Items Tagged with "Headlines"


69dafe8b58066478aea48f3d0f384820

June is National Internet Safety Month

June 19, 2012 Added by:Headlines

"Considering how critical Internet access is to our daily lives, we want all Internet users to understand that they have a shared responsibility in protecting themselves online and that safer practices online help protect everyone"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Announces Executive Appointments in Cyber Division

June 19, 2012 Added by:Headlines

FBI Director Robert S. Mueller announced that Joseph M. Demarest will move to the Cyber Division as assistant director and that Cyber Division Section Chief James C. Burrell has been appointed deputy assistant director of the Cyber Division at FBI Headquarters...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Internet Explorer Zero-Day Exploit in the Wild

June 18, 2012 Added by:Headlines

"While the exploit used in this attack has been referred to as being a zero-day due to reports of it being seen in the wild before the recent Security Bulletin Summary, zero-days are not commonly observed in attacks... this begs the question: will we see more zero-days being used in similar attacks?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bulletin of the Atomic Scientists Warns of Cyber Arms Race

June 18, 2012 Added by:Headlines

"With confirmation that the United States was behind the 2010 cyberattack on Iran's nuclear enrichment facility, the world has officially entered a new era of warfare... The parallels with the invention and first use of atomic bombs on Hiroshima and Nagasaki are eerie," writes Benedict...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft May Be Infiltrated by Government Cyber Operatives

June 18, 2012 Added by:Headlines

“If there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off... This makes you think that this breach of Microsoft's update system was done by someone like the NSA..." said F-Secure's Mikko Hypponen...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA's National Centers of Academic Excellence Announced

June 15, 2012 Added by:Headlines

Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Panetta: Urgency Needed to Defend Against Cyber Attacks

June 15, 2012 Added by:Headlines

“I'm very concerned at the potential in cyber to be able to cripple our power grid, to be able to cripple our government systems, to be able to cripple our financial systems. It would virtually paralyze this country. And as far as I'm concerned, that represents the potential for another Pearl Harbor… using cyber"...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Cloud Insecurity? NSA Chief Keith Alexander Thinks Not

June 14, 2012 Added by:Headlines

“If you’re moving information into the cloud, it just seems to me that all kinds of nasty activity could go on in there. I would take a Missouri approach and say, ‘prove it to me, show it to me,’ how it’s more secure,” said former director of intelligence, surveillance and reconnaissance for the Air Force...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Tripwire Examines the State of Risk-Based Security Management

June 14, 2012 Added by:Headlines

"Though organizations profess a commitment to RBSM... this security practice is still in its infancy. To establish an effective... program, certain barriers need to be addressed. These include securing adequate resources, having employees with the necessary expertise and designating strong leaders..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Hacker Indicted for Conspiracy to Conduct Cyber Attacks

June 14, 2012 Added by:Headlines

The indictment alleges that Ryan Cleary controlled a large botnet of potentially hundreds of thousands of units to conduct DDoS attacks and would rent out his botnet for certain time periods in exchange for money from individuals interested in conducting DDoS attacks targeting specific victims...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA: Cybersecurity Exercises Enhance Cooperation

June 14, 2012 Added by:Headlines

The European Network and Information Security Agency (ENISA) organized two small-scale cyber security exercises on 30th May and 6th June. The exercises were held to familiarize participants with cross-border cooperation procedures and mechanisms for dealing with large-scale cyber crises in Europe...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The FBI's Most Wanted Cyber Criminals

June 13, 2012 Added by:Headlines

While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Global Payments Breach May Include Merchant Account Data

June 13, 2012 Added by:Headlines

"The Company's ongoing investigation recently revealed potential unauthorized access to servers containing personal information collected from a subset of merchant applicants. It is unclear whether the intruders looked at or took any personal information... however, the Company will notify potentially-affected individuals..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO Sponsored CyCon Tackles Cyber Security Issues

June 13, 2012 Added by:Headlines

Attribution is hard because of the nature of attacks, which tend to have several stages and the whole attack is spread over a long period of time. It is of no help either that the Internet is governed by multiple jurisdictions so international cooperation is necessary but often lacking...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Fingers US Hackers in Oil Ministry Attacks

June 12, 2012 Added by:Headlines

"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »