Taylor Armerding
Contributing writer
Can the FTC save the IoT?
Enormous amounts of effort, time and money haven’t made much of a dent in the insecurity of the Internet of Things. So, what about making more use of the old-fashioned lawsuit? The Federal Trade Commission is having some impact with...
奥巴马的网络安全的遗产:善意,咕d efforts, limited results
President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security.
Repealing passwords is a long way away
There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.
Can government really fix the IoT mess?
The Internet of Things is an ever-expanding attack surface. And a growing number of experts note that the market has failed to address that problem. They are now saying it will take government intervention.
Medical data: Accessible and irresistible for cyber criminals
Health care data may not fetch the highest price on every Dark Web marketplace. But it remains one of the most popular targets for cyber criminals, in part because it is easy to get and retains its value. You can’t change a Social...
Top 15 security predictions for 2017
So here are some of the best guesses about what we will see in 2017 from several dozen vendors and analysts. There are many more than 15 predictions out there, of course, but these are the ones we heard most frequently.
The IoT: Gateway for enterprise hackers
The Internet of Things keeps growing – and so do the threats. At a webinar this week, a panel warned enterprises that it is crucial to be able to see radio-enabled devices on the network, or they could be blind to the risks they pose....
Ransomware as a Service fuels explosive growth
Ransomware as a Service has made the entry into the world of cyber crime cheap and easy. Meanwhile, people and organizations still aren’t protecting themselves. No wonder it is exploding.
Feds provide legal loophole to hacking IoT devices
For the next two years, “good-faith” security researchers will be allowed to hack into the software of most Internet of Things devices without risk of violating copyright laws. Whether that will lead to more cooperation or...
Is critical infrastructure the next DDoS target?
DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical...
Bots may be trumping online polls
Poll results are supposed to be driven by opinions, but marketers, politicians and others know opinions can be driven by polls. Hence the rising use of bots to skew perceptions in favor of a product, a celebrity or, at this time of...
The OPM breach report: A long time coming
Congress has finally issued a report on the breach of the federal Office of Personnel Management that exposed the personal information of more than 22 million current and former employees. It comes 15 months after the breach was made...
Taking down the internet: possible but how probable?
安全专家Bruce Schneier tha近日报道t the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...
Security vs. privacy: The endless fiery debate continues
The debate about security vs. privacy has been going on since governments existed. It got a lot of discussion this week at the Cambridge Cyber Summit, but it remains unresolved.
Hillary Clinton’s email has vanished but why can’t yours?
Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”
Awareness training: How much is too much?
The goal of security awareness training is to help employees recognize and avoid security risks. The key, experts say, is to make them skeptical but not operate in a “constant state of distrust.”
Hack the vote: Experts say the risk is real
This nation’s fragmented electronic voting systems are dangerously vulnerable to cyber attacks, security experts agree. And while they don’t predict direct tampering with votes in the coming election, they say uncertainty about...
Regular password changes make things worse
Changing passwords is supposed to make things more difficult for attackers. Unfortunately, research shows that human nature means it makes it easier.