Equifax Hit With Maximum UK Privacy Fine After Mega-Breach


Credit bureau Equifax has been hit with the maximum possible fine under U.K. law for "multiple failures" that contributed to its massive 2017 data breach, including its failure to act on a critical vulnerability alert issued by the U.S. Department of Homeland Security.

Cybercrime: 15 Top Threats and Trends


Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. Those are just a handful of takeaways from the Internet Organized Crime Threat Assessment for 2018 from Europol, the EU's law enforcement intelligence agency.

Is My Identity on the Dark Web?


BRETT JOHNSON IS AN IMPOSING and charismatic ex-con whom the U.S. Secret Service once dubbed the “Original Internet Godfather.” His criminal masterstroke? Creating “Shadowcrew,” one of the first online forums where bad guys could safely buy guns, stolen credit cards, Social Security numbers and every drug imaginable. But Shadowcrew was shut down by federal agents in 2004, and for the next decade Brett was in and out of prison. At one point he went on a four-month run from the law, funded by roughly $500,000 he stole from ATMs. That landed him on the Secret Service’s “Most Wanted” list.

He’s the good guy of our story.

Selling your car? Clear your personal data first


Your car is a computer that stores a lot of information about you — just like your smartphone or home computer. When you sell or donate your car, that personal data might be accessible to the next owner if you don’t take steps to remove it.



At its most basic level, a SIM swap is when someone convinces your carrier to switch your phone number over to a SIM card they own.

Three Members of Notorious International Cybercrime Group “Fin7” In Custody for Role in Attacking Over 100 U.S. companies


Three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe have been arrested and are currently in custody facing charges filed in U.S. District Court in Seattle, announced Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney Annette L. Hayes for the Western District of Washington and Special Agent in Charge Jay S. Tabb Jr. of the FBI Seattle Field Office.

It’s time to stop laughing at Nigerian scammers — because they’re stealing billions of dollars


On Monday, the FBI announced the arrest of 74 people across the world — including 29 people in Nigeria and 41 in the United States — who authorities say were part of complex international networks that combed filings by the Securities and Exchange Commission, spoofed CEO emails and successfully targeted even hardened employees whose jobs are to safeguard their companies from financial mismanagement.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence


Facebook has data-sharing partnerships with at least four Chinese electronics companies, including a manufacturing giant that has a close relationship with China’s government, the social media company said on Tuesday.

Facebook defends sharing user data with phone makers


A New York Times investigation published late Sunday revealed the scope of data-sharing deals Facebook (FB) struck over the years with companies like Apple (AAPL), Samsung (SSNLF) and Microsoft (MSFT). The partnerships give some device makers access to Facebook users' education history, relationship status, work, religion, political leaning and upcoming events, the Times reported.

Microsoft's 'DigiGirlz Day' comes to Wilmington University to teach young women about tech careers


The more than 200 attendees were from all across the state, from Northern Wilmington to Delmar, and all different educational backgrounds, from 31 different public, private, charter, and home schools . They spent a full school day at the University of Wilmington-Dover campus.

Governor Carney Honors “Kids Safe Online” Poster Contest Winners


For the first time in the ten year history of the contest there was a complete sweep of winners from the same school. Art teacher Kelly Walzl’s fourth grade students Aubrie Rodriguez, Clayton Starkey, and Catalina Syto placed first, second and third, respectively. These students’ posters were judged to be the best among 1,400 submissions.

How Fake Mark Zuckerbergs Scam Facebook Users Out of Their Cash


A Facebook notification on Gary Bernhardt’s phone woke him up one night last November with incredible news: a message from Mark Zuckerberg himself, saying that he had won $750,000 in the Facebook lottery.

After Detailing Russian Hack, White House Cyber 'Czar' Announces Departure


"Serving as the White House's cybersecurity coordinator for the last 14-months has been a tremendous opportunity to work on some of our nation's most important cyber challenges," Joyce said in a statement, according to The Washington Post. "I look forward to continuing to serve our nation at the agency I've called home for the last 27 years."

3 Days Of War Games Test Government Response To Serious Cyberattacks


What would happen if an unfriendly nation tried to take down the power grid, or the air traffic control system, or blow up a chemical plant with a cyberattack? How would government agencies respond to such a threat?

Meet the Padua students who rocked the Girls Go CyberStart competition


The five-time Cybersecurity State Champs showed up big time during a 24-hour "sleepover hackathon" that earned one Padua team the No. 1 rank in Delaware.

What you need to know about credit card skimming devices


The Delaware State Police are working to inform the public about the dangers of credit card skimming devices. The devices, which fit simply and inconspicuously over top of credit card readers, have been found throughout the state, primarily at ATMs and gas stations. Police are working with both businesses and banks to get the situation under control.

Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors


DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).

Police warn of multiple card skimming devices


State police say the devices, which can steal your banking information, have been found at businesses up and down the First State. The Delaware State Police are currently investigating several places where skimming devices have been reported. These devices have been primarily placed at ATM’s and gas stations.

