Senate Intelligence Hearing Shows Why It’s Impossible for Tech Companies to Confront Social Media Risks on Their Own
Photo Credit: Variety
Photo Credit: Variety
Politicians across the world have embraced Twitter as a way to directly connect with the public. It’s common for political offices to have an official account that is passed along to the next official. However, in recent years, we’re seeing a new trend: politicians issuing messages about official duties, but from an “unofficial” account. It might be a personal account that the official had before assuming office, or it might be an account that appeared outside official channels.
Social media, a new technology which once promised to bring the world together, is now being used to drive divisions in society. A recent news article detailed how Russian bots exploited mentions of Molly Tibbetts's death to distract from the Paul Manafort verdict are part of a coordinated campaign. Here at SafeGuard Cyber, we have spent months studying these bots.
Street gangs are keeping it real and going virtual.
Two known street gangs had a collective 32 members indicted on 240 counts, including charges of conspiracy to commit grand theft, hacking, computer access, fraud, grand theft, burglary and identity theft.
Twenty-five are currently in custody, seven are fugitives and the arraignments commenced in the Sacramento Superior Court last week.
That's right, street gangs.
With New York and San Francisco ranking as Forbes top two smart cities globally for 2017, ensuring that smart cities are cyber secure is as crucial for national security as preventing malware.
Smart cities are in a race to increase their efficiency and tech capabilities and keep their top spot on the cyber world stage, nonetheless, they should equally be looking at ensuring their cities are as digitally safe as possible.
The university of Michigan recently found that multiple smart apps and devices have far more access than they really need, to perform necessary functions. This is being termed 'overprivileged' and has caught the fervent eyes of the cyber security community. This is largely because of the gaping hole growing in IOT cyber security.
As the world of IoT expands at an exponential rate, cyber security professionals are concerned that safety is playing second fiddle to consumer desires to stockpile smart goodies.
With the growing sophistication of our virtual assets and increasing dependence on IoT products and cloud computing, comes real developments in the Cyber-security landscape.
This has pushed cyber-security issues and hackers into everyday life for almost every type of individual and business.
The level of sophistication of cyber-crime is reminiscent of the shift from street to organized crime.
Brittany Iwata | June 22, 2018
At ExtraHop, we believe in the power of our platform to help enterprise companies solve security and performance challenges with the unprecedented visibility, definitive insight, and immediate answers that come from our unique combination of rich data, powerful analytics, and ML.
Brittany Iwata | August 2, 2018
Higher education institutions are becoming more and more dependent on their networks and infrastructures to be able to deliver the best educational experiences possible. But supporting modern campuses is becoming more complex each day and schools are increasingly reliant on their IT teams to meet ever-evolving needs.