Wanna hack the military? The Department of Defense is starting to give hackers more opportunities to test its systems without the threat of prosecution. The department announced today that it is expanding its Hack the Pentagon program to include more DoD systems and networks. Hack the Pentagon pays hackers to find and report vulnerabilities in…
According to a federal indictment announced March 24, 2016, seven attackers with links to the Iranian government executed cyberattacks against dozens of banks from 2011 to 2013. Public announcements of cyber incidents against the financial system are undoubtedly areas for concern. However, this announcement included an unusual twist: The attackers also targeted a small dam…
In the coming age of autonomous cars, connected cars, and cars that can communicate with each other, the city’s infrastructure, our phones, and the entire internet of things, data security is going to be paramount. That’s why Craig Smith, who has spent 20 years working in banking and healthcare digital security, wrote The Car Hacker’s…
When I think about the behavior of many business people today, I imagine a breadline. These employees are the data-poor, waiting around at the end of the day on the data breadline. The overtaxed data analyst team prioritizes work for the company executives, and everyone else must be served later. An employee might have a…
Ronald Robinson’s bar does not have security. And the deaths in Orlando will not change that. “I’m not going to fall prey to them,” says the 59-year-old bar owner of Larry’s Lounge as to why he will not hire security following the killing of 50 people at a gay nightclub in Florida. The Washington…
With the world growing more concerned about attacks by militant groups on civilians, Microsoft Corp has outlined new policies to crack down what it called “terrorist content” on some of its consumer services.
In a blog post, the company said it would focus on services such as gaming tool Xbox Live, the consumer version of its Outlook email service, and its consumer documents-sharing service.
Initially, Microsoft will rely on consumers to report objectionable content. The company also said it would fund research of a tool that scans content and flags images, audio and video.
“We will consider terrorist content to be material posted by or in support of organizations included on the Consolidated United Nations Security Council Sanctions List that depicts graphic violence, encourages violent action, endorses a terrorist organization or its acts, or encourages people to join such groups,” the blog post said.
The issue came to the fore after Apple and the US Government clashed over whether federal authorities could force Apple to create software to unlock a phone used by a shooter in the San Bernardino attacks last year.
Ultimately, the Government paid a third party to unlock the phone.
“The events of the past few months are a strong reminder that the Internet can be used for the worst reasons imaginable,” Microsoft said in its post.
It said it would provide information on how to counter negative content, a policy also adopted by Facebook.
The social-media service this year announced a tool it calls “counter speech,” encouraging activists to counter extremist views with posts promoting tolerance.
Last year, Facebook updated its guidelines to prohibit advocacy of “terrorist activity, organized criminal activity or promoting hate”.
Between mid-2015 and early 2016 Twitter suspended 125,000 accounts, most of which it believed were linked to the militant Islamic State group.