Hackers Win Olympic Gold Medal for Disruption


Hackers have crashed the Winter Olympics, apparently by using destructive malware. On Friday, shortly before the opening ceremonies of the Olympic Winter Games in South Korea, the official Pyeongchang 2018 site stopped working, leaving attendees unable to print tickets. In addition, the WiFi in Pyeonchang Olympic stadium stopped working, as did televisions and internet access in the main press center, the Guardian first reported. It said the website wasn't restored until 12 hours later, on Saturday morning.

Security Pros Need a Mentor: Here's Why and How


The Multi-State Information Sharing and Analysis Center (MS-ISAC) started a mentoring program in 2012, and this nationwide career-enhancing strategy for security leaders has grown to become stronger than ever. Here are the details on how the mentoring program works and interviews on the benefits with government mentors and mentees. Most important, why you should care and how to get involved.

Internet scammers are terrible. This troll is their nightmare.


In a call center, somewhere on Earth, a telephone rang. John picked up. On the other end of the line was a man who spoke in a preposterously fake Russian accent and introduced himself as “Vicktor Viktoor,” which was not his real name.

Delaware enlisting more girls in the fight against hackers


Listen up, girls. Delaware needs your help this month defending the state's internet grid against a gang of cybercriminals and hackers. Our online safety and security rest in your hands. Report to Cyber Protection Agency headquarters and get to work immediately!

Ransomware was most popular cyber crime tool in 2017


Ransomware attacks on business increased by 90% in 2017, while attacks on consumers leapt by 93%, according to the latest annual state of malware report by security firm Malwarebytes.

Delaware announces cybersecurity partnership for high school girls


Delaware leaders are offering a free training opportunity for high school girls interested in a career in cybersecurity. The partnership between the state and the SANS Institute offers cybersecurity training for high school girls in Delaware to find out if they have talent or interest in the field through a free online game called, "Girls Go CyberStart".

CyberStart initiative focuses on signing up high school girls


Delaware is continuing its efforts to find the next generation of cybersecurity professionals. The First State has signed on to participate in the new GirlsGoCyberStart initiative this February.

Intel's CES keynote: CEO vows quick fix to security flaw


LAS VEGAS — Before unleashing a futuristic spectacle during his CES keynote here Monday night, Intel CEO Brian Krzanich addressed the recent security flaws in processors made by it and other chip makers.

Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2


According to developer Alex Ionescu, Apple introduced a fix in macOS 10.13.2, with additional tweaks set to be introduced in macOS 10.13.3, currently in beta testing. AppleInsider also says that it has heard from "multiple sources within Apple" that updates made in macOS 10.13.2 have mitigated "most" security concerns associated with the KPTI vulnerability.

Intel Responds to Security Research Findings


Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

Intel Flaw Affects Nearly Every Modern Day Device


Researchers have finally disclosed complete technical details of two kernel side-channel attacks, Meltdown and Spectre—which affect not only Intel but also systems and devices running AMD, ARM processors—allowing attackers to steal sensitive data from the system memory.

Delaware is getting ready for the future of cybersecurity: Delaware Voice


Delaware’s economy is based on innovation, and technology takes center stage. To be prepared to meet future demands, our state must focus on building a pipeline of talented security professionals.

F.C.C. Repeals Net Neutrality Rules


WASHINGTON — The Federal Communications Commission voted on Thursday to dismantle rules regulating the businesses that connect consumers to the internet, granting broadband companies the power to potentially reshape Americans’ online experiences.

Desperate for Cybersecurity Workers, States Help Build the Next Generation


Internships for veterans, cyber classes for high school and college students and mentoring programs — aimed especially at middle-school girls — are among the ways states are trying to beef up their cybersecurity ranks. Cybersecurity is the most pressing issue for state information technology officials, as hackers and cybercriminals increasingly take aim at government networks, which contain information such as Social Security, bank account and credit card numbers of millions of people and businesses.

Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities


Government agencies that deal with cybersecurity, like the National Security Agency, have two competing interests. On the one hand, they want to protect America's online infrastructure and economy from cyberattacks. On the other hand, government agencies want to harness tools to attack opponents in cyberspace.

Fake Amazon gift cards, phony Walmart sites and other cyber scams tempt holiday shoppers


Why wait for Black Friday — or Cyber Monday — to shop? After all, holiday shopping deals are all over the place already. But if you think you're too smart to get caught by a scammer, well, think again. Two in five U.S. consumers have fallen victim to an online phishing attack, according to a 2017 Cyber Monday Phishing Survey by DomainTools.

The top 5 malware threats targeting Macs


While Macs offer strong security protections, they are far from immune to malware, according to new data from security firm Avast. Since January 2017, Avast has blocked more than 250 million malware threats aimed at their Mac customers.

IoT devices are an enterprise security time bomb


The Internet of Things (IoT) is causing serious security concerns for enterprises worldwide with few companies capable of securing them as they are unable to identify devices properly, according to new research.

