Experts examine the role of technology in promoting democracy Laptops, personal digital assistants, and iPhones were a ubiquitous and fitting presence at Harvard’s John F. Kennedy Jr. Forum on Wednesday (March 10 2010).
House cybersecurity overhaul included in Defense authorization bill. An amendment to the Defense authorization bill, expected to pass in the House on Friday, would push through committee efforts to update information security requirements for agencies and establish a separate cybersecurity office in the White House.
Microsoft's decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent months.
CSOs and CISOs should target executive-level management with specially tailored messages that prompt strongly motivated buy-in, even using a bit of fear if necessary, said a panel of state security officials and consultants.
Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to distribute fraudulent versions of its Android app with the goal of stealing users' digital currencies.