Featured in cybersecurityBYBrett TingleyFeb 15, 2022ShareM1 Abrams Tank Tested With New System That Prevents It From Being HackedSome of the most heavily armored vehicles in America’s arsenal are virtually unarmored against cyber attacks. BYBrett TingleyFeb 15, 2022ShareBYBrett TingleyJan 28, 2022ShareCyberattack Targets Belarus’ Rail Network To Slow Flood Of Russian Forces Into The CountryThe cyberattack was claimed by a non-state actor and underlines just how complex the cyber battlefield is becoming. BYBrett TingleyJan 28, 2022ShareBYBrett TingleyJan 19, 2022ShareCyberattacks In Ukraine Show Potential For ‘Widespread Damage’ To U.S. Networks, Government WarnsThe White House is rushing to secure critical networks from similar attacks that have brought down Ukrainian government websites in recent days. BYBrett TingleyJan 19, 2022ShareBYBrett TingleyJan 6, 2022ShareCyber Command Task Force Conducted Its First Offensive Operation As The Secretary Of Defense WatchedThe operation is another sign of the rapidly evolving nature of warfare in the digital domain and the future importance of offensive cyber operations. BYBrett TingleyJan 6, 2022ShareBYBrett TingleyJun 2, 2021ShareSome Chinese-Made Drones Cleared By Pentagon For U.S. Government UseA report has cleared some Chinese drones for government use, but questions still remain about the security surrounding foreign-made technology. BYBrett TingleyJun 2, 2021ShareBYJoseph TrevithickNov 17, 2020ShareArmy Hires Company To Develop Cyber Defenses For Its Strykers After They Were HackedIt first emerged more than a year ago that “adversaries” had launched successful cyber attacks against these armored vehicles. BYJoseph TrevithickNov 17, 2020ShareBYTyler RogowayDec 1, 2019ShareThe Movie War Games Inspired President Reagan To Take Cybersecurity Seriously36 years ago today we learned that when it comes to nuclear war between superpowers “the only winning move is not to play.” BYTyler RogowayDec 1, 2019ShareBYStephen EdelsteinJul 2, 2019ShareUber Hires Former NSA Counsel Matt Olsen As New Security BossHis predecessor was fired after a massive data breach. BYStephen EdelsteinJul 2, 2019ShareBYJoseph TrevithickJun 30, 2019ShareTurkey Wants to Link Its F-35 Computer Brains to Networks That Will Include Russian SystemsTurkish and American authorities are both worried about military secrets leaking out, but for very different reasons. BYJoseph TrevithickJun 30, 2019ShareBYJoseph TrevithickJun 29, 2019ShareLockheed Made A Three Minute Long Cartoon Just To Explain F-35’s ALISThat’s good, because the vital, interconnected system is having some trouble at the moment. BYJoseph TrevithickJun 29, 2019ShareBYStephen EdelsteinJun 19, 2019ShareIsraeli Tech Firm Prepares to Fight ‘Rising Number’ of Wireless Car HackingsThe company uses the Cloud to monitor connected cars for irregular software sequences. BYStephen EdelsteinJun 19, 2019ShareBYJoseph TrevithickApr 16, 2019ShareThe U.S. Army’s New Up-Gunned Stryker Armored Vehicles Have Been HackedA Pentagon report says ‘adversaries’ launched successful cyber attacks against systems on the new 30mm cannon-armed vehicles. BYJoseph TrevithickApr 16, 2019ShareBYJustin HughesFeb 5, 2019ShareMassachusetts Man Accused of Cyberstalking by Vehicle TrackingThe man allegedly attached a GPS tracker to the car of a woman he doesn’t know. BYJustin HughesFeb 5, 2019ShareBYBertel SchmittJan 24, 2019ShareYour Next Car Could Have A FirewallMitsubishi Electric is working on low-power firewalls for automotive embedded systems, to prevent car hacking before it happens. BYBertel SchmittJan 24, 2019ShareBYJoseph TrevithickOct 10, 2018ShareU.S. And Belgium Nab Chinese Spy Accused Of Stealing GE Jet Engine Tech And MoreThe rare extradition of one of China’s intelligence agents is a major victory for the U.S. government amid strained ties with Beijing. BYJoseph TrevithickOct 10, 2018ShareBYJoseph TrevithickOct 4, 2018ShareChina Snuck Chips Into CIA, U.S. Military, Commercial Servers Leaving Them Open To Hacks: ReportIf accurate, this would be an unprecedented security risk and we may be hearing about more hardware tampering in the future. BYJoseph TrevithickOct 4, 2018Share12
