Why the US Treasury Keeps Getting Hacked

Why the US Treasury Keeps Getting Hacked

A Bloomberg News investigation has found that in three major hacks the US Treasury didn’t deploy cybersecurity measures that could have prevented the attacks or flagged the intruders sooner. Our review of previously unreported government documents and interviews with more than a dozen people including current and former Treasury employees, bank executives and cybersecurity experts…

Read More
Newswise: UWF Faculty and Students Develop Software That Analyzes Security and Privacy Levels of Mobile Applications

UWF Faculty and Students Develop Software That Analyzes Security and Privacy Levels of Mobile Applications

Newswise — Dr. Hossain Shahriar, associate director and professor for the University of West Florida Center for Cybersecurity, and his graduate students have developed a platform that evaluates how well thousands of mobile applications are securing users’ personal information. “Many times now, before a doctor’s appointment, you will be told to go fill out your…

Read More
Why China is fighting internet war with it 'friend' Russia

Why China is fighting internet war with it ‘friend’ Russia

Despite public displays of strategic partnerships and mutual non-aggression in cyberspace, China has reportedly been engaged in hacking campaigns against Russia. As reported by the New York Times, some Beijing-backed hacking groups are targeting Russian government agencies and defense firms in order to extract military and defense secrets. This intelligence collecting drive aims to gather…

Read More
5% of Hong Kong critical infrastructure had ‘system vulnerabilities’ in 2024, police cybersecurity report finds

5% of HK critical infrastructure had system vulnerabilities in 2024: police

Five per cent of more than 90,000 critical infrastructure facilities in Hong Kong had “varying degrees of system vulnerabilities” last year, according to the cybercrime unit of the city’s police force. File photo: Sora Shimazaki, via Pexels. Credential leakage and compromise, hijackable subdomains, and exposed cloud storage were three critical and high-risk vulnerabilities identified in…

Read More