Sneaky fake WhatsApp app attracts more than 1 million downloads


A sneaky app maker pretended to be the actual WhatsApp service with an app called Update WhatsApp Messenger. But it copped the developer title "WhatsApp Inc."—the same title the actual Facebook-owned chat messenger uses on Google Play.

IoT Security Fail: Hacked Vacuum Cleaner Becomes Spy Cam


It doesn't take long for security research into IoT vulnerabilities to swerve into creepy territory. As more internet-capable home appliances with built-in cameras, microphones and sensors replace legacy appliances, the potential for exploitable security flaws that might be used for incredibly invasive privacy violations dramatically increases.

Cyber sages help small businesses tighten up


While you're out there living your life, cybercriminals are at work trying to get something that isn't theirs - all day, every night, on weekends and holidays, 24/7. You can see the constant combat on a map of the world - hundreds of thousands of real-time attacks - on security websites such as FireEye, whose CEO, David DeWalt, earned his degree in computer science at the University of Delaware.

New ransomware attack hits Russia and spreads around globe


Cybersecurity experts said the ransomware -- which posed as an Adobe update before locking down computers and demanding money for people to get their files back -- targeted Russian media companies and Ukrainian transportation systems. It has also been detected in other countries including the U.S., Germany, Japan, Turkey and Bulgaria.

Bad Rabbit ransomware attack bites Europe


Russia, Ukraine and Turkey are among the nations that have fallen victim to Bad Rabbit, which appears to be related to Petya.

Homeland Security and FBI issue cyber threat warning


CNBC's Eamon Javers reports government officials are warning of possible hacks on energy and industrial firms.

Governor Carney Launches “NSA Day of Cyber” School Challenge at Secure Delaware 2017


"Cybercrime is one of the greatest threats to our nation and we live in a world where we increasingly rely on electronic information storage and communication that must be protected,” said Governor Carney. “The importance of cyber security cannot be overstated, and Delaware’s innovation economy needs a talented pipeline of cyber security professionals."

OpenBracket coding competition doubles prize package in second year


OpenBracket goes into its second year with more than $100,000 in prizes. The figure doubled from the previous year.

The Equifax Data Breach: What to Do


If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.

Equifax breach exposed data for 143 million consumers


Credit monitor Equifax said Thursday that hackers have gained access to personal information belonging to 143 million U.S. consumers after exploiting a vulnerability on the company's website. Now the unwitting victims have to worry about the threat of having their identities stolen.

An FDA First: Cyber Recall for Implantable Device


The Food and Drug Administration on Tuesday issued an alert about the first recall of a network-connected implantable device due to cybersecurity vulnerabilities.

Governor Carney Signs Legislation Extending Cybersecurity Protections for Delawareans


NEWARK, Del. – Governor John Carney on Thursday signed into law House Substitute 1 for House Bill 180, legislation that requires additional protections for Delawareans whose personal information may be compromised in a computer breach, including additional notifications and free credit monitoring services.

Delaware Tech students win national cybersecurity competition


A group of Delaware Technical Community College students asserted their place as top cybersecurity talents after winning a national Capture-the-Flag competition on July 21.

Report: What States Are the Best for Data Innovation?


The Best States for Data Innovation, released on Monday, July 31 by the Washington, D.C.-based Center for Data Innovation, ranked Massachusetts, Washington and Maryland as the No. 1, 2 and 3 states overall. Delaware followed fourth-ranked California in rounding out the top five, while Utah placed sixth; Virginia got spot No. 7; Oregon placed eighth; transportation innovator Colorado ran ninth; and New York was 10th.

Delaware turns to high schoolers to bolster cybersecurity workforce


In a two-pronged approach to cultivate tech talent and create jobs, Delaware has launched a $650,000 cybersecurity training and scholarship program for high school and college students.

Gas Pump Skimmer Sends Card Data Via Text


Skimming devices that crooks install inside fuel station gas pumps frequently rely on an embedded Bluetooth component allowing thieves to collect stolen credit card data from the pumps wirelessly with any mobile device. The downside of this approach is that Bluetooth-based skimmers can be detected by anyone else with a mobile device. Now, investigators in the New York say they are starting to see pump skimmers that use cannibalized cell phone components to send stolen card data via text message.

Consumer Notice: Internet-Connected Toys Could Present Privacy and Contact Concerns for Children


The FBI encourages consumers to consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn and tailor their behaviors based on user interactions. These toys typically contain sensors, microphones, cameras, data storage components, and other multimedia capabilities – including speech recognition and GPS options. These features could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed.

Governor Carney, Chief Information Officer Announce Innovative Cybersecurity Partnership for Students


Governor John Carney announced on Friday a new, innovative cybersecurity training partnership between the SANS Institute and the State of Delaware that provides Delaware high school juniors and seniors at least 16 years old, and college students interested in a cybersecurity career, the opportunity to learn basic cybersecurity skills and test their aptitude through a no-cost online game of discovery called CyberStart.

Identifying and Reporting Common Scams


On July 6, 2017, the Federal Trade Commission (FTC) issued an alert on scammers posing as FTC officials who contact individuals and claim they have won prizes from a charity contest. The scammers ask for money to cover taxes or insurance costs associated with the prize. While this is a new malicious campaign, scammers use these basic tactics time and time again with slightly different wording to take advantage of unsuspecting individuals.

Inspiring Women in STEM Conference date, speakers announced


Two women helping to lead Delaware's future economic growth in the fields of science and technology will headline this year's Inspiring Women in STEM Conference. The annual conference is designed to provide professional development, skill building and networking for women in all fields of science and technology.

Cyberattack Hits Ukraine Then Spreads Internationally


Computer systems from Ukraine to the United States were struck on Tuesday in an international cyberattack that was similar to a recent assault that crippled tens of thousands of machines worldwide.

Ransomware virus hits computer servers across the globe


A ransomware attack hit computers across the world on Tuesday, taking out servers at Russia's biggest oil company, disrupting operations at Ukrainian banks, and shutting down computers at multinational shipping and advertising firms.

Delaware man with history of cyber theft under FBI scrutiny


A Delaware hacker, connected to high-profile, multimillion-dollar cyber thefts during the past decade, is a target of the FBI — evidenced by federal agents' recent seizure of a new BMW coupe and nearly $40,000 in cash from his Wilmington-area home.

A Cyberattack the World Isn’t Ready For


Mr. Ben-Oni has been sounding alarm bells, calling anyone who will listen at the White House, the Federal Bureau of Investigation, the New Jersey attorney general’s office and the top cybersecurity companies in the country to warn them about an attack that may still be invisibly striking victims undetected around the world.

Girl Scouts Look To Boost Interest in IT Careers With New Cybersecurity Badges


To inspire a familiarity and interest in cybersecurity among girls, the Girl Scouts of the USA partnered with Palo Alto Networks to create 18 new cybersecurity badges.

How WannaCry Survives


The ISMG Security Report leads with testimony from the CEO of the company that crippled WannaCry's ransomware component who explains to Congress how the worm continues to attack unpatched systems at increasing rates.

WSC Partners with SANS Institute CyberTalent


WSC to Partner with SANS Women’s Immersion Academy to Increase Participation of Women in the Information Security Workforce Collaboration to provide high-potential students with tuition-free, scholarship-based cybersecurity training. Review the Press Release.

How to Stop and Remediate WannaCry


The effects of WannaCry, the ransomware dominating international headlines, continue to be felt by organizations and individuals alike. If you or anyone you know has had a device infected, (ISC)2 has advice for stopping and remediating the attack.



This Act amends Chapter 12B of Title 6 to update Delaware's law regarding computer security breaches. This Act makes technical corrections to conform to the standards of the Delaware Legislative Drafting Manual, including the use of the term "person" to mean both an individual and an artificial entity.

In Computer Attacks, Clues Point to Frequent Culprit: North Korea


SAN FRANCISCO — Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.

WannaCry: Everything You Need To Know About the Ransomware Sweeping the Globe


A massive cyberattack has been spreading across the globe since Friday, May 12, 2017, hitting hundred of thousands of computers and crippling major government and corporate operations. The malware is known as WannaCry, and here's what you need to know.

Alert (TA17-132A) Indicators Associated With WannaCry Ransomware


The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours, with initial reports beginning around 4:00 AM EDT, May 12, 2017. Open-source reporting indicates a requested ransom of .1781 bitcoins, roughly $300 U.S.

More than 300 girls celebrated DigiGirlz


“Find your passion and figure out how to turn it into a career. Then work won’t seem like work,” State Cyber Security Officer Elayne Starkey encouraged the nearly 300 teen girls who attended DigiGirlz Day Tuesday.

Netflix Episodes Posted After Hackers Demand Ransom


Alleged ‘Orange Is the New Black’ Episodes Posted After Hackers Demand Ransom. Fans of the Netflix prison drama "Orange Is the New Black" face a dilemma after hackers claimed to have leaked most of the new season's 13 episodes this weekend — wait more than a month for the official release date or give in and download the pirated shows.

Ransomware became three times more expensive in 2016


In 2015, the average profit for a cyber thief through ransomware was $294. Symantec found in its Internet Security Threat Report that demands have more than tripled, jumping up 266 percent to an average $1,077 per victim. Depending on how important the files are, it might be cheaper to just buy a new computer.

Is really The answer: Maybe.


People are being warned about an old phishing technique capable of duping even the most clued-up internet users. The attack exploits the fact that lots of different characters look identical.

Attack Sets off 156 Emergency Alarm Sirens in Dallas


An attack set off all the emergency sirens in Dallas, Texas, for a spell of around 90 minutes on Friday night. As reported by Reuters, the attack successfully triggered 156 sirens, normally used to warn of dangerous weather conditions such as tornadoes, at 11.42 p.m. CDT. It took engineers until 1:17 a.m. on Saturday to manually shut down the sirens’ radio system and repeaters.

These Hackers Want To Do Your Taxes, And Take Your Refund Too


The tax deadline this year is April 18, but thieves looking to steal tax returns likely started as early as January, sending about 300 to 1,000 scams a week. If they don't file a fraudulent tax return before the real person does, the thief simply moves on to the next victim.

Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting


Cybersecurity has a gender problem: Only 11% of the world's information security workforce are women, according to the Women's Society of Cyberjutsu (WSC) -- a 501(c)3 non-profit passionate about helping and empowering women to succeed in the Cybersecurity field.

Feds Pull FAFSA Tool After Potential Data Breach


Families applying for federal student aid are facing extra hurdles this year after a potential data breach led federal officials to remove an online tool that smoothed the process. The Education Department and the Internal Revenue Service said Thursday that an online service known as the Data Retrieval Tool will stay offline for the rest of this application season. In the past, families could use the tool to import their tax information automatically to the Free Application for Federal Student Aid, a complex form needed to get federal aid.

If Your iPhone is Stolen, These Guys May Try to iPhish You


KrebsOnSecurity recently featured the story of a Brazilian man who was peppered with phishing attacks trying to steal his Apple iCloud username and password after his wife’s phone was stolen in a brazen daylight mugging. Today, we’ll take an insider’s look at an Apple iCloud phishing gang that appears to work quite closely with organized crime rings — within the United States and beyond — to remotely unlock and erase stolen Apple devices.

Tech Roundup


On Tuesday, WikiLeaks released a huge cache of documents that detail how the C.I.A. has collected various types of cyberweapons, including so-called zero-day vulnerabilities that would expose iPhones, Android phones, Windows and Linux computers, internet-connected televisions and maybe even high-tech cars to hackers.

Breaches Affecting 500 or More Individuals


U.S. Department of Health and Human Services, as required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches. Additionally, this new format includes brief summaries of the breach cases that OCR has investigated and closed, as well as the names of private practice providers who have reported breaches of unsecured protected health information to the Secretary.

Here Is How to Fend Off a Hijacking of Home Devices


MODERN homes today are getting internet-connected light bulbs, thermostats, TVs and speakers. So with a simple voice command or the touch of a button on our smartphones, we can set the temperature, turn on a light or prepare the TV to record a program. What could go wrong?

IRS to Delay Tax Refunds as a Security Precaution


Refunds for more than 40 million low-income families could be delayed by the IRS this year, as the tax agency looks to leverage the extra time to combat identity theft and fraud.

19,000 Delaware Blue Cross Blue Shield members' data breached


Two subcontractors of Highmark Blue Cross Blue Shield of Delaware were breached in an incident that has compromised 16 of the insurer's self-insured customers and about 19,000 of their members.

Hackers and passwords: Your guide to data breaches


Oh great, another data breach. That’s what you’re likely to think when a yet another company or organization that had your personal information tells you it’s been hacked. Whether it’s Yahoo, Ashley Madison or the U.S. Office of Personnel Management you’re hearing from, these notifications are often filled with technical terms and legalistic phrasing.

Yahoo Says 1 Billion User Accounts Were Hacked


SAN FRANCISCO — Yahoo, already reeling from its September disclosure that 500 million user accounts had been hacked in 2014, disclosed Wednesday that a different attack in 2013 compromised more than 1 billion accounts

91% Of Cyberattacks Start With A Phishing Email


Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.

Senate and House Leaders Call for Inquiry of Russian Hacking in Election


WASHINGTON — The top two Republicans in Congress said on Monday that they supported investigations into possible Russian cyberattacks to influence the American election. “Any foreign breach of our cybersecurity measures is disturbing, and I strongly condemn any such efforts,” said Senator Mitch McConnell, Republican of Kentucky and the majority leader, adding, “The Russians are not our friends.”

5 State and Local CISOs Who Are Keeping Watch on Cybersecurity Issues


Meet a few of the many IT security leaders at the state, county and city levels who work hard to keep citizen and government data safe.

2017 State CIO Priorities Reflect Importance of Security and Strategic Enterprise Thinking


This year, the State CIO Top Ten shows information technology (IT) security strategies and tools are at the top of the list across the states, with security topping the list of priority strategies for the third consecutive year. Cloud services and consolidation/optimization remain at the top as second and third rated priorities.

Regulate Cybersecurity or Expect a Disaster, Experts Warn Congress


The U.S. government must demand that all internet-connected devices have built-in security, according to experts who warned Congress that the country could soon face a disastrous, lethal cyberattack.

Homeland Security Chief Discusses Cybersecurity at DSU


Gov. Jack Markell is joining the head of the federal Department of Homeland Security for a discussion about cybersecurity.

NIST out with Cyber Workforce ‘Dictionary’


Federal scientists Wednesday published a draft “dictionary” aiming to help businesses figure out whom they should hire, with the guide describing every kind of cybersecurity job and cataloging the knowledge and skills needed to do them well.

FCC Approves Broadband Privacy Rules to Protect Consumers


The Federal Communications Commission (FCC) has voted to approve new broadband privacy rules that will give consumers greater control over how their personal information is collected and shared by internet service providers (ISPs). But consumers won't see the changes right away.

