• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber threat

    Edward Snowden Dodges Cybersecurity Regulations

    Edward Snowden, the leaker of the National Security Agency (NSA) surveillance programs, was reportedly able to smuggle thousands of classified documents out of the NSA simply with thumb drives. Despite the NSA’s secret and powerful security measures, Snowden later arrived in Hong Kong with four laptops containing classified information. Three … More

    Chinese Hackers Compromise U.S. Weapons Systems

    The Washington Post is reporting that the designs for many of the U.S.’s “most sensitive advanced weapons systems have been compromised by Chinese hackers.” While the U.S. has started to increase its pressure on China, it is a dollar short and a day late. Rather than allow state-sponsored hackers to … More

    Cybersecurity: Government Regulations Can’t Keep Up

    For the first time since 2005, the U.S. National Institute of Standards and Technology (NIST) has revised the federal cybersecurity standards. Since the last update, flash memory, Wi-Fi, smartphones, microchips, and social media have burst onto the scene. Why has NIST not updated the federal cybersecurity standards much sooner? Because … More

    U.S. Should Stand Up to China on Cyber Attacks

    The highest-ranking American military officer, Chairman of the Joint Chiefs General Martin Dempsey, continued this Administration’s naïve attempts to cooperate with China when it comes to cybersecurity during a visit there last week. China is arguably the worst offender among nations in terms of cyber attacks and cyber theft. The … More

    7 Steps to Solve Congressional Cyber Stalemate

    Congress is back in session and “ready” to tackle cybersecurity. Regrettably, some in Congress are again proposing 19th century–style legislative solutions to this ultimately 21st-century problem. Let’s hope they think it through this time before offering the same failed ideas. Over the past several months, the world has witnessed a … More

    Morning Bell: Keeping Americans Safe Online

    Everything we do is online. If you’ve been the victim of identity theft or an email phishing scam, you know how quickly your personal data can be stolen or threatened. It’s important to know the difference between types of cyber threats and the right approach to fighting them. There are … More

    One Step on Cyber Espionage: Reform the Foreign Investment Process

    Japanese telecommunications company Softbank wants to buy Sprint Nextel for about $20 billion. One barrier to the deal is unusual: Softbank and Sprint are being pushed to spurn equipment made by specific Chinese companies, due to cyber espionage fears. The fear is reasonable but the way the deal is being … More

    Internet Hit by Largest Cyber Attack Yet

    This week, the largest cyber attack to date hit the Internet. Spamhaus, an anti-spam company, placed Cyberbunker on their black-list of spam generating companies. Cyberbunker quickly retaliated with a Distributed Denial of Service (DDoS) attack, which essentially overwhelms a system with requests. The initial attack failed to overwhelm Spamhaus and … More

    North Korea Ups the Ante with Cyber Attack

    On Tuesday, several South Korean banks and television broadcasters were taken offline due to a “pretty massive” cyber attack. For the most part these attacks were just a nuisance, temporarily cutting off online access to bank accounts and freezing TV station computers, though not interfering with any broadcasts. Most signs … More

    Cybersecurity Executive Order Is a Mistake Every Way You Look at It

    President Obama plans to issue his cybersecurity executive order on Wednesday, following his State of the Union address, according to The Hill. Based on drafts circulating several months ago, the executive order is likely to be highly flawed in its efforts to impose regulations on the dynamic cyber realm. In … More