T-Mobile is just the latest mobile carrier to deal with problematic 911 calls, but this time, the problems are bad. Like so bad, people are dying. This month, numerous “ghost calls” from T-Mobile numbers flooded 911 call centers in Texas and have been linked to two deaths. And although the calls originated from…
President Obama has ordered the country’s intelligence agencies to complete a full report on “cyber attacks and foreign intervention into the 2016 election” before he leaves the White House, Reuters reported this morning.
Friday’s DDoS attack on Dyn’s domain name servers was unprecedented. The attack utilized a botnet made up of “internet of things” (IoT) devices (think: smart TVs, DVRs, and internet-connected cameras) to take down a major piece of internet infrastructure. The result? For most of Friday, people across the United States…
Today the Department of Defense announced that it will soon require all of its contractors to report any major cybersecurity breaches. And if your first question is, why in the hell didn’t they require that before?, that’s a great question.
Not that anyone needed another reason to fear hospitals, but here’s a good one: Security researcher Billy Rios has discovered vulnerabilities in popular hospital drug pumps that allow hackers to remotely change drug dosages.
It’s tempting to view security breaches as the products of mastermind hackers, but a massive report released today reveals the sad reality. Most of the time, breaches are the result of people falling for plain old trick emails.
When anti-Chinese censorship services got hit with a crippling distributed-denial-of-service attack last month, researchers quickly pegged China as the culprit. Now, Citizen Lab has pinpointed the Chinese tool that made this attack happen. They’re calling it the Great Cannon.
President Obama has a message for foreign hackers: You’re grounded. The president declared a national emergency and signed an executive order today allowing targeted sanctions on anyone who is deemed a cyberthreat to the United States.
The U.S. Army is open-sourcing a code it uses to analyze cyberattacks. For the past five years, whenever a Department of Defense network has been compromised, the Army has used the Dshell framework to do forensic analysis on the attacks.
You know that character in some horror films who warns unsuspecting (usually) teenage victims of their impending death? The World Economic Forum's Global Risks report is kind of like that guy, filled with doom but offering damn good advice on how to stay alive. This year, the report focused on the internet of things.
CISPA is back. You might remember the bill as the Cyber Intelligence Sharing and Protection Act—or perhaps as "the worst privacy disaster our country has ever faced." Rep. Dutch Ruppersberger reintroduced the bill to the House Intelligence Committee on Friday under the auspices of preventing another Sony hack.
At this point, it's obvious that cyberattacks can have devastating, far-reaching consequences. Look at the fallout from the Sony hack. But it's still very rare for digital aggression campaigns to cause direct physical damage, which is why a recent cyberattack that screwed with a blast furnace at a German steel mill is…
Here's a scary thing that happened: South Korean authorities found evidence that a worm was recently removed from devices connected to nuclear power facilities. The news comes a little over a week after the country's nuclear plant operator received warnings on Twitter that its network had been compromised. Thankfully,…
Let me state the obvious just to get it out of the way: our nation's cybersecurity sucks and everybody knows it. The president knows it. The Pentagon knows it. And, worst of all, the hackers know it, too. That's why I'm so alarmed by a new Pew Internet survey that says we'll likely get hit with a deadly cyberattack by…
According to a fresh report from cybersecurity experts, hospitals are hackers' new favorite playground. That's unsettling news for anyone who's ever visited a hospital (read: everyone) but it also offers a curious window into how we guard our most important data. Put bluntly, we do a pretty piss poor job of it.