Cybersecurity is the new plastics


Though it dates me, I smile over the line in the classic movie "The Graduate," where a young Dustin Hoffman is counseled to consider what "plastics" could mean to his future.

Officials Talk Cyber Security at Lewes Public Library


(LEWES, Del.) - Officials from Delaware State Department of Technology and Information presented cyber security tips at the Lewes Public Library in Sussex County.

U.S. CISO Wants to Lean on Freelance Hackers to Improve .gov Security


The U.S.’ first Chief Information Security Officer outlined Tuesday a series of strategic plans he hopes to execute during his tenure including the possible expansion of a massive bug bounty program across all .gov domains.

Want a sure-fire well-paid job? Train to fight computer hackers.


Try the booming field of cybersecurity. Companies can’t hire fast enough. In the United States, companies report 209,000 cybersecurity jobs that are in need of filling.

NSA Contractor Arrested; Charged With Stealing Top Secret Info


The FBI secretly arrested a Booz Allen Hamilton contractor in August on suspicion of stealing hacking tools used by the National Security Agency to break into foreign governments’ computer networks, according to federal prosecutors.

The Internet Is Breaking. Here’s How To Save It


This Internet has driven the greatest expansion of the global economy since the Industrial Revolution. The promise of information technology is extraordinary. But it is still a promise, and it’s one people are starting to question. The NTIA recently announced that fully half of all Americans are actually backing away from the Internet due to security and privacy fears.

NIST Launches Self-Assessment Tool for Cybersecurity


The draft tool was released Sept. 15 at the Internet Security Alliance’s annual conference in Washington, D.C. by Deputy Secretary of Commerce Bruce Andrews.

500 Million Yahoo Accounts Breached


SAN FRANCISCO — Information from at least 500 million Yahoo accounts was stolen from the company in 2014, and the company said Thursday it believes that a state-sponsored actor was behind the hack.

The remarkable roots of Security BSides Delaware, the First State’s Cyber Gem.


Cybersecurity has been a hot button issue for the First State, which is why events such as Security BSides are so important to us right now. Last year, the event took place during Delaware Innovation Week. This year, it will be a standalone event on the weekend of Oct. 7 at Wilmington University.

Cyber Bullying: Whose Domain Is It Anyway?


School officials and the attorney general are taking tough actions against online bullies. But they say that parents need to teach—and monitor—their kids.

Inside the FBI: Director Comey Addresses Cyber Security Experts


FBI Director James Comey presented the morning government keynote address to cyber security experts at the Symantec Government Symposium in Washington, D.C. on August 30, 2016

A Hacker's Best Friend is a Nice Employee


LAS VEGAS — When it comes to hacking, the most dangerous thing at most companies may not be their computer network but the lowly desk telephone. “You can get everything you need — information about their security, their operating system, what kind of computers they use. Just with a call,” said Chris Silvers.

Why the White House's Cyber Commission is Asking the Public for Advice


The White House’s Commission on Enhancing National Cybersecurity is launching a public plea for help Wednesday in understanding the “current and future states of cybersecurity in the digital economy.” "The commission will make detailed recommendations to strengthen cybersecurity in both the public and private sectors,” the notice reads​.

In a Major Cyber-hack, Whom Do You Call? The White House Spells it Out


NEW YORK — President Obama approved a new directive Tuesday that spells out for the first time in writing how the government handles significant cyber-incidents. The directive lets the public know which agency handles what, answering an oft-heard question after a breach: Whom do I call for help?

MS-ISAC official: Ransomware is Top Malware of Concern for States, Counties


Government IT systems are under rising attack from ransomware threats, security experts told executives at the National Association of Counties conference.

Delaware Cyber Challenge tests skills of computer ‘whiz kids’


DOVER –– The seventh Delaware-hosted U.S. Cyber Challenge drew 50 participants to Delaware State University last week ranging in age from 16 to 50 –– all looking to improve their skills in cyber security. “It’s really about sharpening your computer skills,” said John Foss, 48, of Dover. “You may be at home thinking you’re really skilled with computers, but you come here and see there is so much you don’t know yet.”

Cybersecurity Boot Camp Looks to help Build Workforce for Growing Field


This week’s cybersecurity boot camp at DSU is a partnership with the U.S. Cyber Challenge. Marwan Rasamny, chair of DSU’s computer information science department, said these camps are needed to help participants keep up with the ever-changing tech landscape.

U.S. Cyber Challenge and DE Universities Hosting Annual Cybersecurity Boot Camp & Competition this week in Dover


For four days, participants will develop their cybersecurity skills through intensive classroom instruction by industry experts. On the final day, campers will compete in a cyber-attack and defense competition.

Cybersecurity Boot Camp


For four days, participants will develop their cybersecurity skills through intensive classroom instruction. Curriculum at the Delaware camp will include in-depth workshops on a range of topics including packet crafting and pen testing, all taught by college faculty, SANS Institute senior instructors and other cybersecurity experts.

