Blog Posts Tagged with "DHS"

69dafe8b58066478aea48f3d0f384820

Public/Private Collaboration to Fight Botnet Plague

October 11, 2011 Added by:Headlines

Botnets have increasingly put computer owners at risk. Researchers estimate that about 4 million new botnet infections occur each month. When a computer is infected by a botnet, personal information and communications can be monitored and Internet access can be exploited...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Proposes ISP's Notify Victims of Botnets

October 04, 2011 Added by:Headlines

"While security risks on the Internet exist in many areas, one current widely exploited threat comes from `botnets.' Through this Request for Information and any follow-on work, the two Departments aim to reduce the harm that botnets inflict on the nation's computing environment..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: National Cyber Security Awareness Month

October 03, 2011 Added by:Headlines

The most serious economic and national security challenges we face are cyber threats. America's economic prosperity and competitiveness in the 21st Century depends on effective cybersecurity. Every Internet user has a role to play in securing cyberspace...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Releases Cyber Security Evaluation Tool (CSET)

September 27, 2011 Added by:Headlines

The Department of Homeland Security's National Cyber Security Division (NCSD) has released a Software tool set to better enable organizations to examine risks to industrial control systems (ICS) and implement more secure protocols for protecting the nation's critical infrastructure...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

It’s War! It’s a Cyberwar!

September 24, 2011 Added by:Joel Harding

Mitsubishi Heavy Industries in Japan is under attack. Why is this not a cyberwar? Besides the obvious legal definitions where this doesn’t even remotely resemble a war - no declaration of war nor is there an ‘act of war’ as in the US Code - and there is certainly no death and destruction...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Original Stuxnet Researcher Issues Dire Warnings

September 23, 2011 Added by:Headlines

"After Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems... That wakeup call lasted about a week. Thereafter, everybody fell back into coma..."

Comments  (2)

F29746c6cb299c1755e4087e6126a816

How to Avoid the 9/11 Scams

September 10, 2011 Added by:Kelly Colgan

Osama bin Laden’s death wasn’t a day old before hackers moved in, flooding social network sites with spam—links that promised images of the al-Qaeda leader but that led to corrupted Flash plug-ins. Today's 10th anniversary of the 9/11 attacks will be no different...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Issues Security Bulletin on Anonymous Hackers

September 06, 2011 Added by:Headlines

"These attacks have the potential to result in serious harm, particularly to Law Enforcement... Also, this assessment does not take into account the possibility of a higher-level actor providing Anonymous, LulzSec or a similar group with more advanced capabilities..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Natural Disasters Fostering Social Engineering

August 25, 2011 Added by:Headlines

The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Hurricane Irene Critical Infrastructure Conference Call

August 25, 2011 Added by:Headlines

Friday, August 26, 2011 from 12:00 p.m. – 1:00 p.m. EDT: The purpose of the call is to update partners on DHS IP Hurricane Irene planning and preparation activities, procedures, and capabilities should the hurricane make landfall and significantly impact critical infrastructure operations...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Comments on National Initiative for Cybersecurity

August 16, 2011 Added by:Headlines

The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DHS Announces Partnership To Protect Kids Online

July 29, 2011 Added by:Headlines

"Now, more than ever, it is important that all Americans — adults and children alike — learn to protect themselves online and do their part to ensure that cyberspace is a safe and secure environment for all Internet users..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Politics Trumps Security in Dubious White House Hire

July 19, 2011 Added by:Headlines

Callahan was the ex-Clinton staffer who famously lost thousands of White House e-mails which were under subpoena, and was also dismissed by the Department of Homeland Security after a Congressional investigation determined she lied about her education and experience credentials...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

DHS: Imported Devices Infected with Malware

July 12, 2011 Added by:Headlines

Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked