Blog Posts Tagged with "Congress"

69dafe8b58066478aea48f3d0f384820

Congressman Confronts China over Cyber Espionage

October 05, 2011 Added by:Headlines

“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressmen Call for FTC Investigation on Supercookies

September 28, 2011 Added by:Headlines

“I am very disturbed by news that supercookies are being used to collect vast amounts of information about consumers’ online activities without their knowledge. Companies should not be behaving like supercookie monsters, gobbling up personal, sensitive information without users’ knowledge..."

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Blumenthal Bill Bumps Up Fines for Security Breaches

September 18, 2011 Added by:David Navetta

Richard Blumenthal (D-CT) introduced bill that would levy significant penalties for identify theft and other “violations of data privacy and security,” criminalize software that collects “sensitive personally identifiable information” without clear and conspicuous notice and consent...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Investigating Over 400 Corporate Account Takeovers

September 16, 2011 Added by:Headlines

"The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers... These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Judge Calls Geolocation Tracking Orwellian

August 25, 2011 Added by:Headlines

“While the government’s monitoring of our thoughts may be the archetypical Orwellian intrusion, the government’s surveillance of our movements over a considerable time period through new technologies... puts our country far closer to Oceania than our Constitution permits..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Operation Shady Rat: Or As I like To Call It...

August 15, 2011 Added by:Infosec Island Admin

It is readily apparent from this POS that McAfee has put out that they are just fishing for some press here for their flagging AV sales. This paper gives nothing relevant to the story around APT and as such, it should be just relegated to the dustbin of the internet and forgotten...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senate Questions NSA Lawyer on Geolocation Tracking

July 27, 2011 Added by:Headlines

At hearings conducted by the Senate, general counsel for the NSA Matthew Olsen was reluctant to specify whether the government can track the movements of U.S. citizens. “There are certain circumstances where that authority may exist. It is a very complicated question," Olsen said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Deliver Cyber War Policy Brief

July 22, 2011 Added by:Headlines

"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Plugging Breaches with Bureaucrats

July 21, 2011 Added by:Mike Meikle

Systems and software are designed by humans and there will be flaws that can be exploited. Plus, social engineering will always provide a path to compromising the most secure systems due to the fallibility of the human element. Legislation will not address these factors...

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

ISA Testimony Before House Cyber Security Task Force

July 20, 2011 Added by:Marjorie Morgan

Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Inquire About Gov Mobile Phone Tracking

July 15, 2011 Added by:Headlines

Senators Ron Wyden and Mark Udall have drafted a letter addressed to Director of National Intelligence James Clapper with a simple, straight forward question: “Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?”

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DHS: Imported Devices Infected with Malware

July 12, 2011 Added by:Headlines

Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EastWest Institute Advises Congress on Cybersecurity

July 07, 2011 Added by:Headlines

The first step to international agreements are bilateral and multilateral dialogues. Earlier this year, EWI-led U.S.-Russia talks on “rules of the road” for cyber conflict produced an attention-getting report, and a team of U.S. and Chinese experts published joint recommendations on reducing spam...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress to Use Skype Despite Security Concerns

June 29, 2011 Added by:Headlines

Members of Congress will now be allowed to use Skype video conferencing on government networks. The announcement comes on the heels of revelations that Microsoft had filed a application in 2009 seeking to patent technology that allows for surreptitious recording of Skype transmissions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Critics Rip White House Cybersecurity Proposal

June 28, 2011 Added by:Headlines

"Virtually everybody gets breached. If you're going to have these advanced persistent threat guys come after you, they're going to get into your system. If you're going to make that the line, and then you're subject to these name-and-shame penalties, I think that would be a mistake..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »