In current times, the term may describe a person who attempts to gain unauthorized access to computers, with less than honorable intentions, or the person who counters the bad intentioned one. But, there is a pretty broad spectrum of hackers and a variety of motivations for hacking.
The number of satellites transmitting GPS locations, cellphone signals and other sensitive information has been rapidly increasing, which has resulted in the creation of favorable circumstances for hackers. Even with all the advances in satellite technology, much of the US military's satellite technology remains vulnerable.
On Saturday, US State Department-designated terrorist group Hezbollah announced that Facebook and Twitter had terminated its main accounts.
Pre-crime, is a vast potpourri of information, on everyday activities, used to try to predict and prevent future behavior. In "predictive" policing, computer algorithms identify signs of pre-crime in a realm in which we are all potential suspects.
On Friday, a New York man was arrested and charged in U.S. District Court in the Southern District of New York with conducting an extensive cyberstalking and threats campaign. He was charged with one count of cyberstalking and two counts of sending interstate threats.
A recent government-wide cybersecurity risk assessment, carried out by the OMB, in coordination with the Department of Homeland Security (DHS), highlights several serious issues that continue to imperil federal cybersecurity and ultimately put the nation at risk.
Three years ago it was revealed that Automatic tank gauges at approximately 5,000 US gas stations were exposed on the Internet, without password protection. Currently, according to a recent scan, 5,635 gas stations with the same vulnerability have been found.
Phishing threats are currently targeting your credentials for Apple, Facebook, Gmail, and more. In this roundup we detail some of the current Phishing threats active on the Internet.
Last week, the Department of Homeland Security (DHS) released another National Terrorism Advisory System Bulletin as an extension of the alert the agency issued in November, 2017. This latest alert expires on September 14, 2018.
4iQ is a identity threat intelligence company that monitors the internet for identity records exposed in data breaches and accidental leaks. The latest 4iQ identity breach report indicates that between 2016 and 2017 there was a 182 percent increase in raw identity records discovered by its team.
Last Tuesday, Apple CEO Tim Cook reported that the company brought in close to $150 billion in revenue and $34 billion in earnings for the first half of the fiscal year. The iPhone played prominently in Apple's revenue as the company drew approximately two-thirds of its revenue from the iPhone portfolio.
A network of surveillance cameras in various locations throughout Newark, NJ will enable people to monitor these locations for criminal activity. The program, the Citizen Virtual Patrol, has been described by local leaders as "a block watch on steroids".
A smart city can be described as a city that incorporates the capabilities of web connectivity, analytics, mobile solutions, sensors, data collection and other technology. This can include surveillance systems utilized by law enforcement, smart congestion-mitigating traffic systems, LED streetlights, and smart grids.
Child sexual exploitation impacts everyone around the world. As predators are increasingly using the internet to find victims, law enforcement have also been employing technology in order to apprehend suspects. Thankfully, a new algorithm may allow law enforcement to find these predators before they can cause harm.
Joe Westby is Amnesty International's Technology and Human Rights researcher. Recently, in response to Google's launch of a new messaging service, Westby argued that Google, "shows total contempt for Android users' privacy."