Though they operate behind the scenes, Stingrays have been in the spotlight for quite some time as their use and capabilities expand and concern that they may trample privacy conventions becomes widespread. Despite growing unease among lawmakers and privacy advocates, though, lawmakers have yet to pass federal legislation to regulate use of the device on…
In a world of ever-increasingly complex technologies, some experts advocate a move to simplify. Greg Masters reports. No one said it was going to be easy, but the task of locking down enterprise networks seems to be getting more and more complex as attackers devise ever more sophisticated ways of penetrating defenses. A firewall once…
When Microsoft temporarily doubled its maximum bug bounty prize to $30,000 earlier this month, it was hard to not to notice the timing. After all, the software giant had just been burned twice by Google Project Zero researchers who publicly disclosed Windows vulnerabilities before they could be patched. This was not the first time Google…
That is the question organizations must quickly decide when they are hit with a ransomware attack, reports Doug Olenick. The 2 a.m. phone call dreaded by every chief technology officer, school district IT manager or small government official: “It seems our entire network is inaccessible and someone calling himself TheDarkOverlord is demanding 28 of something…
The Senate sponsors of the DIGIT Act may have the right idea when it comes to IoT, but advocacy groups warn many thorny security and privacy issues lurk. Steve Zurier reports.
If privacy and transparency were a couple, they’d likely change their Facebook relationship status to “it’s complicated” and then publicly play out what can only be described as a rollercoaster of harmony and discord as they ride through life together. The cybersecurity equivalent of Dr. Phil might occasionally call them co-dependent and dysfunctional because their…