Visible to the public In the NewsConflict Detection Enabled

SoS Newsletter- Advanced Book Block


SoS Logo

In The News


This section features topical, current news items of interest to the international security community. These articles and highlights are selected from various popular science and security magazines, newspapers, and online sources.

US News     


“FDIC Reports Five ‘Major Incidents’ of Cybersecurity Breaches Since Fall,” The Washington Post, 9 May 2016. [Online].
The FDIC reported five major breaches of taxpayers’ personal information since the 30th of last October. They define a major incident as a breach of at least 10,000 records. All five of the incidents were similar in nature. Employees accidently transferred the files to USB devices. As a precaution, all removable media has been blocked. 


“McAfee Confirms He'll Head Cybersecurity Company,” USA Today, 10 May 2016. [Online].
John McAfee confirmed that he would be taking over as CEO of tech company MGT Capital Investments, previously known mostly for its development of mobile games. The company will be rebranding itself to focus on cybersecurity and privacy. McAfee says that the company's first product will be “D-Vasive,” anti-spyware for smartphones that secures the device's camera, microphone, and Bluetooth.


“Congress Warned About Cybersecurity After Attempted Ransomware Attack on House,” Tech Crunch, 10 May 2016. [Online].
A new wave of ransomware attacks was launched at the U.S. House of Representatives recently. The attacks targeted House members mainly through third-party email apps like YahooMail and Gmail, prompting officials to block access to YahooMail on their network altogether. It is unknown whether any of the ransomware attacks were successful or not.


“Computer Science Teachers Need Cybersecurity Education Says CSTA Industry Group,” Tech Republic, 10 May 2016. [Online].
The Computer Science Teachers Association is creating a new 8-hour program to help educate middle school and high school teachers on cybersecurity. Shockingly, only ten percent of those teachers have degrees in computer science with most coming from backgrounds in related fields like math. The program is aiming to bring these teachers up to speed on topics such as compliance and authentication.


International News 


“Why Automation is the Key to the Future of Cyber Security,” Network World, 3 May 2016. [Online].
The complexity and volume of cyber attacks have been rapidly growing for quite some time, and the ugly truth is that it is near impossible to keep up with all of them. It would make perfect sense to automate some of the tasks associated with security; however, it is not that simple. This article explores some of the challenges companies face with automating cyber security.


“Will Artificial Intelligence Revolutionize Cybersecurity?,” The Christian Science Monitor, 4 May 2016. [Online].
Artificial intelligence (AI) is being examined as a possible means for improving cybersecurity. AI is more popular than ever, and some researchers believe that it can be used to monitor attacks or even attempt to break systems. Additionally, the White House is hosting a series of workshops to explore the potential benefits of incorporating artificial intelligence into cybersecurity.


“Cyberattacks: Two-Thirds of All Big Businesses in UK Breached in the Past Year,” International Business Times, 8 May 2016. [Online].
A new survey shows that nearly two-thirds of big businesses in the UK suffered from a data breach in 2015. Additionally, roughly a quarter of all businesses in the UK were hacked in some way, the most common attacks coming in the form of malware, spyware, or other viruses, and impersonation of the organisation. Perhaps even more surprising is the fact that 70% of the attacks were preventable.


“Top 2016 Cybersecurity Reports Out from AT&T, Cisco, Dell, Google, IBM, McAfee, Symantec and Verizon,” Forbes, 9 May 2016. [Online].
Several major companies have published their reports on cybersecurity for 2016. The companies include AT&T, Cisco, Dell, Google, IBM, McAfee, Symantec, and Verizon. The reports include each company's take on topics such as data breaches, defense strategies, and cybercrime.


“$81 Million Bangladesh Bank Heist Sparks Push for Stepped-Up Cybersecurity,” NPR, 24 May 2016. [Online].
Following a shocking $81 million heist from the central bank of Bangladesh, SWIFT CEO Gottfried Leibbrandt says they are going after the cyber criminals. The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is the messaging system responsible for transferring billions of dollars each day. SWIFT was long believed to be highly secure; however, Leibbrandt revealed that they are aware of at least two other breaches. See:


“UK Government Details Plans for National Cyber Security Centre,” Computer Weekly, 26 May 2016. [Online].
The U.K. has released a plan for its recently revealed National Cyber Security Centre. The plan includes four main objectives for
the centre:

  • To understand the cyber security environment, share knowledge, and use that expertise to identify and address systemic vulnerabilities; 
  • To reduce risks to the UK by working with public and private sector organisations to improve their cyber security; 
  • To respond to cyber security incidents to reduce the harm they cause to the UK; and
  • To nurture and grow our national cyber security capability, and provide leadership on critical national cyber security issues.



“Brazilian Companies Rank Worst Among Major Economies on Cyber Security: Report,” Yahoo, 26 May 2016. [Online].
A recent report from security ratings company BitSight showed that cybersecurity metrics of companies based in Brazil were significantly poorer than those of most other major economies included in the study. Some of Brazil's weakest points included compromise rates, email security, and file sharing practices. Additionally, nearly half of all Brazilian companies took part in dangerous file sharing on a company network, whereas the rate for most other countries was closer to a quarter or a third.

(ID#: 16-11358)


Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.