U.S. Cyber Challenge and Delaware Universities to Host Annual Cybersecurity Boot Camp & Competition


Arlington, VA, July 6, 2016 – Next week, U.S. Cyber Challenge (USCC) will host the 7th annual State of Delaware Summer Cyber Camp program in collaboration with the University of Delaware, Delaware State University, Wilmington University, Delaware Technical Community College (Delaware Tech) and the Delaware Department of Technology and Information (DTI) from July 11-15, 2016.

Hackers discover more than 100 vulnerabilities in Pentagon websites


WASHINGTON – High-tech hackers brought in by the Pentagon to breach Defense Department websites were able to burrow in and find 138 different security gaps, Defense Secretary Ash Carter said Friday.

Phone Scam ‘Onslaught’ Has Authorities Scrambling


Authorities are fighting a scourge of phone crime enabled by cheap technology that blasts out nefarious calls and hides wrongdoers’ whereabouts. The scammers are heavily targeting the elderly, sparking a push in Congress to fight back.

Delaware Students Look at Tech Careers


DigiGirlz Day: In New Castle County Delaware, 150 young girls got an inside look at careers in technology.

Incidents of Ransomware on the Rise


Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.

Wireless Keystroke Logger Disguised as USB Device Charger Targets Wireless Keyboards


KeySweeper is a covert device that resembles a functional Universal Serial Bus (USB) enabled device charger which conceals hardware capable of harvesting keystrokes from certain wireless keyboards.

7 Ways to Protect Yourself From Credit Card Fraud at Gas Stations


Consumers typically worry about credit card fraud when making purchases online or conducting ATM transactions, but over the past few years, fraudulent credit card activity has taken the form of gas station scams that use technology to victimize patrons. The key to staying safe is understanding how to protect yourself from identity theft and credit card fraud.

Preview: Hacking Your Phone


Everything is hackable, especially your cellphone, as Sharyn Alfonsi finds out with demonstrations from professional hackers who act as security consultants. Alfonsi reports on Sunday.

Walmart Mystery Shopper Scam Resurfaces


A mystery shopper scam targeting Walmart customers, which has been around since at least 2011, has resurfaced. Reports of the scam have started circulating on Facebook and other parts of the Web, from people who have gotten checks of up to $2,000 in the mail.

FBI May Have Put Down Sword, but Privacy Debate Goes On


The immediate fight between Apple and the Federal Bureau of Investigation over opening a locked iPhone used by one of the attackers in last year’s San Bernardino, Calif., rampage is over. But the effects of the case linger.

FBI wants U.S. Businesses to Help as Cyber Extortion Gains Urgency


The FBI is asking businesses and software security experts for emergency assistance in its investigation into a pernicious new type of "ransomware" virus used by hackers for extortion.

Spear phishing data breach hits SevOne


SevOne fell victim to a cybersecurity attack that has put current and former employees at risk for identity fraud. The tech company has confirmed it released W-2 wage and tax data to an unauthorized recipient outside the company. That information is believed to include Social Security numbers, home addresses, dates of birth and other personal information criminals can use to file false tax returns and commit other forms of identity theft.

Padua 'Cyber Patriots' Take State Title


For the third straight year, students at Padua Academy won the state's Cyber Patriot competition which test youths abilities to find an eliminate malware from computers.

Four Cybersecurity Events Planned Throughout Delaware


Viruses, worms, Trojan horses and even ransomware: Online attacks pose a serious threat to major corporations, small businesses, nonprofits and individuals. Cyber attacks cause an estimated $400 billion a year in damages and lingering disruptions....

Grant to help Del Tech Expand IT Training Efforts


Delaware Tech has received a grant to expand training opportunities for those interested in pursuing careers in IT.

Beware downloading some apps or risk "being spied on"


Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

Obama’s Last Budget, and Last Budget Battle with Congress


President Obama on Tuesday sent his final annual budget proposal to a hostile Republican-led Congress, seeking $19 billion for a broad new cybersecurity initiative and rejecting the lame-duck label as he declared that his plan “is about looking forward.”

N.J. Health Care Cyber Groups Strike Information Sharing Deal


The National Healthcare Information Sharing and Analysis Center, known as NH-ISAC, is teaming up with the New Jersey Cybersecurity and Communications Integration Cell, a state fusion center aimed at encouraging cooperation on cyber issues among all levels of government and the private sector. Under the new agreement, announced late last month, the two centers will begin sharing data on possible threats their systems detect, as well as analyses on the significance of that data.

Cybersecurity nonprofit addresses 2016 threats for states, localities


As 2016 opens, Thomas Duffy, chair of the Multi-State Information Sharing and Analysis Center that’s run by the nonprofit, walked StateScoop through the threats he’s hoping to prepare government IT workers to face over the coming months.

Virginia gov. plans nearly $22M in cyber investments through 2018


Virginia Gov. Terry McAuliffe is hoping to make a sizable investment in cybersecurity over the next two years, including nearly $22 million in planned investments in cyber programs in his new biennial budget proposal.

