Wherever we go these days, whether at work, at home, in restaurants, outside, or practically anywhere else, people reflexively go to their smartphones constantly.
Why? Because those little handheld devices can accomplish so much. We can send communications across various platforms, conduct business tasks, check on the news, shop, participate in social media, listen to music, watch videos, and the list goes on and on. Continue reading “Your Smartphone: Friend or Foe?”
Concerns about foreign hackers have been heightened since the 2016 presidential election, given that various U.S. intelligence agencies reported foreign Internet efforts to influence that election. And with mid-term Congressional elections coming up, those concerns have not abated. Continue reading “U.S. Seeks to Thwart Foreign Cyber Adversaries”
By now, you likely have learned that Equifax suffered tremendous hacking. Specifically, as Equifax recently announced, hackers took advantage of a website application vulnerability to access records during a several-month period from May through July of this year. Not only did these hacking activities take place over an extended period of time, but as many as a whopping 143 million consumers in the United States may have been impacted. How so? Their personally identifiable information may have been compromised, including Social Security numbers, addresses, drivers license numbers, and birth dates.
So, what should U.S. consumers do in response to the Equifax hacking?
Continue reading “How to Respond to the Huge Equifax Hacking”
Most of us are aware that our personally identifiable information, like our credit card numbers, are at risk when retailers are hacked. However, there may be even greater risks. Indeed, the U.S. government has issued a recent warning about a hacking campaign targeting nuclear and energy sectors. Continue reading “Are Nuclear and Energy Sectors at Risk of Hacking?”
Unless you are a hermit hiding out in an undiscovered cave, you are well aware that we have been in the thick of an acrimonious and difficult election cycle for the highest office in the land — the Presidency of the United States. Presidential campaigns and campaigns for other elected offices have been a struggle in prior years — given all the competing interests, priorities and strategies that constantly have to be juggled. If that were not enough, now candidates have to deal with the new reality of cyber warfare.
We have been learning from recent press reports that Russia apparently has been active in its efforts to disrupt the current presidential election in the United States. Indeed, according to a recent report by NBC News, Russia’s “cyber-espionage campaign against the American political system began more than a year ago and has been far more extensive than publicly disclosed, targeting hundreds of key people.” Continue reading “Politics and Elections in the Era of Cyberwarfare”
The Ashley Madison site declares on its home page that “Life is short. Have an affair.” The home page goes on to state that “Ashley Madison is the world’s leading married dating service for discreet encounters.” The site also boasts “over 38,050,000 anonymous members!” But how anonymous are those members, really?
People engage in all sorts of communications and transactions on the Internet. Generally, they like to believe that their personal information is handled confidentially. For example, if someone buys an item from Amazon, she hopes that her name, credit card information, and address will not be publicly disseminated. Continue reading “Adultery Gone Awry on the Internet”
We keep hearing about new and different ways that data can be hacked in the online and wireless world. And, generally speaking, our concern tends to be that our personally identifiable information may be stolen and misused. But that may be just the tip of the iceberg when it comes to the negative consequences of hack attacks.
Indeed, the Government Accountability Office (GAO) now is concerned about the security of modern aircraft that are more and more dependent on the Internet, as reported by The Guardian. According to a recent GAO report: “Modern aircraft are increasingly connected to the Internet. This interconnectedness can potentially provide unauthorized remote access to aircraft avionics systems.”
Continue reading “Internet-Connected Aircraft Potentially Subject to Hack Attacks”
Since the beginning of time, unfortunately, some people have been intent on causing harm to others for their own benefit. This, of course, has been true with respect to Internet conduct. Indeed, we now live in a world in which the “black hats” are actively hacking and causing other problems in cyberspace, while the “white hats” are trying to combat these efforts.
Cybercrime is not confined within the borders of sovereign states. What happens on the Internet goes beyond national borders. After all, we are dealing with the World Wide Web. Accordingly, cybercrime has international implications.
Continue reading “When Does Cybercrime Become Internet Warfare?”
WHEN WILL IT stop? We have been hearing about cyberhacking for years, and rather than hack attacks dropping out of the news, we continue to be inundated with reports of successful hacks. This time the latest victim is the European Central Bank.
Perhaps you are thinking that because hacking is nothing new, methods and technology should have been developed to thwart hackers in their tracks. And it is true, there has been significant progress in this regard.
Continue reading “Hacking Continues: European Central Bank Is the Latest Victim”