Month: March 2017

Russian hacking goes far beyond 2016 pro-Trump effort

As the Senate Intelligence Committee held its first public hearings examining Russian hacking yesterday, lawmakers received a stark warning that the intrusions have been far broader in scope than the intelligence community’s finding that Russian hackers meddled in the 2016 presidential election to help Donald Trump defeat Hillary Clinton. Sen. Marco Rubio (R-Fla.) seemed to

0Shares
Read More
IDG Contributor Network: Biometrics can provide better data provenance

Imagine these scenarios: Insiders at a financial institution place transactions using e-execution and then deny involvement when trades lose money. Regulated individuals share secrets and collude to fix pricing via messaging services. Fraud occurs through re-diverted funds within Treasury departments. Funds are embezzled or re-directed for personal gain. Confidential data is accessed for market price fixing,

0Shares
Read More
Senator: Russia used 'thousands' of internet trolls during US election

The Russian government used “thousands” of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, according to one lawmaker. Disinformation spread on social media was designed to raise doubts about the U.S. election and the campaign of Democratic presidential candidate Hillary Clinton,

0Shares
Read More
Want privacy? Congress says you'll have to pay for it

When Congress voted down broadband privacy regulations this week, it threw data security under the bus as well. Internet users who want to protect their data can expect to pay a “privacy tax” as a result. The House voted 215-205 to repeal rules that, among other things, required broadband providers to take “reasonable” steps to protect

0Shares
Read More
Jenkins users can shore up software security with plugins

Developers keep finding new ways to deliver higher-quality software faster—and automation is playing a big part in that transformation. But to avoid introducing new flaws at that same hurry-up pace, security needs to be integrated directly into the development lifecycle. For many modern dev shops, Jenkins has become the open source engine of CI/CD (continuous integration/continuous

0Shares
Read More