Blog Posts Tagged with "Government"

7ddc1f3000a13e4dfec28074e9e7b658

Hacking Strikes Fear in the Heart of Texas Bureau of Prisons

June 24, 2012 Added by:Electronic Frontier Foundation

Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds Release Digital Government Strategy

June 22, 2012 Added by:Headlines

The Federal government released The Digital Government Strategy, a 12-month action plan for the deployment of new technology is designed to enable the delivery of digital information and services anytime, anywhere, on any device, safely and securely-throughout the Federal workforce and to the American public...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Microsoft, the CIA and NSA Collude to Take Over the Internet

June 20, 2012 Added by:J. Oquendo

The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Oh No, UN Control!

June 19, 2012 Added by:Jayson Wylie

The problem is that we have a bunch of ‘Bad Actors’ seeking to undermine the United States' plan for a global internet presence and freedom of information, and replace it with their own agenda of propaganda, isolationism and censorship of their populace. There is no logical course of events here...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Tweeting About Cyberwar and Other Ridiculous Ideas

June 19, 2012 Added by:Infosec Island Admin

I have said this before and I am saying it again, we are just monkeys with digital guns. Fools with tools really. I am afraid of the level of hubris here and frankly feel that it’s almost time to just become a Luddite. At least Luddites won’t be compromised by their toasters because China made malware to p0wn us...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

FBI Announces Executive Appointments in Cyber Division

June 19, 2012 Added by:Headlines

FBI Director Robert S. Mueller announced that Joseph M. Demarest will move to the Cyber Division as assistant director and that Cyber Division Section Chief James C. Burrell has been appointed deputy assistant director of the Cyber Division at FBI Headquarters...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft May Be Infiltrated by Government Cyber Operatives

June 18, 2012 Added by:Headlines

“If there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off... This makes you think that this breach of Microsoft's update system was done by someone like the NSA..." said F-Secure's Mikko Hypponen...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber Warfare, Budget Cuts and a Shortage of Cyber Experts

June 16, 2012 Added by:Pierluigi Paganini

Despite the increased engagement in cyber warfare, the US must faces a crisis which has inevitable effects on the budgets allocated to defense. U.S. Defense Secretary Leon Panetta often has expressed concerns about the possibility of a major cyber attack against the US and its critical infrastructure...

Comments  (6)

7fef78c47060974e0b8392e305f0daf0

It’s the 90′s All Over Again, Except This Time Online...

June 15, 2012 Added by:Infosec Island Admin

It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA's National Centers of Academic Excellence Announced

June 15, 2012 Added by:Headlines

Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cloud Insecurity? NSA Chief Keith Alexander Thinks Not

June 14, 2012 Added by:Headlines

“If you’re moving information into the cloud, it just seems to me that all kinds of nasty activity could go on in there. I would take a Missouri approach and say, ‘prove it to me, show it to me,’ how it’s more secure,” said former director of intelligence, surveillance and reconnaissance for the Air Force...

Comments  (1)

5106d48203954b74e6ea495e5c7f21b0

The Need for Improved Critical Infrastructure Protection

June 13, 2012 Added by:William Mcborrough

Tackling the problem of critical infrastructure protection will take concerted efforts from the public and private sectors. An appropriate governance structure is needed to avoid the inevitable over-reaction that will follow the inevitable catastrophic attack against our critical infrastructure...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attorney General Taps Federal Prosecutors for Stuxnet Leak

June 11, 2012 Added by:Headlines

With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Flame On: Cry Havoc and Let Loose the Dogs of Cyberfoolery

June 08, 2012 Added by:Infosec Island Admin

It is comical that there are calls in the Senate to investigate the “leaks and leakers” who talked to Sanger about their digital daring do Stuxnet. All you really need to do Mr. Senator is walk up to 1600 Pennsylvania Ave and knock on the oval office door. You can find the leaker there I can assure you...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Intel Executive Joins NIST Advisory Committee

June 08, 2012 Added by:Headlines

Under Secretary of Commerce for Standards and Technology and NIST Director Patrick Gallagher has selected William M. Holt, senior vice president and general manager of Intel Corporation's Technology and Manufacturing Group, to serve on the Visiting Committee on Advanced Technology (VCAT)...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »