Wednesday, May 6, 2015

FBI Creates New Role In Battling Cybercrime - Cyberwarfare, Cybercrimes and Cybersecurity - News Review Update




FBI Creates New Role In Battling Cybercrime

1 Share
As cybercrime grows, so do the FBI’s attempts to fight it.
Late last week, the Federal Bureau of Investigation announced the appointment of Joseph M. Demarest Jr. to the newly established role of associate executive assistant director for the bureau’s Criminal, Cyber, Response, and Services Branch (CCRSB).
As explained in a press release, FBI Director James B. Comey created the position specifically in response to the FBI’s need to expand its operations related to cyber and criminal investigations, international operations, critical incident response, and victim assistance.
“In his new role, [Demarest] will serve as chief operations officer for CCRSB — providing technical advice and guidance across its components while establishing and nurturing relationships with federal, state, and local law enforcement and intelligence agencies,” said Comey in the release. “With almost 30 years of FBI experience in investigative operations and national security matters, Joe brings a wealth of subject matter expertise to this new executive position.”
The release states that Demarest — who has been with the FBI since 1988 — most recently held the position of assistant director of the bureau’s Cyber Division.
The creation of his new position comes at a time when, as The Hill points out, the FBI and other agencies — such as the Justice and Homeland Security Departments — are struggling to keep pace with ever-evolving cybercrime activity, restructuring offices and forming all-new positions dedicated to that fight.
The outlet additionally puts forth the likelihood that, based on Comey’s remarks, he believes Demarest’s varied experience will be particularly beneficial in improving communication between various governmental departments in the battle against cybercrime.
Should this be the case, it would be a furtherance of goals previously established by the Cyber Threat and Intelligence Integration Center (CTIIC), an organization that President Barack Obamaauthorized earlier this year for the purposes of coordinating information between various agencies and departments that handle cyberattacks.

All FBI offices including Cleveland amping up cyber crime response due to growing threats

1 Share
CLEVELAND - Perhaps the biggest challenge that cyber crime poses to the FBI is how to convey just how much of a threat it is to the United States and you.
“It’s your info they’re coming after,” warned Joe Demarest, Assistant Director to the FBI’s Cyber Crime Division, on a recent visit to Northeast Ohio to meet with the Cleveland field office and address the City Club about these concerns.
Cyber threats have shot to the top of the FBI's concerns because it involves everything regarding money and technology.
As are all of the FBI’s field offices, the Cleveland FBI is working to prevent the devastating losses that cyber crime can have on business in Northeast Ohio.
In recent years, the FBI established a cyber task force at each of its 56 field offices, manned by about 1,200 people.
On April 25, news surfaced that Russian hackers breached White House computers and obtained sensitive information, including President Obama’s unclassified email.
While that is a stunning headline, cyber crime still comes off as a distant, abstract concept to average people – at least, until their identity gets stolen.
Demarest said cyber threats generally fall into five different categories.
CYBER TERROR
The FBI is most worried about cyber terror from groups like ISIS, Hezbollah, Hamas, and the Cyber Caliphate.
One nightmare scenario would see such a group attacking the electronic infrastructure of the U.S. and knocking out our power indefinitely.
But Demarest said the impact of cyber terror can be much more subtle.
In January, all it took was a message on Twitter to create a bomb scare on two commercial jets, resulting in F-16 fighter jets escorting the planes to their destination, where bomb squads went through the luggage of every passenger.
It was a hoax.
But Demarest said that terror groups take note of the reaction and quickly learn how they can disrupt life in America with a simple posting on social media.
Also in January, the group calling itself Cyber Caliphate hacked the Twitter account of U.S. Central Command.
Classified information was not accessed, but from a public viewpoint, Demarest said that type of hacking is an embarrassment for such an important government agency.
“I feel sorry for them,” he said. “Pretty big deal.”
Nevertheless, Demarest said hacking into a social network is low level.
What is more alarming is how terror groups like ISIS have used social networking to their advantage, recruiting an army of hackers worldwide.
“It's hard to believe they developed that capacity,” Demarest noted.
NATION STATES
Much like the aforementioned Russian hacking, the FBI’s next area of cyber concern is foreign countries trying to steal our industrial information or military secrets.
“Nation states – the most prolific army working against us,” Demarest said.
One of the most notable recent cases was North Korea hacking Sony Pictures over the controversial comedy “The Interview” in December.
Within hours of the attack on Sony, Demarest said the FBI had teams on the ground at Sony offices, going from computer to computer.
Thousands of emails from Sony employees were exposed, causing some people to lose their jobs while the financial damage to Sony ran into the millions of dollars.
No two nation states are alike in regards to the threat they pose to the U.S.
Demarest said China remains the biggest threat; Asian actors tend to infiltrate the U.S. health care industry.
While Russia poses a threat, Demarest said its abilities are not as good as ours – although its know-how can sometimes be traced back here.
“There are [people with] PhDs working against us on the other side of the world. Many are trained here in the U.S.,” he said.
Although the U.S. is currently working on a nuclear deal with Iran, the country remains a threat in the Middle East.
Demarest said the FBI has watched – in real time online – as Iran updated its hacking skills while attacking U.S. banks.
Demarest said Middle Eastern actors, like Iran, want to see how we defend ourselves. With every attack, they collect and analyze our reaction, then evolve their skills for the next attack.
Skilled hackers make stealing information appear to be normal data transfers. Many businesses do not realize they were hit until the damage is done.
For these reasons, the FBI has developed cyber threat teams that focus on different countries, like China, Iran, and Russia.
These agents have extensive knowledge and expertise about these various countries.
In fact, the FBI can sometimes gauge the age range and location of hackers based on timing.
“During World Soccer Cup, all our actors go quiet for two weeks,” Demarest noted.
CYBER CRIMINALS
The third most worrisome group for the FBI is the average criminal with savvy computers skills who wants to get access to your personal information.
And the person who actually steals your Social Security number, pin numbers, and passwords may not be the one who ultimately exploits it.
These criminals do not necessarily have to hack your computer to get this information.
Millions of Americans’ personal info was exposed after being targeted by cyber criminals in 2014. Among those include people who conducted financial business with Target, Home Depot, UPS, and Anthem Blue Cross.
Demarest said those criminals typically sell the information to the highest bidder on the dark web.
What exactly is the dark web? If you’re law abiding and reading this, you don’t have access to it.
The dark web is a series of websites that do not show up in search engines, but are a virtual playground where cyber criminals run wild.
“This is the Wild West,” Demarest said.
One of the most notorious sites on the dark web was known as Silk Road. It was a Tor hidden service where users typically traded goods using Bitcoin. The FBI shut it down in 2013.
James Noga, Vice President and Chief Information Officer for Partners Healthcare, said that medical records can go for $50 on dark web bidding.
The term “health care fraud” does not grab the average person’s interest, but its impact is significant. Noga said $12 billion were lost in such crime last year.
Cyber criminals have hacked the health care industry for much more than insurance fraud.
Hacking has been used to create fake prescriptions and - in some cases - criminals have received treatment under the name of a real person.
Noga said there have been times where patients will go to the doctor, only to be told they cannot give blood because they are on record as having a disease.
Except it’s not the patients with the disease; it was the criminal who used their name to get prior treatment.
“If you lose your insurance card, treat it like a credit card and report it,” Noga said.
But the goals and impact of cyber criminals can go beyond economics.
Noga said that today’s technology raises the concern that criminals can hack into operating rooms and interfere with blood pressure equipment or even anesthesia levels.
But the typical American is most likely to feel the impact of a cyber criminal who targets his or her identity and steals that information.
Demarest said these personal stories are the ones that catch the average American’s attention and alerts them to the importance of vigilance online.
“Numbers are numbers,” Demarest said, “but the personal story resonates the most in trying to reach the audience about dangers.”
Many people hear of big companies like Anthem Blue Cross and lose interest. But hearing about a grandmother who lost her life savings over such a breach sounds the alarm.
When doing any business online, people should always be careful about the websites they load personal information on.
Noga said that cyber criminals will scan your social media accounts to look for personal information they can use to gain access to your financial accounts.
Just consider how many people have their birth dates visible on Facebook.
If your computer is hacked, you could be posting personal info on a legitimate website, but your server is still feeding the information to hackers.
Because of this, it is important for people to never click on questionable links – even ones that your friends post on social media – and always delete suspicious emails.
Denial of service attacks are becoming more common. This is often referred to as “ransomware.”
A person’s computer will get infected, and the hacker will “lock” the computer, forcing the victim to pay a ransom online to get access to the computer’s files again.
Noga said people have had to pay to retrieve their medical records.
It is also quite common for email accounts to get hacked. You may get an email sent from a friend’s account, suggesting you click on a link for a great deal or to watch a cute video.
Except that email was not sent by your friend, and clicking on it downloads a virus or malware onto your computer.
Noga said people should be as suspicious of emails in their inbox as they would strangers in their neighborhood.
"HACKTIVISTS"
The term hacktivist refers to activists who use their hacking skills to convey their agenda, and they rank fourth on the list of the FBI’s cyber concerns.
The most notorious of these groups is Anonymous, an international network of hackers.
It purportedly has no leader; that opposes its communal ideology. Instead, it presents itself as a collective that purports to work toward the common good.
Some refer to Anonymous as a digital Robin Hood; others call it cyber terror.
Anonymous has targeted less favorable groups like the Westboro Baptist Church, child porn, Scientology, and ISIS. But it has also attacked the New York Stock Exchange, PayPal, Israel, and U.S. government agencies.
When Anonymous hit Wall Street, Demarest said the attack was specifically timed for financial impact.
Anonymous has targeted cities and police departments where controversial cases of suspects dying with police involvement occurred, including Ferguson, Missouri.
In November of 2014, 12-year-old Tamir Rice was carrying an airsoft gun when he was shot and killed by a Cleveland police officer.
In the following days, Anonymous shut down the Cleveland city website and posted a video about the incident online.
In some instances, Anonymous posted the names and addresses of officers and law enforcement officials online.
The implied motive of that action is to give some agitated individual the information to carry out retaliation in real life.
Northeast Ohio has involvement from Anonymous spanning back to the Steubenville rape case in 2012.
It was the hacktivist group that helped expose that something had taken place and that authorities should get involved.
Anonymous also organized rallies in Steubenville, which helped put the rape investigation into the national spotlight.
Ultimately, two Steubenville High School football players were convicted of raping an underage girl.
Justice is what Anonymous wants, but that responsibility is up to law enforcement and courts.
Because Anonymous has used illegal means to reach its ends, the FBI has arrested several of its members.
INDUSTRY INSIDERS
The last significant cyber threat the FBI is concerned about comes from the inside.
Leaks happen all the time, but Demarest said few are as infamous or have done as much damage as Edward Snowden, who worked with the NSA, CIA, and DIA.
Snowden fled the country and released millions of classified documents outlining numerous global surveillance programs ran by the NSA. 
Some have labeled Snowden a hero or a whistleblower while others, like Demarest, label him a criminal.
Once an organization realizes an insider has leaked its information, it is crucial for the organization to get ahead of the leak and contain the damage.
“It’s a race to get to the media,” Demarest said.
Snowden worked for the federal government, but many industries and corporations are at risk of insiders exploiting their access and selling information to the highest bidder.
But sometimes insiders do not realize they were responsible for a leak.
Demarest said employees who are not careful with their information can unintentionally cause a leak, and lead to just as much damage to their organization.
ATTITUDE SHIFT
As technology develops, companies must not only adapt to the growing prospects of cyber threats, but they must adapt their attitudes to survive.
Much has changed in a short amount of time.
Five years ago, Noga said, it was considered taboo and shameful if your company was hacked, and many hesitated to be transparent about the attack.
“It is our job to protect our company’s assets,” said Amy Brady, Chief Information Officer of KeyBank in Cleveland.
For that reason, both Brady and Noga have seen businesses adapt and seek out the help of the government quickly.
They also share information with other companies that have suffered similar attacks, in an effort to build up their defenses against a mutual threat.
“Every industry has to be aware and has to take it seriously,” Brady said.
Working at KeyBank, Brady has seen a significant shift in the financial world’s attitude on hacking.
But the same does not appear to hold true at many technologically-based companies, such as Apple, Facebook, or Google.
“Interesting [to see] Silicon Valley's view of government – rigid, unfriendly. They think we’re limited,” Demarest said.
These companies hesitate to share information about cyber attacks with companies they are competing with, let alone seek out the help of the federal government.
But Demarest said the FBI is working to improve these relations and reach out to tech firms to assure them that the FBI is on their side.
Demarest said a lack of trust impacts their ability to stop the threat.
In April, Secretary Jeh Johnson said the Department of Homeland Security is setting up a satellite office in Silicon Valley in an effort to bridge the gap and build better relationships.
THE CHALLENGE OF PREVENTION
The satellite office could also serve as a way for the federal government to recruit experienced talent in the cyber world.
Brady said young people who want a hot career should get into the cyber information industry.
“It’s not like you could just bring somebody in,” Demarest said of the FBI’s challenge in finding tech savvy experts.
Partners Healthcare tries to recruit college students, Noga said, because members of the younger generation are “digital natives” who have a hugely different perception of personal privacy online.
In that regard, Demarest said businesses cannot have an old-fashioned, tight-lipped approach to intrusions anymore.
“They’re going to get in. We need to figure out how to keep them from getting back out,” Noga said, regarding the challenge of tracking down intrusions.
When asked what companies can do to prevent getting hacked, Demarest was blunt.
“Go back to pen and paper,” he said.
Demarest said companies must form a response plan before they get attacked, but that does not prevent them from a breach.
A plan can only help them to deal with the damage control.
“You’re all going to get hacked,” Demarest said. “It’s going to happen.”
More information can be found at the FBI website.
---

