By
Debra KaufmanApril 8, 2020
Although Germany’s carriers plan to launch 5G networks, large companies including BASF, BMW, Bosch, Lufthansa and Volkswagen have applied to set up local private 5G networks. The German network regulator reported that, so far, 33 companies have bought licenses, which became available last November. Experts observe that private 5G networks are useful for industrial applications that require speedy, reliable connectivity with low latency for real-time critical jobs such as driverless vehicles and robots. Continue reading German Firms Plan to Build Their Own Secure 5G Networks
By
Debra KaufmanMarch 12, 2020
The Cyberspace Solarium Commission released a report based on a months-long study that showed the U.S. government’s lack of ability to block cyber threats. The Commission lists 75 recommendations for major structural changes, including the creation of Congressional committees dedicated to cybersecurity and a White House-based national cybersecurity director to be confirmed by the Senate. The report is blunt in its assessment that the U.S. government’s current approach to cyberattacks is “fundamentally flawed.” Continue reading Commission Finds U.S. Is Unprepared for Major Cyberattacks
By
Debra KaufmanFebruary 11, 2020
An increasing number of cities, hospitals and businesses are being attacked by ransomware, by which bad actors shut down the victim’s computer network until a ransom is paid. Up until now, these attacks have been hard to measure since many of those impacted quietly paid the ransom without notifying any authorities. Security firm Emsisoft just reported a 41 percent increase in ransomware attacks between 2018 and 2019, with 205,280 businesses and other groups submitting evidence of such intrusions in 2019. Continue reading Ransomware Attacks Increase and Demand Bigger Payouts
By
Debra KaufmanJanuary 24, 2020
Big Tech is now one of the biggest lobbying groups in Washington, D.C. Facebook posted the greatest increase in spending last year, followed by Amazon, Apple and Microsoft. By increasing spending in lobbying, the companies hope to influence privacy legislation, pursue government contracts and rebut charges of unfair competition. Alphabet is the only Big Tech company to reduce its spending for lobbying in 2019, by 44 percent to $11.8 million. It also ended its relationship with lobbyists at six outside firms. Continue reading Big Tech Firms Increase Spending to Influence Lawmakers
By
Rob ScottJanuary 10, 2020
Early Tuesday morning, just as CES 2020 was getting underway, the team that monitors computers for Las Vegas detected a potential cyberattack as the city’s systems were reportedly compromised. While city officials tweeted about the breach, the information was light on details regarding which operations had been affected or the extent of the attack. The timing was unfortunate, since the annual CES confab is one of the largest events in Las Vegas. Last year, the show attracted more than 175,000 people and 4,400 exhibitors, including a number of Fortune 500 companies. Continue reading Las Vegas Was a Target of Cyberattack While Hosting CES
By
Debra KaufmanJanuary 9, 2020
The smart city was the topic of a CES conversation moderated by Strategic Cyber Ventures chief executive Hank Thomas, whose expertise was gained in relevant military and government work. Columbus, Ohio won the U.S. Department of Transportation’s first Smart City Challenge, and Smart Columbus director Jordan Davis reported that this win came with $50 million in grant funding, which was matched locally. “There is no clear definition of what a smart city is,” Davis noted. “But seamless connectivity is the ideal.” Continue reading CES 2020: Experts Consider Cybersecurity For Smart Cities
By
Debra KaufmanJanuary 9, 2020
Suppose you post your latest travel photos on your website, and later, in the comments section, a drug dealer offers his illegal wares for sale. Under Section 230 of the Communications Decency Act, noted CTA senior vice president of government affairs Michael Petricone, you cannot be prosecuted for drug sales. “Section 230 provides broad but not absolute immunity for Internet service providers for content published by users,” he said. “It’s important for platforms — but it can also encourage toxic online behavior.” Continue reading CES 2020: Evaluating the Relevance of CDA’s Section 230
By
Debra KaufmanJanuary 7, 2020
Moderated by Deloitte Consulting chief cloud strategy officer David Linthicum, a group of experts gathered at CES to address the issues surrounding IoT at the edge of the cloud. Linthicum asked panelists what they think the big announcements of CES 2020 will be. Sikorsky Innovations flight control technical lead Derek Geiger echoed many of them when he said, “I don’t think there will be one major announcement.” “It will be little pieces of technology coming together,” he said. “It won’t be one company solving the problem.” Continue reading CES 2020: A Look at Improving IoT at the Edge of the Cloud