BYBrett TingleyFeb 15, 2022ShareM1 Abrams Tank Tested With New System That Prevents It From Being HackedSome of the most heavily armored vehicles in America’s arsenal are virtually unarmored against cyber attacks. BYBrett TingleyFeb 15, 2022Share
BYBrett TingleyJan 28, 2022ShareCyberattack Targets Belarus’ Rail Network To Slow Flood Of Russian Forces Into The CountryThe cyberattack was claimed by a non-state actor and underlines just how complex the cyber battlefield is becoming. BYBrett TingleyJan 28, 2022Share
BYBrett TingleyJan 19, 2022ShareCyberattacks In Ukraine Show Potential For ‘Widespread Damage’ To U.S. Networks, Government WarnsThe White House is rushing to secure critical networks from similar attacks that have brought down Ukrainian government websites in recent days. BYBrett TingleyJan 19, 2022Share
BYBrett TingleyJan 6, 2022ShareCyber Command Task Force Conducted Its First Offensive Operation As The Secretary Of Defense WatchedThe operation is another sign of the rapidly evolving nature of warfare in the digital domain and the future importance of offensive cyber operations. BYBrett TingleyJan 6, 2022Share
BYBrett TingleyJun 2, 2021ShareSome Chinese-Made Drones Cleared By Pentagon For U.S. Government UseA report has cleared some Chinese drones for government use, but questions still remain about the security surrounding foreign-made technology. BYBrett TingleyJun 2, 2021Share
BYJoseph TrevithickNov 17, 2020ShareArmy Hires Company To Develop Cyber Defenses For Its Strykers After They Were HackedIt first emerged more than a year ago that “adversaries” had launched successful cyber attacks against these armored vehicles. BYJoseph TrevithickNov 17, 2020Share
BYTyler RogowayDec 1, 2019ShareThe Movie War Games Inspired President Reagan To Take Cybersecurity Seriously36 years ago today we learned that when it comes to nuclear war between superpowers “the only winning move is not to play.” BYTyler RogowayDec 1, 2019Share
BYStephen EdelsteinJul 2, 2019ShareUber Hires Former NSA Counsel Matt Olsen As New Security BossHis predecessor was fired after a massive data breach. BYStephen EdelsteinJul 2, 2019Share
BYJoseph TrevithickJun 30, 2019ShareTurkey Wants to Link Its F-35 Computer Brains to Networks That Will Include Russian SystemsTurkish and American authorities are both worried about military secrets leaking out, but for very different reasons. BYJoseph TrevithickJun 30, 2019Share
BYJoseph TrevithickJun 29, 2019ShareLockheed Made A Three Minute Long Cartoon Just To Explain F-35’s ALISThat’s good, because the vital, interconnected system is having some trouble at the moment. BYJoseph TrevithickJun 29, 2019Share
BYStephen EdelsteinJun 19, 2019ShareIsraeli Tech Firm Prepares to Fight ‘Rising Number’ of Wireless Car HackingsThe company uses the Cloud to monitor connected cars for irregular software sequences. BYStephen EdelsteinJun 19, 2019Share
BYJoseph TrevithickApr 16, 2019ShareThe U.S. Army’s New Up-Gunned Stryker Armored Vehicles Have Been HackedA Pentagon report says ‘adversaries’ launched successful cyber attacks against systems on the new 30mm cannon-armed vehicles. BYJoseph TrevithickApr 16, 2019Share
BYJustin HughesFeb 5, 2019ShareMassachusetts Man Accused of Cyberstalking by Vehicle TrackingThe man allegedly attached a GPS tracker to the car of a woman he doesn’t know. BYJustin HughesFeb 5, 2019Share
BYBertel SchmittJan 24, 2019ShareYour Next Car Could Have A FirewallMitsubishi Electric is working on low-power firewalls for automotive embedded systems, to prevent car hacking before it happens. BYBertel SchmittJan 24, 2019Share
BYJoseph TrevithickOct 10, 2018ShareU.S. And Belgium Nab Chinese Spy Accused Of Stealing GE Jet Engine Tech And MoreThe rare extradition of one of China’s intelligence agents is a major victory for the U.S. government amid strained ties with Beijing. BYJoseph TrevithickOct 10, 2018Share
BYJoseph TrevithickOct 4, 2018ShareChina Snuck Chips Into CIA, U.S. Military, Commercial Servers Leaving Them Open To Hacks: ReportIf accurate, this would be an unprecedented security risk and we may be hearing about more hardware tampering in the future. BYJoseph TrevithickOct 4, 2018Share