Download the newsnet5 app:
Read the whole story

· · · · · · · · · · · · · ·

Encryption: What The FBI Wants It Can Only Have By Destroying Computing And Censoring The Internet

1 Share
The FBI -- and by extension, every law enforcement agency it partners with -- wants holes carved in cellphone encryption. The problem is that it doesn't even know what specifically it wants.
When asked directly if the FBI wants a backdoor, [Amy] Hess [Asst. Director of FBI's Science & Technology branch] dodged the question and did not describe in detail what actual solution the FBI is seeking.
“We are simply asking for information that we seek in response to a lawful order in a readable format,” Hess responded, while also repeating that the Bureau supports strong encryption. “But how that actually happens should be the decision of the provider.”
When pressed again, Hess said that it would be okay for the FBI not to have a key to decrypt data, if the provider “can get us that information by maintaining the key themselves.”
That's asking the impossible -- for a great many reasons. First and foremost, compromised encryption is compromised encryption. It can be exploited by criminals and other unwanted entities just as certainly as it can assist law enforcement agencies in obtaining the information they're seeking. There's no way around this fact. You cannot have "good guys only" encryption. 
But beyond that, even if the FBI manages to get what it wants, it will do so at the expense of general computing. Requiring built-in backdoors or key escrow will dismantle the very systems it's meant to access. Computer scientist Jonathan Mayer delivers a 
long, detailed hypothetical involving the Android platform and how the FBI's desired access would fail
 -- and do severe collateral damage -- every step of the way. (via 
Boing Boing
First off, if Google gives the FBI the backdoors it wants, that only nails down Google. But Google also distributes thousands of third-party apps through its Play store. And these apps may not contain the subverted encryption the FBI is looking for. Now, Google has to be in the business of regulating third-party apps to ensure they meet the government's standard for compromised encryption.
The obvious answer is that Google can’t stop with just backdooring disk encryption. It has to backdoor the entire Android cryptography library. Whenever a third-party app generates an encrypted blob of data, for any purpose, that blob has to include a backdoor.
This move may work, but it only affects apps using Google's encryption. Other offerings may rely on other encryption methods. Then what? It has a few options, all of them carrying horrendous implications.
One option: require Google to police its app store for strong cryptography. Another option: mandate a notice-and-takedown system, where the government is responsible for spotting secure apps, and Google has a grace period to remove them. Either alternative would, of course, be entirely unacceptable to the technology sector—the DMCA’s notice-and-takedown system is widely reviled, and present federal law (CDA 230) disfavors intermediary liability.
At this point, Mayer suggests the "solution" is already outside the realm of political feasibility. Would the FBI really 
push this far
 to obtain encryption backdoors? The FBI itself seems unsure of how far it's willing to go, and many officials quoted (like the one above) seem to think all the FBI really needs to do is be very insistent on this point, and techies will come up with some magical computing solution that maintains the protective qualities of encryption while simultaneously allowing the government to open the door and have a look around any time it wants to. 
So, if the FBI is willing to travel this very dark road littered with an untold amount of collateral damage, it still hasn't managed to ensure the phones it encounters will open at its command. Considering phone users could still acquire apps from other sources, the government's reach would only extend as far as the heavily-policed official app store (and other large competitors' app stores). Now what? More government power and less operational stability.
The only solution is an app kill switch. (Google’s euphemism is “Remote Application Removal.”) Whenever the government discovers a strong encryption app, it would compel Google to nuke the app from Android phones worldwide. That level of government intrusion—reaching into personal devices to remove security software—certainly would not be well received. It raises serious Fourth Amendment issues, since it could be construed as a search of the device or a seizure of device functionality and app data. What’s more, the collateral damage would be extensive; innocent users of the app would lose their data.
Even if the government were willing to take it this far, it still doesn't eradicate apps that it can't crack. (But it may be sufficient to only backdoor the most used apps, which may be all it's looking to achieve...) App creators could decide to avoid Google's government-walled garden and mandated kill switch by assigning random identifiers and handling a majority of the app's services (like a messaging service, etc.) via a website, out of reach of app removal tools and government intervention. To stop this, the US government would need to do the previously unimaginable:
In order to prevent secure data storage and end-to-end secure messaging, the government would have to block these web apps. The United States would have to engage in Internet censorship.
Robert Graham at Errata Security 
makes similar points in his post on the subject
, but raises a couple of other interesting (in the horrific train wreck meaning of the word) points. While the government may try to regulate the internet, it can't (theoretically) touch services hosted in foreign countries. (Although it may soon be able to 
hack away
 at them with zero legal repercussions…)
Such services could be located in another country, because there are no real national borders in cyberspace. In any event, such services aren't "phone" services, but instead just "contact" services. They let people find each other, but they don't control the phone call. It's possible to bypass such services anyway, by either using a peer-to-peer contact system, or overloading something completely different, like DNS.
Like crypto, the entire Internet is based on the concept of end-to-end, where there is nothing special inside the network that provides a service you can regulate.
The FBI likely has no desire to take its fight against encryption this far. The problem is that it thinks its "solution" to encryption is "reasonable." But it isn't.
The point is this. Forcing Apple to insert a "Golden Key" into the iPhone looks reasonable, but the truth is the problem explodes to something far outside of any sort of reasonableness. It would mean outlawing certain kinds of code -- which is probably not possible in our legal system.
The biggest problem here is that no one arguing for "
golden keys
," key escrow, "good guy" backdoors, etc. seems to have 
any idea
 what implementing this could actually result in. They think it's just tech companies sticking it to The Man, possibly because a former NSA sysadmin went halfway around the world with a pile of documents and a suitcase of whistles with "BLOW ME" printed on the side. 
But it isn't. And their continual 
shrugged assertion
 that the "smart guys" at tech companies will figure this all out for them is not only lazy, it's colossally ignorant. There 
isn't
 a solution. The government can't demand that companies 
not
 provide encryption. It's not willing to ban encryption, nor is it in any position to make that ban stick. It doesn't know what it needs. It only knows what it
wants
. And it can't have what it wants -- not because no one wants to give it to them -- but because no one 
can
 give it to them. 
Yes, many tech companies are far more wary of collaborating with the government in this post-Snowden era, but in this case, the tech world cannot give the FBI what it wants without destroying nearly everything surrounding the "back door." And continually 
trotting out
kidnappers, child porn enthusiasts and 
upskirt photographers
 as reasons for breaking cell phone platforms doesn't change the fact that it cannot be done without potentially harming every non-criminal phone owner and the services they use.
Read the whole story

· · · · ·

Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says 

1 Share
A new study concludes that Iran has greatly increased the frequency and skill of its cyberattacks, even while negotiating with world powers over its nuclear program.

In Purchase, Raytheon Gets Defense-Grade Cybersecurity

1 Share
Raytheon is buying the cybersecurity company Websense from the private equity firm Vista Equity Partners in a deal valued at $1.9 billion, a move aimed at making defense-grade cyberprotection available to businesses.

Pentagon Announces New Strategy for Cyberwarfare

1 Share
The policy marks the fourth time in four months that the Obama administration has named suspected hackers or announced new strategies designed to raise the cost of cyberattacks.
Next Page of Stories
Loading...
Page 2

Preparing for Warfare in Cyberspace - New York Times

1 Share

New York Times

Preparing for Warfare in Cyberspace
New York Times
With so many government agencies involved in cybersecurity — the National Security Agency, the Department of Homeland Security, the Central Intelligence Agency, the F.B.I. and the Pentagon — the potential for turf fights and duplication is high. The ...

Russian cyberwar advances military interests in Ukraine, report says - Fortune

1 Share

Fortune

Russian cyberwar advances military interests in Ukraine, report says
Fortune
Cyberwar does not take place in vacuum. When a geopolitical showdown is underway, nation states have every incentive to advance their interests using digital means. One of the latest examples? Russia hacking Ukrainian systems. A report out of Arlington ...
Lookingglass Report: Russia Backed Cyber Attacks on Ukrainian Gov't LeadersExecutiveBiz (blog)

all 4 news articles »

Colleges in a cyber war with hackers; open networks vulnerable to attacks - NorthJersey.com

1 Share

NorthJersey.com

Colleges in a cyber war with hackers; open networks vulnerable to attacks
NorthJersey.com
The cyberattack that crippled Rutgers University for the past three days was part of a string of attacks that attempt to exploit weaknesses that are unique to the way colleges operate. The attack, which was the third at Rutgers since November, came as ...

and more »

Countdown to Zero Day, book review: Dispatches from the first cyberwar - ZDNet

1 Share

Countdown to Zero Day, book review: Dispatches from the first cyberwar
ZDNet
... as intended, to slow Iran's ability to generate sufficient quantities of enriched uranium to make nuclear bombs, but the collateral damage was intense: the US and Israel lost the moral high ground from which to argue against cyber-warfare; the ...

Information Security: Identifying Your Weakest Links - InformationWeek

1 Share

InformationWeek

Information Security: Identifying Your Weakest Links
InformationWeek
As hackers become more advanced, IT execs struggle to identify the best methods for monitoring, identifying, and defending against security risks. Information security and risk management are a core focus at Interop Las Vegas, taking place this week at ...

Former Intelligence Chief: US and Israel Must Increase Collaboration in Cyber ... - JP Updates

1 Share

Newsweek - Europe

Former Intelligence Chief: US and Israel Must Increase Collaboration in Cyber ...
JP Updates
Cyber warfare is a very real reality. Any military force ... Unconfirmed reports claim that a joint effort by Israel the US was responsible, which was precisely the point of the conference; to advance cooperation between the two countries in cyber war ...
Protect Cybersecurity Spending to Avoid Attacks on Energy InfrastructureNewsweek - Europe

all 23 news articles »
Next Page of Stories
Loading...
Page 3

The cyber gold rush - Yahoo News

1 Share

Christian Science Monitor

The cyber gold rush
Yahoo News
Mr. Dinegar hopes the military's double-down on cybersecurity will convince the businesspeople it's worth supplying the thousands of specialists who will be attracted to the area with everything from homes to dry cleaning to office-moving services ...
America needs a good cyber planSuffolk News-Herald

all 5 news articles »

Cyber war and peace - New Vision

1 Share

Cyber war and peace
New Vision
Information and communication technologies have become a central part of everyday life for most of the world's population. They affect even the most underdeveloped and remote areas of the planet and have become a key factor driving development, ...

and more »

Senior information security officials in U.K. do not trust cyber insurance ... - Canadian Underwriter

1 Share

Canadian Underwriter

Senior information security officials in U.K. do not trust cyber insurance ...
Canadian Underwriter
New insurance products meant to protect businesses from cyber attack-related losses are being met with skepticism in the United Kingdom, with just shy of half of polled senior information security officials reporting that the thought their policies ...

Are we surrendering the cyberwar? - Computerworld

1 Share

Computerworld

Are we surrendering the cyberwar?
Computerworld
... public and private computer systems essentially indefensible, and no amount of security guidance can provide salvation." I confess that this comment set me off a bit, as it sounds like we are prematurely raising the white flag of surrender in the ...

Microsoft bangs the cybersecurity drum with Advanced Threat Analytics - Ars Technica

1 Share

eWeek

Microsoft bangs the cybersecurity drum with Advanced Threat Analytics
Ars Technica
This needs a different approach to network security, Microsoft says, and new software built to sniff out anomalous activity, even if it looks superficially legitimate. In November last year, Microsoft bought enterprise security firm Aorata, and at ...
Microsoft announces new cybersecurity toolsThe Hill

all 4 news articles »

China orders Muslim shopkeepers to sell alcohol, cigarettes, to 'weaken' Islam - Washington Post (blog)

1 Share

International Business Times

China orders Muslim shopkeepers to sell alcohol, cigarettes, to 'weaken' Islam
Washington Post (blog)
Chinese authorities have ordered Muslim shopkeepers and restaurant owners in a village in its troubled Xinjiang region to sell alcohol and cigarettes, and promote them in “eye-catching displays,” in an attempt to undermine Islam's hold on local ...
Muslims In China: Chinese Shop Owners Ordered To Sell Alcohol, Cigarettes To ...International Business Times
Why China is forcing its Muslims to sell alcoholYahoo News
Muslim shopkeepers in China 'forced' to sell alcohol, cigarettesAl-Arabiya
Daily Caller -TheBlaze.com
all 39 news articles »
Next Page of Stories
Loading...
Page 4

Valuable Federal Cybersecurity Training for Critical Infrastructure Organizations - Network World

1 Share

Valuable Federal Cybersecurity Training for Critical Infrastructure Organizations
Network World
In the first blog, I mentioned some ESG research stating that 76% of cybersecurityprofessionals working at critical infrastructure organizations were somewhat or very unclear about the US government's cybersecurity strategy (note: I am an ESG employee).

