a presidential executive order, also designed at securing bulk power systems (BPS), shakes out. That’s created an opportunity for the Asset to Vendor Network Power…

Next post in Security News