House passes bill authorizing Secret Service cybercrime training for state, local cops, prosecutors.


The House has passed a bill to authorize the Secret Service to provide training to state and local officials to help them better combat cybercrime.

The Serial Swatter


Internet trolls have learned to exploit our over-militarized police. It's a crime that's hard to stop — and hard to prosecute. Janet was sleeping fitfully in her parents’ home in Toronto. She had gone home for the weekend in a state of nervous collapse. For months, someone going by the name ‘‘Obnoxious’’ had been harassing her online.

Delaware convenes new cybersecurity advisory council


Delaware Gov. Jack Markell is taking new steps to promote cooperation on cybersecurity initiatives among the state’s agencies and between the public and private sectors. Chief Information Officer James Collins will lead the new group of government and business leaders as they work to bolster the security of the state's infrastructure and share information about cyberthreats.

Governor Markell pays tribute to Neela Moody, National Winner of the K-12 Computer Safety Poster Contest


Announcing the Executive Order in his legislative hall office today, the Governor also presented a tribute to Gallaher Elementary fifth grade student Neela Moody as the national winner of the K-12 Computer Safety Poster Contest, with her submission finishing first among more than 600 entries.

Governor Markell establishes cyber security council, Executive Order 55


Dover, DE – Recognizing the ever-increasing need to strengthen online safety and security in a society that relies heavily on the internet, Governor Markell today signed Executive Order 55, establishing the Delaware Cyber Security Advisory Council.

Governor Jack A. Markell's Weekly Message: "Protecting Our Economy by Promoting Online Safety"


Governor Markell explains the importance of internet safety and security as Delaware recognizes October as Cyber Security Awareness Month.

Governor Jack Markell Proclaims October 2015 Cyber Security Awareness Month


Governor Markell signed a formal proclamation signifying that Delaware is joining a growing global effort among colleges, universities, businesses, government agencies, associations, nonprofit organizations, and individuals to promote online safety awareness.

Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers


CHANTILLY, Va. — On a recent Wednesday morning, 100 intelligence analysts crammed into a nondescript conference room here and dialed into a group call with 100 counterparts in Argentina, Brazil, Cyprus, India, the Netherlands, Romania, Spain, Taiwan and Ukraine. As they worked their way around the room, the analysts briefed one another on the latest developments in the “dark web.”

Maryland school district uses texting service to cut down on bullying


Queen Anne's County Public Schools uses a service called Text 2 Stop It!, which has partnered with a government IT solutions provider to make its services available to the public sector.

Delaware moves to protect student data


Delaware and other states are working to make sure the information they keep about students is kept safe and private as computers become more prominent in classrooms – and educators lean more on scores and data in teaching.

Senate Bill Aims To Lock Hackers Out Of Connected Cars


The road to our connected future may be paved with good intentions, but it may not be secure enough to drive on.

Counties rally around collaboration through cybersecurity


CHARLOTTE, N.C. — In an era of highly-publicized breaches of personally identifiable information, technology officials at all levels of government are looking to find ways to best protect the data on their networks.

Unprecedented Verdict in Delaware Cyberstalking Case


A federal jury in Wilmington, Delaware, has convicted three family members of a courthouse shooter of cyberstalking causing death.

Hacking of Government Computers Exposed 21.5 Million People


WASHINGTON — The Obama administration on Thursday revealed that 21.5 million people were swept up in a colossal breach of government computer systems that was far more damaging than initially thought, resulting in the theft of a vast trove of personal information, including Social Security numbers and some fingerprints.

Security Experts Oppose Government Access to Encrypted Communication


SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world's most confidential data and critical infrastructure in danger.

Cardinals Investigated for Hacking Into Astros' Database


WASHINGTON — Front-office personnel for the St. Louis Cardinals, one of the most successful teams in baseball over the past two decades, are under investigation by the F.B.I. and Justice Department prosecutors, accused of hacking into an internal network of the Houston Astros to steal closely guarded information about players.

6 Chinese Men Indicted in Theft of Code From U.S. Tech Companies


WASHINGTON — The Obama administration on Tuesday announced the arrest of a Chinese professor and the indictment of five other Chinese citizens in what it contended was a decade-long scheme to steal microelectronics designs from American companies on behalf of the Chinese government.

How to Protect Yourself Against 'Free WiFi' Scams


Security experts warn that cyber criminals are setting up fake WiFi hotspots, luring consumers to hand over the keys to their computers.

Obama Unveils Cyber Training Innitiative


Program Aims to Bolster Nation's High-Tech Workforce

2014 Cyber Security Poster Contest Winners


Narae Y. from Gallagher Elementary School, Alaina R. from All Saints Catholic School, and Neela M. from Gallagher Elementary School.

HP Predicts Major Cyberattack in Next Five years


"We expect an attack that will cause significant and lasting damage to a major world economy through physical and economic impacts," he told the European Information Security Summit 2015 in London.

Congress, '60 Minutes' Exaggerate Threat Of Car Hacking


The connected car is under attack. Not from hackers, just yet. But from the media and policymakers at the moment.