New Lookout Threat Report: 70% of government-focused mobile phishing attacks sought to steal credentials in 2020.
February 24, 2021
Lookout Inc. released its Government Threat Report, which examines the most prominent mobile threats affecting federal, state and local governments in the United States. Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities from outdated operating systems and risky apps.
Some 200 individuals have been charged with federal offenses connected to the siege at the U.S. Capitol on January 6, 2021. Among them are at least 15 examples of family affiliated extremism. These instances include: five sets of husbands and wives; two cases of fathers and sons, mothers and sons, brothers, and cousins; and an instance of father/daughter and brother/sister participation. Although of a different strain and less serious offenses—none specifically terrorism nor involving murder —such kin-connected radicalism is neither a new phenomenon nor one unique to the United States or elsewhere.
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning to identification and prosecution of those that illegally entered, attacked, and looted the Capitol and the offices of the legislature housed there. We’re learning more about the litany of security failings and it is imperative that we take the lessons offered by this example and make the changes they demand now, at our state capitol buildings, as well as in our businesses.
A new automated data feed that helps defend state and local government computer systems from cyberattacks and rapidly blocks threats across state lines reduced cyber defense time from some three days to less than three minutes in a successful pilot program across four states.
The IoT Cybersecurity Improvement Act has been officially signed into law. The bipartisan legislation, sponsored by Reps. Robin Kelly, D-Ill., and Will Hurd, R-Texas, and Sens. Mark Warner, D-Va., and Cory Gardner, R-Colo., requires that any IoT device purchased with government money meet minimum security standards.
Government can no longer afford to pursue monolithic, exquisite technology solutions. Given rising citizen expectations and the fast-changing technology landscape, state and local governments need to work closely with key stakeholders, including both citizens and IT vendors. This vision – call it “Connected Government” – will drive IT modernization. It’s a relationship-based approach to technology that will help state and local governments meet the immediate challenges of remote work and virtual citizen service, while also helping government IT leaders keep pace with innovation. Given the potential power of a Connected Government approach to IT services, it’s worth taking a deeper dive into how this mode of operation works.
With the emergence of major public health issues, or crises, such as COVID-19, grant funding for research and program development will be made available from various government agencies to help with the response. Additionally, foundations such as the Bill & Melinda Gates Foundation or Ford Foundation may provide the precious funds to perform the vital work to battle the at hand issue. If fortunate, those in receipt of funding to pursue the global health issue to be addressed will often utilize technology either developed or custom created and implemented to address the critical response, or in the case of COVID-19, slow the spread or research the creation of vaccines.
A surveillance system in the city of Or Akiva, Israel has been deployed to monitor whether Israeli public is complying with the government's coronavirus guidelines, including wearing masks and social distancing.