Patricia Zengerle and Doina Chiacu report: Russia and China pose the biggest espionage and cyber attack threats to the United States and are more aligned than they have been in decades, the director of national intelligence told U.S. senators in testimony on worldwide threats on Tuesday. While the two countries seek to expand their global…
Category: Commentaries and Analyses
Japanese government plans to hack into citizens’ IoT devices
Catalin Cimpanu reports: The Japanese government approveda law amendment on Friday that will allow government workers to hack into people’s Internet of Things devices as part of an unprecedented survey of insecure IoT devices. The survey will be carried out by employees of the National Institute of Information and Communications Technology (NICT) under the supervision…
Data leak: Breach too far
NST reports: IT has happened again. This time at Universiti Teknologi Mara (UiTM) where records of just over a million students have been leaked. Is it an inside job? Hard to tell, but UiTM is probing. UiTM sources contacted by the New Straits Times say it may just be put together from multiple sources by…
Why doesn’t Twitter have a way to notify them of leaks or concerns outside of a bug bounty program?
L33tdawg writes: Twitter has owned up to a privacy goof that exposed some Android users’ private tweets. That would be bad enough if the problem existed for an hour, or a day, or a month. But unfortunately for Twitter (and affected users) the problem was present from November 3 2014 until January 14 2019. That’s…
North Carolina AG re-introduces legislation to protect against identity theft
Back in January, 2018, North Carolina Attorney General Josh Stein and state Rep. Jason Saine (R) introduced legislation called “Act to Strengthen Identity Theft Protections.” In January, 2019, they’ve reintroduced it. A press release from the Attorney General explains: Attorney General Josh Stein and Rep. Jason Saine today unveiled legislation to strengthen North Carolina’s laws to prevent…
Providers Rise to Meet the Challenge of K–12 Data Security
Katelyn Sweeney reports: As data becomes integral to K–12 education, administrators face new challenges to ensure they keep students’ information safe. Analysis of student data allows educators to identify at-risk students and implement further research into what does and does not work in the classroom. This data can also be used to create student profiles,…