In an opinion piece in the Christian Science Monitor, more needs to be done to attract more women to the cybersecurity fields.
According to the CSM, in 2015, a mere 25 percent of women held computing jobs while companies such as Twitter and Google have been widely criticized for not bridging the gender gap in the workforce.
Not only that, but a report from the Women’s Society of Cyberjutsu found that only 11 percent of jobs in the cybersecurity field were held by women.
Digital Privacy Ahead of its Game
When it comes to digital privacy, though, it has done much better compared to other fields.
Why?
Well, according to CSM, it’s [...]
A 25-year-old British former computer science student has discovered a loophole in the popular Pokemon Go allowing him to catch Pokemon without leaving the comfort of his home.
According to reports, players of the game have resorted to donating thousands of pounds to keep Mark Gore’s ‘bot’ running. Five lawyers are alleged to have urged him to remove the programme.
Mr Gore has stated that his loophole wasn’t designed to take the fun out of the game, which is reported to have seen users harassed by police for walking into restricted areas, according to the British tabloid newspaper, the Sun.
He stated that it was easy exploiting the game, [...]
A hacking group by the name of Shadow Brokers is claiming that it has National Security Agency hacking tools for sale.
In an Internet posting, the group said that they have a ‘full sponsor state tool set’ of cyberweapons, which the group claim belongs to the Equation Group, which is believed to be an NSA affiliate, according to a news report from RT. In a bid to back up their statement they posted what appears to be sample attack code.
Shadow Brokers are offering to sell the complete set of tools to the highest bidder. They are seeking to raise 1,000,000 bitcoins, worth around $568 million USD.
While there are bound to be some who may doubt the group [...]
When you think of lock picking you might not put it with a cybersecurity conference such as Def Con. However, the recent conference in Sin City demonstrated that the traditional method of picking locks is essential to teaching individuals how to protect machines from digital threats letting them unleash their inner child.
With remote attacks over the Internet being blocked through improved security, opportunistic hackers are searching for ways to deliver malicious software physically instead. Being able to crack a digital system, though, requires a level of skill and finesse, which is why it’s ideal for the good guys to know how to pick locks so that they can defend [...]
A year ago U.S. intelligence officials are reported to have informed congressional leaders that Russian hackers were attacking the Democratic Party, reports CNBC.
According to reports, lawmakers weren’t able to inform the targets about the hacking due to the secrecy of the information.
The unveiling of the information would have revealed that the hacking was being continually monitored by the U.S. intelligence agencies.
However, it was only last month that the alleged hacking of the Democratic Party and the Russians was revealed when the FBI announced that they were investigating a cyber attack at the DNC.
Last summer in a congressional briefing CNBC [...]