Concerns about foreign hackers have been heightened since the 2016 presidential election, given that various U.S. intelligence agencies reported foreign Internet efforts to influence that election. And with mid-term Congressional elections coming up, those concerns have not abated. Continue reading U.S. Seeks to Thwart Foreign Cyber Adversaries
By now, you likely have learned that Equifax suffered tremendous hacking. Specifically, as Equifax recently announced, hackers took advantage of a website application vulnerability to access records during a several-month period from May through July of this year. Not only did these hacking activities take place over an extended period of time, but as many as a whopping 143 million consumers in the United States may have been impacted. How so? Their personally identifiable information may have been compromised, including Social Security numbers, addresses, drivers license numbers, and birth dates.
So, what should U.S. consumers do in response to the Equifax hacking?
Most of us are aware that our personally identifiable information, like our credit card numbers, are at risk when retailers are hacked. However, there may be even greater risks. Indeed, the U.S. government has issued a recent warning about a hacking campaign targeting nuclear and energy sectors. Continue reading Are Nuclear and Energy Sectors at Risk of Hacking?
We made it through 2016. So, what’s in store in 2017 when it comes to hot tech issues? There are many hot issues, such as big data, intellectual property disputes, the sharing economy, and drones. But this blog covers the three potential biggest issues. Drum roll please — here we go!
1. Security — Cybercrime & Cyberwarfare
Hacking, hacking, hacking …
Security on the internet is the first and foremost tech issue for 2017.
Hacking is penetrating all sorts of systems. For example, individuals are vulnerable to cybercrime, as their personally identifiable information is stolen when companies are hacked.
And cyberwarfare appears to be here and now, and not just some speculation about the future. Indeed, the Senate is preparing at this moment to hold hearings about the implications of apparent Russian hacking that meddled in our recent presidential election.
This year likely will be dominated by efforts to combat threats to internet security.
Unless you are a hermit hiding out in an undiscovered cave, you are well aware that we have been in the thick of an acrimonious and difficult election cycle for the highest office in the land — the Presidency of the United States. Presidential campaigns and campaigns for other elected offices have been a struggle in prior years — given all the competing interests, priorities and strategies that constantly have to be juggled. If that were not enough, now candidates have to deal with the new reality of cyber warfare.
We have been learning from recent press reports that Russia apparently has been active in its efforts to disrupt the current presidential election in the United States. Indeed, according to a recent report by NBC News, Russia’s “cyber-espionage campaign against the American political system began more than a year ago and has been far more extensive than publicly disclosed, targeting hundreds of key people.” Continue reading Politics and Elections in the Era of Cyberwarfare
The Ashley Madison site declares on its home page that “Life is short. Have an affair.” The home page goes on to state that “Ashley Madison is the world’s leading married dating service for discreet encounters.” The site also boasts “over 38,050,000 anonymous members!” But how anonymous are those members, really?
People engage in all sorts of communications and transactions on the Internet. Generally, they like to believe that their personal information is handled confidentially. For example, if someone buys an item from Amazon, she hopes that her name, credit card information, and address will not be publicly disseminated. Continue reading Adultery Gone Awry on the Internet
We keep hearing about new and different ways that data can be hacked in the online and wireless world. And, generally speaking, our concern tends to be that our personally identifiable information may be stolen and misused. But that may be just the tip of the iceberg when it comes to the negative consequences of hack attacks.
Indeed, the Government Accountability Office (GAO) now is concerned about the security of modern aircraft that are more and more dependent on the Internet, as reported by The Guardian. According to a recent GAO report: “Modern aircraft are increasingly connected to the Internet. This interconnectedness can potentially provide unauthorized remote access to aircraft avionics systems.”
Since the beginning of time, unfortunately, some people have been intent on causing harm to others for their own benefit. This, of course, has been true with respect to Internet conduct. Indeed, we now live in a world in which the “black hats” are actively hacking and causing other problems in cyberspace, while the “white hats” are trying to combat these efforts.
Cybercrime is not confined within the borders of sovereign states. What happens on the Internet goes beyond national borders. After all, we are dealing with the World Wide Web. Accordingly, cybercrime has international implications.
WHEN WILL IT stop? We have been hearing about cyberhacking for years, and rather than hack attacks dropping out of the news, we continue to be inundated with reports of successful hacks. This time the latest victim is the European Central Bank.
Perhaps you are thinking that because hacking is nothing new, methods and technology should have been developed to thwart hackers in their tracks. And it is true, there has been significant progress in this regard.
Are international governments already engaging in cyberwarfare by hacking into each other’s computer systems? According to recent Reuters articles, at a minimum, a war of words is brewing suggesting that this already is the case.
First, it is reported that via a flaw in Adobe software, hackers were able to target government computer systems in Europe. Apparently, the systems were not actually compromised, but the specifics of the attack are being shared with NATO member states in an effort to remain ready for potential further attacks.