By
Don LevyDecember 2, 2019
When CES 2020 opens on January 7 in Las Vegas, it is almost certain that entertainment will be taking center stage. Where emerging technologies have disrupted media and entertainment on a rollercoaster of change for the past few decades, today’s M&E companies are harnessing technologies, driving innovation, and emerging as disruptors themselves. The days of entertainment as a CES sideshow and a way to light up screens to sell TVs are over. Our team of reporters will be at CES again this year covering the latest news from keynote addresses, product demos and related events. Continue reading ETC@USC Gears Up For January’s CES 2020 in Las Vegas
By
Debra KaufmanNovember 12, 2019
One of the benefits of 5G, expected to be 100 times faster than 4G networks, is the improved protection of sensitive data. Much of the conversation about 5G networks has focused on the security issues related to Chinese vendors of gear used in 5G networks. But Verizon chief information officer Chandra McMahon noted that “security is designed into 5G and there will be additional [security] technical features.” Another advantage is that 5G providers will rely on the cloud, providing more capacity and flexibility. Continue reading 5G Offers Wireless Carriers More Security, Privacy Options
By
Debra KaufmanNovember 7, 2019
Russian hackers have been responsible for serious cybercrimes in the last few years, including Sandworm, a group of hackers who attacked the 2018 Olympics, among other targets. Now, Russia is seeking to replace the 2001 Budapest Convention on Cybercrime with a new agreement that will align with its interests. The country is playing hardball in its attempt to prevent its citizens arrested abroad to be extradited to the U.S. for trial, including holding an Israeli citizen for trade with a Russian hacker held in that country. Continue reading Russia Boosts Efforts to Foil Extradition of Hackers to U.S.
By
Emily WilsonOctober 15, 2019
According to a privately circulated risk assessment prepared by European governments, the European Union (EU) has identified security threats coming from foreign telecommunications equipment vendors, raising particular concerns about Huawei Technologies Co. A public report was released and warned of hostile states or state-backed companies posing a threat to new 5G networks rolling out across the globe. These promise faster connection speeds and the ability to link many devices (cars, pacemakers, and more) to the Internet.
Continue reading EU Private Risk Assessment Reveals 5G Security Concerns
By
Debra KaufmanSeptember 10, 2019
Cybersecurity firm Cyren recently discovered Syrk, a free tool that allows players to cheat at video game “Fortnite.” It also learned that Syrk can disable anti-malware software and encrypt batches of user files for ransom. Akamai has reported a significant rise in so-called credential-stuffing attacks, by which criminals use stolen identities in automated attacks to break into accounts. Akamai found 55 billion credential stuffing attacks from November 2017 to the end of March 2019. Gaming sites had 12 billion of these attacks. Continue reading Games Are Targets for Ransomware and Credential Stuffing
By
Debra KaufmanSeptember 6, 2019
As the 2020 U.S. presidential election nears, government officials met in Silicon Valley with Facebook, Google, Microsoft and Twitter to discuss how to prevent the foreign interference that took place during the 2016 election. The companies’ security teams and representatives from the FBI, Office of the Director of National Intelligence and the Department of Homeland Security attended the daylong meeting at Facebook’s headquarters. The group talked about detecting potential threats and methods of strategic collaboration. Continue reading Tech Firms, U.S. Officials Strategize 2020 Election Security
By
Debra KaufmanJuly 1, 2019
Threat intelligence firm Mimecast revealed that hackers are exploiting a Microsoft Excel feature called Power Query to facilitate Office 365 attacks. This feature lets legitimate users combine data from various sources by linking to those components in a spreadsheet. Hackers replace a link with another that leads to a site infected with malware. The hacked Excel spreadsheets then allow attackers to install backdoors, using the software program’s own tools. Meanwhile, Apple has yet to fix a macOS bug first identified by a cybersecurity researcher in February. Continue reading Researchers Identify Bugs in Microsoft Excel, Apple macOS