Blog Posts Tagged with "NSA"

69dafe8b58066478aea48f3d0f384820

Experts Tell Senate that Critical Networks are Compromised

March 22, 2012 Added by:Headlines

"I think we've got the wrong mental model here. We've got to go to a model where we assume our adversary is in our networks, on our machines, and we've got to operate anyway, we've got to protect the data anyway," said Sandia National Laboratory's James Peery....

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous, Occupy, Cyber Terrorism, and Jingoistic Rhetoric

February 23, 2012 Added by:Infosec Island Admin

To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Don't Be Naïve about Anonymous or the Occupy Movement

February 22, 2012 Added by:Robin Jackson

If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Anonymous, NSA, Power Grids and False Flags

February 22, 2012 Added by:Infosec Island Admin

Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NSA Wary of Potential Hacktivist Threat to Power Grid

February 21, 2012 Added by:Headlines

"Grid officials said their systems face regular attacks, and they devote tremendous resources to repelling invaders, whether from Anonymous or some other source. The industry is engaged and stepping up widely to respond to emerging cyber threats..."

Comments  (5)

69dafe8b58066478aea48f3d0f384820

NSA Launches CryptoChallenge Mobile Application

December 22, 2011 Added by:Headlines

The game is the latest digital communications effort designed to educate young adults on career opportunities with NSA and recruit the best and brightest to support NSA's cybersecurity initiatives...

Comments  (0)

296634767383f056e82787fcb3b94864

Security 2012: Blood in the Water

November 30, 2011 Added by:Jeffrey Carr

CEOs refuse to act to protect their companies if it cuts into profit, the government has refused to protect our nation’s critical infrastructure because it's 90% privately owned, and our laws have enabled this massive malfeasance so that everyone responsible can claim absence of malice...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Building a Backdoor

October 29, 2011 Added by:Joel Harding

A friend in another country wrote and asked me if the reason the United States suspected foreign equipment of containing a means of gaining surreptitious access to telecommunication, information or networked systems, commonly called a backdoor, was because the US routinely does it...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Are You Cyber Savvy?

October 25, 2011 Added by:Joel Harding

What really set him apart was Social Engineering combined with his hacking. He did his research, he would study, he would probe, and then he would do whatever it took to get a password, to get a free account, to get root access, to get into a facility and physically touch the system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Conference Focused on Trusted Computing

October 10, 2011 Added by:Headlines

"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Premier Intelligence Group's Website Hacked

September 19, 2011 Added by:Headlines

Stolen data was published on the website Cryptome, known for its affiliation with the hacktivist collective Anonymous. The leaked data reveals potentially sensitive information about senior intelligence officials from the NSA, CIA, the FBI, and numerous intelligence contractors...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

EFF Challenges NSA's Domestic Surveillance in Court

September 01, 2011 Added by:Headlines

At stake is whether the courts can judge the legality and constitutionality of the NSA's bulk interception of Americans' phone calls and emails, accomplished through back-door access to AT&T's domestic telecom network and its databases of communications records...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Comments on National Initiative for Cybersecurity

August 16, 2011 Added by:Headlines

The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Senate Questions NSA Lawyer on Geolocation Tracking

July 27, 2011 Added by:Headlines

At hearings conducted by the Senate, general counsel for the NSA Matthew Olsen was reluctant to specify whether the government can track the movements of U.S. citizens. “There are certain circumstances where that authority may exist. It is a very complicated question," Olsen said...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »