Donald Trump could become the next President of the United States. If and when he does, the subject of cybersecurity and the widening scale of cyberattacks will firmly be on the agenda. So what does Trump have to say about a subject that requires a certain understanding and nuance?
Donald Trump, now officially the Republican candidate for the Presidency ahead of the 2016 US Presidential elections, will have to tackle issues such as cybersecurity and the increasing number of cyberattacks from hackers beyond his shores, state-sponsored or otherwise.
In a telling interview with the New York Times, Trump inadvertently revealed his true grasp of cybersecurity while outlining [...]
The first six months of 2016 have shown that DDoS attacks are only escalating in their frequency as well as their scale, according to the latest global report by DDoS mitigation firm Arbor Networks.
A DDoS report released by software firm Netscout’s DDoS mitigation arm Arbor Networks has revealed the single largest attack observed, registering at a massive 579Gbps. That’s a 73 percent increase from the peak DDoS attack observed in 2015.
DDoS attacks are among the most frequently used and prominent cyberattacks because of the relative ease of availing inexpensive DDoS tools by anyone with a grudge and an internet connection. Suffice to say, DDoS attacks [...]
The latest bug bounty program from an automobile manufacturer comes from Fiat Chrysler, more than a year after two white hat hackers proved that they could remotely compromise and take control of its popular selling vehicle, the Jeep Cherokee.
White hat hackers can now start picking away at cybersecurity flaws in the vehicle software embedded in Fiat Chrysler connected cars. The bounty program is specifically focused on the automaker’s fleet of connected vehicles, including the systems used within them as well as the applications and external services that are connected to them.
The bounty reward is relatively small compared to the bug bounties offered by the likes of [...]
The phenomenon that is Nintendo’s Pokémon registered another massive (and arguably its biggest) hit with the release of Pokémon Go, a mobile app game so successful that it helped rocket Nintendo’s shares through the roof. With popularity comes scrutiny and one security researcher has pointed to a significant security risk concerning the iOS and Android versions of the app.
Pokémon Go users, pay attention. Internet security expert Adam Reeve has found a problem with the game, one that makes your entire Google account vulnerable if you’re playing the game.
To play the game, users are first required to set up an account. For whatever the reason, the developer of the game, [...]