Get Task & Purpose in your inbox
A Long Island firm might have exposed service members to cyber risks by selling them Chinese security cameras and claiming they were American-made
Federal prosecutors Thursday charged a Long Island company, its chief executive and other employees with fraudulently passing off Chinese-made surveillance and security equipment as American-made and selling it to the U.S. government — potentially exposing the military and federal agencies to cybersecurity surveillance and attack.
Commack-based Aventura Technologies Inc., and seven of its current and former employees, ran the scheme that dated to 2006, netting some $88 million in sales, including $20 million in government contracts in the last nine years, authorities said.
The White House may get hacked again because so many cybersecurity officials have resigned, according to an internal memo
An internal White House memo has warned that it could be hacked again because so many cybersecurity officials have resigned or been pushed out under President Donald Trump's administration, Axios reports.
"I foresee the White House is posturing itself to be electronically compromised once again," wrote Dimitrios Vastakis, a branch chief of the White House computer network defense unit, in the October 17 memo obtained by Axios.
WASHINGTON (Reuters) - The United States carried out a secret cyber operation against Iran in the wake of the Sept. 14 attacks on Saudi Arabia's oil facilities, which Washington and Riyadh blame on Tehran, two U.S. officials have told Reuters.
The officials, who spoke on condition of anonymity, said the operation took place in late September and took aim at Tehran's ability to spread "propaganda."
One of the officials said the strike affected physical hardware, but did not provide further details.
Editor's Note: The following is an op-ed. The opinions expressed are those of the author, and do not necessarily reflect the views of Task & Purpose.
Last week Vietnam Veterans of America (VVA) shared with the country the findings of our two year investigation into foreign trolls who target troops and veterans online, which includes new evidence of foreign-born election interference related to the 2020 presidential campaign.
Macedonians took over and promoted a "Vets for Trump" Facebook page — spreading misinformation about voting along with racist and Islamaphobic propaganda, and engaging in Russian-style election interference, attacking democratic 2020 candidates.
Online entities from Russia, Bulgaria, Ukraine and Vietnam are persistently pretending to be our congressionally chartered veterans service organization — pushing hateful and divisive content alongside VVA-branded material that they're selling on websites which both scrape financial information from troops and veterans, and infect victims' computers with malware.
Trolls from Nigeria have a blossoming criminal empire that involves the identity theft of service members — names and photos of people who serve our country are then used as bait to lure elderly Americans into romance scams, costing some of them their life-savings, which has led several victims to suicide already.
This week, two more disturbing reports were released documenting the increasing dangers of predatory foreign entities online. Oxford University's Computational Propaganda Research Project showed us that at least 70 countries have experienced disinformation campaigns, and that the problem is growing.
Cisco's Talos Intelligence revealed that an imposter website made to look like the U.S. Chamber of Commerce's "Hire Our Heroes" was infecting job-seeking troops and veterans' computers with a host of dangerous malware.
Hackers could have breached US bioterrorism defenses for years, records show. We'll never know if they did
The Department of Homeland Security stored sensitive data from the nation's bioterrorism defense program on an insecure website where it was vulnerable to attacks by hackers for over a decade, according to government documents reviewed by The Los Angeles Times.
The data included the locations of at least some BioWatch air samplers, which are installed at subway stations and other public locations in more than 30 U.S. cities and are designed to detect anthrax or other airborne biological weapons, Homeland Security officials confirmed. It also included the results of tests for possible pathogens, a list of biological agents that could be detected and response plans that would be put in place in the event of an attack.
The information — housed on a dot-org website run by a private contractor — has been moved behind a secure federal government firewall, and the website was shut down in May. But Homeland Security officials acknowledge they do not know whether hackers ever gained access to the data.
WASHINGTON — Defense Department employees have procured thousands of printers, cameras and computers that carry known cybersecurity risks, and the practice may be continuing, according to an audit released Tuesday by the Pentagon's inspector general.
More than 9,000 commercially available information technology products bought in fiscal 2018 could be used to spy on or hack U.S. military personnel and facilities, the report said. Without fixing oversight of such purchases, more risks lie ahead, potentially including perils for top-dollar weapons that use such "commercial-off-the-shelf" or COTS devices.