US warns that Chinese government is using 'wide variety' of methods, some illegal, to steal trade secrets

Written by AJ Vicens Oct 22, 2021 | CYBERSCOOP The Chinese government’s aggressive push to dominate emerging technology such as artificial intelligence, quantum computing, and biotechnology make Beijing the “primary…

REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say

A multi-country effort has given ransomware gang REvil a taste of its own medicine by pwning its backups and pushing its leak site and Tor payment site offline. The REvil…

Republican Senate leaders slam new TSA cybersecurity regulations for rail, aviation industry

Republican leaders in the US Senate have come out harshly against new cybersecurity regulations designed to protect US railroad and airport systems.  The new rules were handed down earlier this…

#ISC2Congress: How to Mitigate Evolving Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2…

Google Crushes YouTube Cookie-Stealing Channel Hijackers

Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels.  Google has caught and brushed off…

A China-aligned espionage group is targeting global telecoms, sweeping up call data dating back years

Written by AJ Vicens Oct 19, 2021 | CYBERSCOOP An advanced network of digital spies with a nexus to Chinese interests has successfully compromised parts of the global telecommunications network,…

Robots for kids: Best STEM kits and other tech gifts for hackers of all ages

All the signs were there. If my parents knew then what parents know now, they would have been prepared. But back in the 1960s and 1970s, the maker movement was…

Staggering growth of cybercrime and how data science helps improve online security

Did you know if you were to compare the money generated by cybercrime with the GDP of world nations, it would come third behind the economic powerhouses of America and…

Windows security: 20 years on from Bill Gates' Trustworthy Computing memo, how much has changed?

It’s almost 20 years since then-Microsoft boss Bill Gates wrote his famous Trustworthy Computing memo, in which he urged the company to produce more secure software.  “Eventually, our software should…

Singapore to develop mobile defence systems with Ghost Robotics

Singapore’s Defence Science and Technology Agency (DSTA) has inked a partnership with Philadelphia-based Ghost Robotics to identify uses cases involving legged robots for security, defence, and humanitarian applications. They will…