Blog Posts Tagged with "Government"

69dafe8b58066478aea48f3d0f384820

MS-ISAC Meeting Explores Advanced Persistent Threats

August 22, 2012 Added by:Headlines

The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...

Comments  (1)

0ff0a77035f9569943049ed3e980bb0d

Cyber Militias in the US: Feasibility, Structure, and Purpose

August 21, 2012 Added by:

Offensive cyber attacks benefit from their lack of structure and diversity of attack vectors. Cyber militias can be assigned a target and given the ability to choose their methods based on their capabilities. The absence of formal rules of engagement allows the cyber militia to exercise creativity and innovation...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

On Project Viglio

August 21, 2012 Added by:Infosec Island Admin

A group such as this, extra-legal as they seem to be and rather deliberately evasive using the rubric of “secrecy” as their cloak should set all of your spidey senses off. At best they are a group of people seeking to do good, but in fact may be doing ill by carrying out poor OSINT...

Comments  (30)

03b2ceb73723f8b53cd533e4fba898ee

FinFisher: The Cyber Espionage Tool Found Everywhere

August 15, 2012 Added by:Pierluigi Paganini

FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cyber Arms Deals and Latin America in the Post-Stuxnet World

August 15, 2012 Added by:Richard Stiennon

The trade of conventional weapons is a multi-billion dollar industry. But when it comes to cyber weapons, developed nations have yet to place limits on what kind of offensive software can be sold. It becomes a necessity to begin some kind of international regulatory system for cyber weapons and the prerequisite expertise...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Joins NACo Cyber Security Task Force

August 08, 2012 Added by:Headlines

"In today's world where cyber has become a strategy in war, America's Counties are key players in homeland security; commissioners, supervisors, and local policy makers have to become educated on this issue and be ready to protect our citizens from breaches of confidentiality and more..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI’s Facial Recognition is Coming to a State Near You

August 07, 2012 Added by:Electronic Frontier Foundation

The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Chimps With Guns and the Bloggers Who Give Them Ammo

August 02, 2012 Added by:Infosec Island Admin

One must know the technology and the problems with it before using it cognizantly. This unfortunately is not the case in what is being advocated by Quinn Norton on Wired with regard to Cryptocat. Specifically where she makes declamations about overthrowing governments with things like untested crypto schemes...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GSA Seeks Cloud Brokerage Information

July 28, 2012 Added by:Kevin L. Jackson

The objective of this RFI is to learn more about how government can further leverage the key characteristics and advantages of cloud computing to save money and increase IT efficiencies. CSB's are one concept that GSA is exploring and this RFI contains questions specific to cloud brokerages...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

New Cybersecurity Bill Patches Serious Vulnerabilities

July 24, 2012 Added by:Electronic Frontier Foundation

We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Power Pwn and DARPA Programs for Developing Hacking Tools

July 23, 2012 Added by:Pierluigi Paganini

Network analysis has never been easier. Power Pwn, which looks like a surge protector, can be controled remotely via Wi-Fi, Bluetooth, and Ethernet as it searches for network weaknesses. It’s fully manageable via a Web interface accessible through the unit's 3G radio or directly to the device via text message...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »