To inspire a familiarity and interest in cybersecurity among girls, the Girl Scouts of the USA partnered with Palo Alto Networks to create 18 new cybersecurity badges.
The ISMG Security Report leads with testimony from the CEO of the company that crippled WannaCry's ransomware component who explains to Congress how the worm continues to attack unpatched systems at increasing rates.
The effects of WannaCry, the ransomware dominating international headlines, continue to be felt by organizations and individuals alike. If you or anyone you know has had a device infected, (ISC)2 has advice for stopping and remediating the attack.
AN ACT TO AMEND TITLE 6 OF THE DELAWARE CODE RELATING TO BREACHES OF SECURITY INVOLVING PERSONAL INFORMATION.
This Act amends Chapter 12B of Title 6 to update Delaware's law regarding computer security breaches. This Act makes technical corrections to conform to the standards of the Delaware Legislative Drafting Manual, including the use of the term "person" to mean both an individual and an artificial entity.
SAN FRANCISCO — Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.
A massive cyberattack has been spreading across the globe since Friday, May 12, 2017, hitting hundred of thousands of computers and crippling major government and corporate operations. The malware is known as WannaCry, and here's what you need to know.
The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours, with initial reports beginning around 4:00 AM EDT, May 12, 2017. Open-source reporting indicates a requested ransom of .1781 bitcoins, roughly $300 U.S.
“Find your passion and figure out how to turn it into a career. Then work won’t seem like work,” State Cyber Security Officer Elayne Starkey encouraged the nearly 300 teen girls who attended DigiGirlz Day Tuesday.
Alleged ‘Orange Is the New Black’ Episodes Posted After Hackers Demand Ransom. Fans of the Netflix prison drama "Orange Is the New Black" face a dilemma after hackers claimed to have leaked most of the new season's 13 episodes this weekend — wait more than a month for the official release date or give in and download the pirated shows.
In 2015, the average profit for a cyber thief through ransomware was $294. Symantec found in its Internet Security Threat Report that demands have more than tripled, jumping up 266 percent to an average $1,077 per victim. Depending on how important the files are, it might be cheaper to just buy a new computer.
People are being warned about an old phishing technique capable of duping even the most clued-up internet users. The attack exploits the fact that lots of different characters look identical.
An attack set off all the emergency sirens in Dallas, Texas, for a spell of around 90 minutes on Friday night. As reported by Reuters, the attack successfully triggered 156 sirens, normally used to warn of dangerous weather conditions such as tornadoes, at 11.42 p.m. CDT. It took engineers until 1:17 a.m. on Saturday to manually shut down the sirens’ radio system and repeaters.
The tax deadline this year is April 18, but thieves looking to steal tax returns likely started as early as January, sending about 300 to 1,000 scams a week. If they don't file a fraudulent tax return before the real person does, the thief simply moves on to the next victim.
Cybersecurity has a gender problem: Only 11% of the world's information security workforce are women, according to the Women's Society of Cyberjutsu (WSC) -- a 501(c)3 non-profit passionate about helping and empowering women to succeed in the Cybersecurity field.
Families applying for federal student aid are facing extra hurdles this year after a potential data breach led federal officials to remove an online tool that smoothed the process. The Education Department and the Internal Revenue Service said Thursday that an online service known as the Data Retrieval Tool will stay offline for the rest of this application season. In the past, families could use the tool to import their tax information automatically to the Free Application for Federal Student Aid, a complex form needed to get federal aid.
KrebsOnSecurity recently featured the story of a Brazilian man who was peppered with phishing attacks trying to steal his Apple iCloud username and password after his wife’s phone was stolen in a brazen daylight mugging. Today, we’ll take an insider’s look at an Apple iCloud phishing gang that appears to work quite closely with organized crime rings — within the United States and beyond — to remotely unlock and erase stolen Apple devices.
On Tuesday, WikiLeaks released a huge cache of documents that detail how the C.I.A. has collected various types of cyberweapons, including so-called zero-day vulnerabilities that would expose iPhones, Android phones, Windows and Linux computers, internet-connected televisions and maybe even high-tech cars to hackers.
U.S. Department of Health and Human Services, as required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches. Additionally, this new format includes brief summaries of the breach cases that OCR has investigated and closed, as well as the names of private practice providers who have reported breaches of unsecured protected health information to the Secretary.
MODERN homes today are getting internet-connected light bulbs, thermostats, TVs and speakers. So with a simple voice command or the touch of a button on our smartphones, we can set the temperature, turn on a light or prepare the TV to record a program. What could go wrong?
Refunds for more than 40 million low-income families could be delayed by the IRS this year, as the tax agency looks to leverage the extra time to combat identity theft and fraud.
Two subcontractors of Highmark Blue Cross Blue Shield of Delaware were breached in an incident that has compromised 16 of the insurer's self-insured customers and about 19,000 of their members.
Oh great, another data breach. That’s what you’re likely to think when a yet another company or organization that had your personal information tells you it’s been hacked. Whether it’s Yahoo, Ashley Madison or the U.S. Office of Personnel Management you’re hearing from, these notifications are often filled with technical terms and legalistic phrasing.
SAN FRANCISCO — Yahoo, already reeling from its September disclosure that 500 million user accounts had been hacked in 2014, disclosed Wednesday that a different attack in 2013 compromised more than 1 billion accounts
Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.
WASHINGTON — The top two Republicans in Congress said on Monday that they supported investigations into possible Russian cyberattacks to influence the American election. “Any foreign breach of our cybersecurity measures is disturbing, and I strongly condemn any such efforts,” said Senator Mitch McConnell, Republican of Kentucky and the majority leader, adding, “The Russians are not our friends.”
Meet a few of the many IT security leaders at the state, county and city levels who work hard to keep citizen and government data safe.
This year, the State CIO Top Ten shows information technology (IT) security strategies and tools are at the top of the list across the states, with security topping the list of priority strategies for the third consecutive year. Cloud services and consolidation/optimization remain at the top as second and third rated priorities.
The U.S. government must demand that all internet-connected devices have built-in security, according to experts who warned Congress that the country could soon face a disastrous, lethal cyberattack.
Gov. Jack Markell is joining the head of the federal Department of Homeland Security for a discussion about cybersecurity.
Federal scientists Wednesday published a draft “dictionary” aiming to help businesses figure out whom they should hire, with the guide describing every kind of cybersecurity job and cataloging the knowledge and skills needed to do them well.
The Federal Communications Commission (FCC) has voted to approve new broadband privacy rules that will give consumers greater control over how their personal information is collected and shared by internet service providers (ISPs). But consumers won't see the changes right away.
Though it dates me, I smile over the line in the classic movie "The Graduate," where a young Dustin Hoffman is counseled to consider what "plastics" could mean to his future.
(LEWES, Del.) - Officials from Delaware State Department of Technology and Information presented cyber security tips at the Lewes Public Library in Sussex County.
The U.S.’ first Chief Information Security Officer outlined Tuesday a series of strategic plans he hopes to execute during his tenure including the possible expansion of a massive bug bounty program across all .gov domains.
Try the booming field of cybersecurity. Companies can’t hire fast enough. In the United States, companies report 209,000 cybersecurity jobs that are in need of filling.
The FBI secretly arrested a Booz Allen Hamilton contractor in August on suspicion of stealing hacking tools used by the National Security Agency to break into foreign governments’ computer networks, according to federal prosecutors.
This Internet has driven the greatest expansion of the global economy since the Industrial Revolution. The promise of information technology is extraordinary. But it is still a promise, and it’s one people are starting to question. The NTIA recently announced that fully half of all Americans are actually backing away from the Internet due to security and privacy fears.
The draft tool was released Sept. 15 at the Internet Security Alliance’s annual conference in Washington, D.C. by Deputy Secretary of Commerce Bruce Andrews.
SAN FRANCISCO — Information from at least 500 million Yahoo accounts was stolen from the company in 2014, and the company said Thursday it believes that a state-sponsored actor was behind the hack.
Cybersecurity has been a hot button issue for the First State, which is why events such as Security BSides are so important to us right now. Last year, the event took place during Delaware Innovation Week. This year, it will be a standalone event on the weekend of Oct. 7 at Wilmington University.
School officials and the attorney general are taking tough actions against online bullies. But they say that parents need to teach—and monitor—their kids.
FBI Director James Comey presented the morning government keynote address to cyber security experts at the Symantec Government Symposium in Washington, D.C. on August 30, 2016
LAS VEGAS — When it comes to hacking, the most dangerous thing at most companies may not be their computer network but the lowly desk telephone. “You can get everything you need — information about their security, their operating system, what kind of computers they use. Just with a call,” said Chris Silvers.
The White House’s Commission on Enhancing National Cybersecurity is launching a public plea for help Wednesday in understanding the “current and future states of cybersecurity in the digital economy.” "The commission will make detailed recommendations to strengthen cybersecurity in both the public and private sectors,” the notice reads.
NEW YORK — President Obama approved a new directive Tuesday that spells out for the first time in writing how the government handles significant cyber-incidents. The directive lets the public know which agency handles what, answering an oft-heard question after a breach: Whom do I call for help?
Government IT systems are under rising attack from ransomware threats, security experts told executives at the National Association of Counties conference.
DOVER –– The seventh Delaware-hosted U.S. Cyber Challenge drew 50 participants to Delaware State University last week ranging in age from 16 to 50 –– all looking to improve their skills in cyber security. “It’s really about sharpening your computer skills,” said John Foss, 48, of Dover. “You may be at home thinking you’re really skilled with computers, but you come here and see there is so much you don’t know yet.”
This week’s cybersecurity boot camp at DSU is a partnership with the U.S. Cyber Challenge. Marwan Rasamny, chair of DSU’s computer information science department, said these camps are needed to help participants keep up with the ever-changing tech landscape.
U.S. Cyber Challenge and DE Universities Hosting Annual Cybersecurity Boot Camp & Competition this week in Dover
For four days, participants will develop their cybersecurity skills through intensive classroom instruction by industry experts. On the final day, campers will compete in a cyber-attack and defense competition.
For four days, participants will develop their cybersecurity skills through intensive classroom instruction. Curriculum at the Delaware camp will include in-depth workshops on a range of topics including packet crafting and pen testing, all taught by college faculty, SANS Institute senior instructors and other cybersecurity experts.
Arlington, VA, July 6, 2016 – Next week, U.S. Cyber Challenge (USCC) will host the 7th annual State of Delaware Summer Cyber Camp program in collaboration with the University of Delaware, Delaware State University, Wilmington University, Delaware Technical Community College (Delaware Tech) and the Delaware Department of Technology and Information (DTI) from July 11-15, 2016.
WASHINGTON – High-tech hackers brought in by the Pentagon to breach Defense Department websites were able to burrow in and find 138 different security gaps, Defense Secretary Ash Carter said Friday.
Authorities are fighting a scourge of phone crime enabled by cheap technology that blasts out nefarious calls and hides wrongdoers’ whereabouts. The scammers are heavily targeting the elderly, sparking a push in Congress to fight back.
DigiGirlz Day: In New Castle County Delaware, 150 young girls got an inside look at careers in technology.
Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.
KeySweeper is a covert device that resembles a functional Universal Serial Bus (USB) enabled device charger which conceals hardware capable of harvesting keystrokes from certain wireless keyboards.
Consumers typically worry about credit card fraud when making purchases online or conducting ATM transactions, but over the past few years, fraudulent credit card activity has taken the form of gas station scams that use technology to victimize patrons. The key to staying safe is understanding how to protect yourself from identity theft and credit card fraud.
Everything is hackable, especially your cellphone, as Sharyn Alfonsi finds out with demonstrations from professional hackers who act as security consultants. Alfonsi reports on Sunday.
A mystery shopper scam targeting Walmart customers, which has been around since at least 2011, has resurfaced. Reports of the scam have started circulating on Facebook and other parts of the Web, from people who have gotten checks of up to $2,000 in the mail.
The immediate fight between Apple and the Federal Bureau of Investigation over opening a locked iPhone used by one of the attackers in last year’s San Bernardino, Calif., rampage is over. But the effects of the case linger.
The FBI is asking businesses and software security experts for emergency assistance in its investigation into a pernicious new type of "ransomware" virus used by hackers for extortion.
SevOne fell victim to a cybersecurity attack that has put current and former employees at risk for identity fraud. The tech company has confirmed it released W-2 wage and tax data to an unauthorized recipient outside the company. That information is believed to include Social Security numbers, home addresses, dates of birth and other personal information criminals can use to file false tax returns and commit other forms of identity theft.
For the third straight year, students at Padua Academy won the state's Cyber Patriot competition which test youths abilities to find an eliminate malware from computers.
Viruses, worms, Trojan horses and even ransomware: Online attacks pose a serious threat to major corporations, small businesses, nonprofits and individuals. Cyber attacks cause an estimated $400 billion a year in damages and lingering disruptions....
Delaware Tech has received a grant to expand training opportunities for those interested in pursuing careers in IT.
Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.
President Obama on Tuesday sent his final annual budget proposal to a hostile Republican-led Congress, seeking $19 billion for a broad new cybersecurity initiative and rejecting the lame-duck label as he declared that his plan “is about looking forward.”
The National Healthcare Information Sharing and Analysis Center, known as NH-ISAC, is teaming up with the New Jersey Cybersecurity and Communications Integration Cell, a state fusion center aimed at encouraging cooperation on cyber issues among all levels of government and the private sector. Under the new agreement, announced late last month, the two centers will begin sharing data on possible threats their systems detect, as well as analyses on the significance of that data.
As 2016 opens, Thomas Duffy, chair of the Multi-State Information Sharing and Analysis Center that’s run by the nonprofit, walked StateScoop through the threats he’s hoping to prepare government IT workers to face over the coming months.
Virginia Gov. Terry McAuliffe is hoping to make a sizable investment in cybersecurity over the next two years, including nearly $22 million in planned investments in cyber programs in his new biennial budget proposal.
House passes bill authorizing Secret Service cybercrime training for state, local cops, prosecutors.
The House has passed a bill to authorize the Secret Service to provide training to state and local officials to help them better combat cybercrime.
Internet trolls have learned to exploit our over-militarized police. It's a crime that's hard to stop — and hard to prosecute. Janet was sleeping fitfully in her parents’ home in Toronto. She had gone home for the weekend in a state of nervous collapse. For months, someone going by the name ‘‘Obnoxious’’ had been harassing her online.
Delaware Gov. Jack Markell is taking new steps to promote cooperation on cybersecurity initiatives among the state’s agencies and between the public and private sectors. Chief Information Officer James Collins will lead the new group of government and business leaders as they work to bolster the security of the state's infrastructure and share information about cyberthreats.
Governor Markell pays tribute to Neela Moody, National Winner of the K-12 Computer Safety Poster Contest
Announcing the Executive Order in his legislative hall office today, the Governor also presented a tribute to Gallaher Elementary fifth grade student Neela Moody as the national winner of the K-12 Computer Safety Poster Contest, with her submission finishing first among more than 600 entries.
Dover, DE – Recognizing the ever-increasing need to strengthen online safety and security in a society that relies heavily on the internet, Governor Markell today signed Executive Order 55, establishing the Delaware Cyber Security Advisory Council.
Governor Markell explains the importance of internet safety and security as Delaware recognizes October as Cyber Security Awareness Month.
Governor Markell signed a formal proclamation signifying that Delaware is joining a growing global effort among colleges, universities, businesses, government agencies, associations, nonprofit organizations, and individuals to promote online safety awareness.
CHANTILLY, Va. — On a recent Wednesday morning, 100 intelligence analysts crammed into a nondescript conference room here and dialed into a group call with 100 counterparts in Argentina, Brazil, Cyprus, India, the Netherlands, Romania, Spain, Taiwan and Ukraine. As they worked their way around the room, the analysts briefed one another on the latest developments in the “dark web.”
Queen Anne's County Public Schools uses a service called Text 2 Stop It!, which has partnered with a government IT solutions provider to make its services available to the public sector.
Delaware and other states are working to make sure the information they keep about students is kept safe and private as computers become more prominent in classrooms – and educators lean more on scores and data in teaching.
The road to our connected future may be paved with good intentions, but it may not be secure enough to drive on.
CHARLOTTE, N.C. — In an era of highly-publicized breaches of personally identifiable information, technology officials at all levels of government are looking to find ways to best protect the data on their networks.
A federal jury in Wilmington, Delaware, has convicted three family members of a courthouse shooter of cyberstalking causing death.
WASHINGTON — The Obama administration on Thursday revealed that 21.5 million people were swept up in a colossal breach of government computer systems that was far more damaging than initially thought, resulting in the theft of a vast trove of personal information, including Social Security numbers and some fingerprints.
SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world's most confidential data and critical infrastructure in danger.
WASHINGTON — Front-office personnel for the St. Louis Cardinals, one of the most successful teams in baseball over the past two decades, are under investigation by the F.B.I. and Justice Department prosecutors, accused of hacking into an internal network of the Houston Astros to steal closely guarded information about players.
WASHINGTON — The Obama administration on Tuesday announced the arrest of a Chinese professor and the indictment of five other Chinese citizens in what it contended was a decade-long scheme to steal microelectronics designs from American companies on behalf of the Chinese government.
Security experts warn that cyber criminals are setting up fake WiFi hotspots, luring consumers to hand over the keys to their computers.
Program Aims to Bolster Nation's High-Tech Workforce
Narae Y. from Gallagher Elementary School, Alaina R. from All Saints Catholic School, and Neela M. from Gallagher Elementary School.
"We expect an attack that will cause significant and lasting damage to a major world economy through physical and economic impacts," he told the European Information Security Summit 2015 in London.
A hacker group has stolen as much as $1 billion from banks and other financial companies worldwide since 2013 in an "unprecedented cyber-robbery," according to computer security firm Kaspersky Lab.
The connected car is under attack. Not from hackers, just yet. But from the media and policymakers at the moment.