Calls to Punish China Grow - Bloomberg View

1 Share

Bloomberg View

Calls to Punish China Grow
Bloomberg View
Some leaders in Congress and the military want to exclude China, warning about its militarybuildup in the East China Sea and the South China Sea, which includes a rapid plan to buildmilitary-friendly infrastructure on new islands in waters where at ...

ISO 27018: Protecting privacy and national security too - Federal Times

1 Share

ISO 27018: Protecting privacy and national security too
Federal Times
Bryan Cunningham is an information security, privacy, and data protection lawyer, and a senior advisor of The Chertoff Group. In the late 1970s, Leonard Nimoy (RIP Mr. Spock) hosted a weekly television "documentary" called "In Search Of…," in which he ...

Russia Updates National Security Strategy To Respond To 'New Emerging ... - International Business Times

1 Share

International Business Times

Russia Updates National Security Strategy To Respond To 'New Emerging ...
International Business Times
Russia is bringing its national security and information security doctrines up to date with the amended military doctrine President Vladimir Putin signed into law in December. Russia's state-of-the-art Armata tank will be rolled out for the Victory Day ...
Russia Revising National Security Strategy to Reflect New ThreatsSputnik International
International Business Times: Russia updates national security strategy to ...Kyiv Post

all 7 news articles »

New military chief is 'strategist,' not cyber expert - The Hill

1 Share

New military chief is 'strategist,' not cyber expert
The Hill
President Obama's pick to become the nation's next top military officer, Marine Gen. Joseph Dunford Jr., bucks a recent trend of cyber-focused appointments. “He's not a cyber expert,” said Peter Metzger, a former CIA intelligence officer and Marine who ...

and more »

Hackers: Who Are They and Why Are They So Hard to Stop? - NBC 6 South Florida

1 Share

NBC 6 South Florida

Hackers: Who Are They and Why Are They So Hard to Stop?
NBC 6 South Florida
Computer hacking is big business, striking big business, the U.S. government, even the stock exchange. Security experts say the criminals are tough to find and prosecute because thy are highly organized, operate underground and often in other countries.

Next Page of Stories
Loading...
Page 5

Cyber security key to safeguard business, govt sector assets - The Borneo Post

1 Share

Cyber security key to safeguard business, govt sector assets
The Borneo Post
“These threats may seek to steal money or proprietary data, invade private records, conduct industrial espionage, cease vital industrial operations or even engage in information warfarewhich is detrimental to economic growth,” she said. Data from ...
VR Cyber Security: Team of IT Experts Transforming Cyber SecuritySiliconindia.com

all 2 news articles »

IT Security Hangout May 7: New Strategies vs. Cyber-attacks - eWeek

1 Share

IT Security Hangout May 7: New Strategies vs. Cyber-attacks
eWeek
Join us for an informative Google Hangout at 1 p.m. EST/10 a.m PST on Thursday, May 7 to hear professional insight on cyber-security trends and products. Join panelists from QuinStreet Enterprise sites eWEEK, eSecurity Planet, IT Business Edge and ...
IT Security Hangout: Cyber Attack Trends and Security StrategieseSecurity Planet

all 2 news articles »

Small businesses and charity organizations hacked by possible pro-ISIS group - WOWK

1 Share

WOWK

Small businesses and charity organizations hacked by possible pro-ISIS group
WOWK
The FBI is not saying it is ISIS doing the hacking, but is looking into the matter. "This is an active investigation that the FBI is looking into," Agenbaum said. Many of these organizations are using free software to run their sites, which makes ...

and more »

From tea to tech: China's push into cybersecurity is sparking a 'gold rush' - Business Insider

