Get Task & Purpose in your inbox
Russian military hackers reportedly tried to steal emails from the Ukrainian energy company at the center of US impeachment scandal
WASHINGTON (Reuters) - Russian military hackers tried to steal emails from the Ukrainian energy firm where Hunter Biden, the son of Democratic presidential contender Joe Biden, had a seat on the board, a U.S. cybersecurity firm said on Monday.
Energy company Burisma Holdings Ltd was at the center of attempts by U.S. President Donald Trump last July to pressure Ukrainian authorities to announce an investigation into the Bidens for purported corruption, an effort that has led to the Republican being impeached by the U.S. House of Representatives on charges of abuse of power and obstruction of Congress.
A Long Island firm might have exposed service members to cyber risks by selling them Chinese security cameras and claiming they were American-made
Federal prosecutors Thursday charged a Long Island company, its chief executive and other employees with fraudulently passing off Chinese-made surveillance and security equipment as American-made and selling it to the U.S. government — potentially exposing the military and federal agencies to cybersecurity surveillance and attack.
Commack-based Aventura Technologies Inc., and seven of its current and former employees, ran the scheme that dated to 2006, netting some $88 million in sales, including $20 million in government contracts in the last nine years, authorities said.
The White House may get hacked again because so many cybersecurity officials have resigned, according to an internal memo
An internal White House memo has warned that it could be hacked again because so many cybersecurity officials have resigned or been pushed out under President Donald Trump's administration, Axios reports.
"I foresee the White House is posturing itself to be electronically compromised once again," wrote Dimitrios Vastakis, a branch chief of the White House computer network defense unit, in the October 17 memo obtained by Axios.
WASHINGTON (Reuters) - The United States carried out a secret cyber operation against Iran in the wake of the Sept. 14 attacks on Saudi Arabia's oil facilities, which Washington and Riyadh blame on Tehran, two U.S. officials have told Reuters.
The officials, who spoke on condition of anonymity, said the operation took place in late September and took aim at Tehran's ability to spread "propaganda."
One of the officials said the strike affected physical hardware, but did not provide further details.
Editor's Note: The following is an op-ed. The opinions expressed are those of the author, and do not necessarily reflect the views of Task & Purpose.
Last week Vietnam Veterans of America (VVA) shared with the country the findings of our two year investigation into foreign trolls who target troops and veterans online, which includes new evidence of foreign-born election interference related to the 2020 presidential campaign.
Macedonians took over and promoted a "Vets for Trump" Facebook page — spreading misinformation about voting along with racist and Islamaphobic propaganda, and engaging in Russian-style election interference, attacking democratic 2020 candidates.
Online entities from Russia, Bulgaria, Ukraine and Vietnam are persistently pretending to be our congressionally chartered veterans service organization — pushing hateful and divisive content alongside VVA-branded material that they're selling on websites which both scrape financial information from troops and veterans, and infect victims' computers with malware.
Trolls from Nigeria have a blossoming criminal empire that involves the identity theft of service members — names and photos of people who serve our country are then used as bait to lure elderly Americans into romance scams, costing some of them their life-savings, which has led several victims to suicide already.
This week, two more disturbing reports were released documenting the increasing dangers of predatory foreign entities online. Oxford University's Computational Propaganda Research Project showed us that at least 70 countries have experienced disinformation campaigns, and that the problem is growing.
Cisco's Talos Intelligence revealed that an imposter website made to look like the U.S. Chamber of Commerce's "Hire Our Heroes" was infecting job-seeking troops and veterans' computers with a host of dangerous malware.
Hackers could have breached US bioterrorism defenses for years, records show. We'll never know if they did
The Department of Homeland Security stored sensitive data from the nation's bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by The Los Angeles Times.
The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.
The information — housed on a dot-org website run by a private contractor — has been moved behind a secure federal government firewall, and the website was shut down in May. But Homeland Security officials acknowledge they do not know whether hackers ever gained access to the data.