In this industry perspective, Thomas Hofmann, the Vice President of Intelligence at the firm Flashpoint* warns that the effects of data breaches can often be felt months or years after the actual incident, as stolen data bubbles up in underground marketplaces. He has three pieces of advice for companies that want to develop an incident response plan that mitigates the damage of breaches in the short term and over the long term.
In-brief: Apple is urging iPhone and iPad users to upgrade to the latest version of iOS amid published claims by Israeli firm Cellebrite that its engineers can unlock basically any iPhone model, including those running the new iOS 11. Apple again finds itself at the center of controversy surrounding the ability to hack into iPhones to extract protected user information. The company is urging iPhone users to upgrade their devices to the latest version of iOS amid claims by an Israeli mobile-device surveillance firm that its engineers can unlock virtually any iPhone model in the world. However, the Cupertino, Calif.-based company is remaining mum on what, if anything, it might do now or in the future to resolve the issue. Citing anonymous sources, Forbes reported Monday that Cellebrite, based in Petah Tikva, Israel, is telling customers that its engineers already can bypass the security of devices running iOS 11, the […]
The folks over at The Parallax write that time is running out on a U.S. spy law that allows the National Security Agency to run its most controversial surveillance programs, with no clear replacement plan in place.
A new guide from Harvard University’s Kennedy School of Government is offering guidance to political campaigns that wish to keep hackers at bay.
The Associated Press is reporting on a trove of data accidentally leaked by the Russian-backed advanced persistent threat (APT) group known as Fancy Bear that suggests the group conducted a years-long campaign against targets in the US, Ukraine, Russia, Georgia and Syria.