1 Share

Business Insider

From tea to tech: China's push into cybersecurity is sparking a 'gold rush'
Business Insider
After the Snowden leaks, Microsoft said it would stop supporting Windows XP, leaving many computer systems potentially vulnerable to hackers. Incensed, Chinese leaders banned Windows 8 in retaliation, while antitrust regulators last year opened an ...

and more »

Cyber security a top priority for State Security - Eyewitness News

1 Share

Eyewitness News

Cyber security a top priority for State Security
Eyewitness News
CAPE TOWN - State Security Minister David Mahlobo on Tuesday said cyber security is a top priority for the agency this year. He's told Members of Parliament (MPs) the State SecurityAgency's ability to combat cyber crime will be beefed up. Mahlobo was ...
Govt to finalise cyber security policyITWeb
Spy minister criticised on xenophobia gapBDlive
SA Security Forces Remain Vigilant Against Terrorist ThreatsAllAfrica.com

all 20 news articles »

Digital era complicates cyber security - ITWeb

1 Share

ITWeb

Digital era complicates cyber security
ITWeb
Security analytics will be critical to cyber security systems as the third platform infrastructure era enters the critical "innovation stage". Data is a source of revenue for many companies and information security needs to be a top concern. However ...
Big data analytics are the future of cyber securityV3.co.uk

all 70 news articles »
Next Page of Stories
Loading...
Page 6

Russian government approves information security agreement with China - Russia and India Report

1 Share

Russian government approves information security agreement with China
Russia and India Report
"The agreement's purpose is to offer legal and organisational bases for cooperation between Russia and China in international information security," the website informs. "The agreement lists basic threats, offers directions, approaches, forms and ...
Russia and China to collaborate on information securitySC Magazine UK

all 10 news articles »

Inside the mind of the FBI's most wanted hacker - NEWS.com.au

1 Share

NEWS.com.au

Inside the mind of the FBI's most wanted hacker
NEWS.com.au
During the early 90s, he became the world's most wanted hacker after breaking into the computer systems of 40 major corporations, stealing corporate secrets and scrambling phone networks. He was also suspected of hacking the national defence warning ...
Kevin Mitnick's story shows why we shouldn't use jail to make examples of hackersStartupSmart
Why jail won't stop hackersBusiness Spectator

all 6 news articles »

IRS sets up dedicated cybercrime unit to combat identity theft - ZDNet

1 Share

ZDNet

IRS sets up dedicated cybercrime unit to combat identity theft
ZDNet
Emails -- targeted at individuals or sent en masse -- masquerade as legitimate businesses such as banks, social media websites and loan companies and include either malicious attachments containing malware payloads or links to malicious websites.

Here's What a Cyber Warfare Arsenal Might Look Like - Scientific American

1 Share

Scientific American

Here's What a Cyber Warfare Arsenal Might Look Like
Scientific American
U.S. government agency and industry computer systems are already embroiled in a number of nasty cyber warfare campaigns against attackers based in China, North Korea, Russia and elsewhere. As a counterpoint ... “The instrument of creating that damage ...
Is cyber-warfare really that scary?BBC News

all 3 news articles »

Does America have a cyber plan? - Tidewater News

1 Share

Does America have a cyber plan?
Tidewater News
Information is exchanged at the speed of light, but boundaries are elusive — not the least of which is safeguarding privacy while simultaneously protecting Americans from the 21st century threats of terrorism. From the beginning, we've attempted to ...

The impossible task of counting up the world's cyber armies - ZDNet

1 Share

ZDNet

The impossible task of counting up the world's cyber armies
ZDNet
That's partly because they are reluctant to tip off potential adversaries about their capabilities, but the bigger issue is that it's intelligence agencies like the NSA and GCHQ that have been pioneering the use of the internet for surveillance and ...

Next Page of Stories
Loading...
Page 7

Judge tosses eBay data breach class action - The Hill

1 Share

Judge tosses eBay data breach class action
The Hill
... identity theft or identity fraud, to the extent any exists in this case, does not confer standing on plaintiff to pursue this action in federal court." The ruling, a victory for eBay, sheds light on the specifics of the company's 2014 data breach ...

Hacking a 21st Century Government - Huffington Post

1 Share

Huffington Post

Hacking a 21st Century Government
Huffington Post
Can you imagine walking into your public library looking for a specific book only to discover that nothing is organized and there is no Dewey Decimal system to help you locate it? Or firing up your laptop to find something online, but every search ...

and more »

Leading Human Rights Defender Arrested In Iran


No comments:

Post a Comment