Blog Posts Tagged with "NSA"

69dafe8b58066478aea48f3d0f384820

Can the NSA Defend America Against Cyber Attacks?

July 21, 2011 Added by:Headlines

“In an era when our nation and its allies are increasingly dependent on the integrity of information and systems supported, transmitted, or stored in cyberspace, it is essential that that space is as resilient and secure as possible," said NSA Deputy Director John C. Inglis...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Connexion Hack Team Dumps Military and Gov Accounts

July 08, 2011 Added by:Headlines

A new ad-hoc group of hacktivists calling itself "Connexion Hack Team" has published a list of email addresses associated with the US government including account information from the military, the Department of Homeland Security, the National Security Agency, and several state agencies...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

LulzSec, Jester, and Counter-Intelligence on the Internet

June 20, 2011 Added by:Infosec Island Admin

In the case of LulzSec and Anonymous, they are using many types of systems to protect their anonymity. With the right tools and obfuscation techniques, they feel impervious to attacks, be it from law enforcement or the likes of The Jester. Tactically, they have the advantage in many ways...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

China Denies Orchestrating Gmail Hijacking Campaign

June 02, 2011 Added by:Headlines

"We are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders... These allegations are very serious... We're looking into them," said Secretary of State Hillary Clinton...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Enemy of the State

May 31, 2011 Added by:Infosec Island Admin

You have the right to privacy in your papers and your domicile, but does this actually apply to digital papers, computers, hard drives, and anything you pass over telco lines to the cloud? Or is it considered public domain like your trash being placed at the end of your driveway?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Joins Nasdaq Breach Investigation

March 30, 2011 Added by:Headlines

“By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack or it’s an extraordinarily capable criminal organization,” said the former head of U.S. counterintelligence Joel Brenner...

Comments  (0)

959779642e6e758563e80b5d83150a9f

What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Scientists Decry Cyberwar as Governments Respond

January 20, 2011 Added by:Dan Dieterle

It seems that the nation is still split on deciding if Cyberwar is a real danger. Though computer scientists may not agree with them, government officials from the UK, Australia and the US are very concerned about cyberwar, and the threat to the public sector and are taking it very seriously...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Building Billion Dollar Cyber Security Facility

January 10, 2011 Added by:Headlines

There is a clear mandate for a public-private partnership - led on the government side by DHS - but supported by all elements of the U.S. government, to include federal, state and local organizations represented here today...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

America's “There is No Security Anymore” Policy

December 28, 2010 Added by:Dan Dieterle

This is a change in policy from trying to keep people out, to monitoring and limiting the damage done when they do get in. And get in they have, numerous reports of large corporations, government, and military breaches have made headline news over the years...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »