The value of cyber threat intelligence increases as it’s shared. That’s the idea behind the X-Force Exchange, a 700-terabyte platform of aggregated cyber threat information IBM has built to foster cybersecurity collaboration.
Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one of a handful of cultural institutions in the first wave of adopting a technology and process to preserve its digital content.
Federal investigators learned several hours before a provocative cartoon contest in Texas that a man under investigation for extremist activities might show up and alerted local authorities, but had no indication that he planned to attack the event, FBI Director James Comey said recently.
When Iran hacked the Navy-Marine Corps Intranet in fall 2013, it shook up the sea services’ approach to cybersecurity. Thanks to that new vigilance, their networks have fended off every subsequent attack, the head of Navy Cyber Command said recently.
China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.
The disappearance of Phillip Koss is just one of dozens of cases in which Diana Trepkov has participated during her career as a forensic artist. Her work, with law enforcement agencies across Canada and the United States, including Durham Regional Police, has assisted in investigations into both missing persons cases and efforts to identify human remains.
Much like a finger leaves its own unique print to help identify a person, researchers are now discovering that skull fractures leave certain signatures that can help investigators better determine what caused the injury. Implications from the research could help with the determination of truth in child abuse cases, potentially resulting in very different outcomes.
According to the U.S. Intelligence Community’s 2015 “Worldwide Threat Assessment” report, Russia and China are the "most sophisticated nation-state actors” in the new generation of cyberwarfare, and Russian hackers lead in terms of sophistication, programming power and inventiveness. “The threat from China is overinflated, while the threat from Russia is underestimated,” says Jeffrey Carr, author of the book Inside Cyber Warfare.
SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, SAP systems are not protected from cyber threats by traditional security approaches.
Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.
The US Navy is reportedly looking for a new server supplier for some of its guided missile cruisers and destroyers due to security concerns around Lenovo’s recent purchase of IBM’s x86 server division.
Positive identification of unknown remains is essential to the resolution of criminal investigations, insurance claims, the facilitation of the release of the decedent to family for interment, and the emotional recovery of family and friends. Although radiographic comparisons are commonly used, to date, there has been little to no testing of the validity of using such methods to establish a positive identification.
Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
The US Internet Revenue Service has launched a new unit dedicated to tackling the rising rate of identity theft through hacking.
Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyberspace.