The Global Hawk Drone Iran Shot Down Was a $220M Surveillance Monster

Credit to Author: Lily Hay Newman| Date: Thu, 20 Jun 2019 18:36:02 +0000
The Global Hawk can fly at an altitude of 55,000 feet and stay aloft for 30 hours straight.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Thu, 20 Jun 2019 18:36:02 +0000
The Global Hawk can fly at an altitude of 55,000 feet and stay aloft for 30 hours straight.
Read More
Credit to Author: Ishan Mehta| Date: Thu, 20 Jun 2019 13:00:00 +0000
Opinion: Congress has abdicated its role in preventing and punishing cyberattacks. The Cyber Solarium Commission is our best defense.
Read More
Credit to Author: Jonny Evans| Date: Fri, 21 Jun 2019 08:13:00 -0700
Apple is changing how its Find My Mac tool works in macOS Catalina and iOS – it will now use Bluetooth and should find your Mac even when it is asleep.
Apple is combining two apps – Find My Friends and Find My iPhone into a new ‘Find My’ app.
The combined app offers what we are used to from each one of these individual apps, but introduces new tools based on Bluetooth.
The ideas is that it will use low energy Bluetooth signals to help bring people together with lost things.
Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000
In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…
Read MoreCredit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 21 Jun 2019 19:16:21 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a cyberespionage campaign targeting Middle Eastern countries anda botnet malware that infiltrates containers via exposed Docker APIs. Read on: Hackers Are After Your Personal Data…
The post This Week in Security News: Cyberespionage Campaigns and Botnet Malware appeared first on .
Read More
Credit to Author: Gregg Keizer| Date: Wed, 19 Jun 2019 12:46:00 -0700
Google this week asked for help in identifying suspicious websites, offering users of its Chrome browser an add-on that lets them rat out URLs.
The Suspicious Site Reporter, which can be added to desktop Chrome, places a new flag-style icon on the top bar of the browser. “By clicking the icon, you’re now able to report unsafe sites to Safe Browsing for further evaluation,” Emily Schechter, a Chrome product manager, wrote in a Tuesday post to a company blog.
Safe Browsing is the name of the technology used by Google’s search engine, Chrome, Mozilla’s Firefox, Apple’s Safari, and Android to steer users away from sites that host malicious or deceptive content. On the back end, Google uses robots to scan the web and build a list of websites that host malware, harmful downloads or deceptive ads and pages. Software developers can then plug into an API to integrate this list into their own applications, something rival browser makers have done for years.

Credit to Author: Lily Hay Newman| Date: Wed, 19 Jun 2019 13:00:00 +0000
Google’s Private Join and Compute will let companies compare notes without divulging sensitive information.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 19 Jun 2019 13:00:00 +0000
Google’s Private Join and Compute will let companies compare notes without divulging sensitive information.
Read More