7:10 am, November 27, 2014

Cybersecurity News

DHS working on Cyber Security Framework

To promote cyber security practices and develop these core capabilities, DHS says it is working with critical infrastructure owners and operators to create a Cyber security Framework - a set of core practices to develop capabilities to manage cyber security risk. These are the known practices that many firms already do, in part or across the enterprise and across a wide range of sectors. The draft Framework will be complete in October.

Tuesday - 08/13/2013, 12:24pm EDT

Fort Disco attacks passwords

How strong is your password? Cyber criminals are running a wide-ranging password-guessing attack against some of the most popular blogging and content management systems on the net. The Fort Disco cracking campaign began in late May this year and is still going on. The UK based Register reports Four strains of Windows malware are associated with the campaign, each of which caused infected machines to phone home to a hard-coded command and control domain

Tuesday - 08/13/2013, 12:23pm EDT

Botnets attack blogging tools

Techweek has been reporting that two large botnets have targeted various content management systems, including WordPress and Joomla. The most recent attacks were labeled as Fort Disco, which began in late May 2013, according to Arbor Networks. Arbor has found six command and control servers, running over 25,000 infected Windows machines that were used to attack CMS systems using brute force or basically running through large lists of possible passwords.

Tuesday - 08/13/2013, 12:21pm EDT

Recognizing camouflaged websites

Web page addresses can be disguised or take you to an unexpected site. Many web browsers are configured to provide increased functionality at the cost of decreased security. New security vulnerabilities may have been discovered since the software was configured and packaged by the manufacturer. Computer systems and software packages may be bundled with additional software, which increases the number of vulnerabilities that may be attacked.

Tuesday - 08/13/2013, 12:17pm EDT

Cyber criminals target browsers

The U.S. government says there is an increasing threat from software attacks that take advantage of vulnerable web browsers. USCERT says we have observed a trend whereby new software vulnerabilities are exploited and directed at web browsers through use of compromised or malicious websites. This problem is made worse by a number of factors, including the fact that many users have a tendency to click on links without considering the risks of their actions.

Tuesday - 08/13/2013, 12:15pm EDT

Web browsers vulnerable

Your web browser. No matter which one you use, it's vulnerable. The U.S. Computer Emergency Readiness Team (USCERT) says it is vital to configure them securely. USCERT says often the operating system is not set up in a secure default configuration. Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer.

Tuesday - 08/13/2013, 12:14pm EDT

Foreign competitors taking advantage of NSA's leaks

Not only are Americans suspicious of NSA, but according to Washington bureau, Foreign competitors are looking to aggressively grow their market share in cloud computing because of concerns raised by the National Security Agency's PRISM program. reports U.S. cloud computing companies could lose $22 billion to $35 billion in revenue over the next three years because of foreign customers' concerns about the privacy of their data.

Tuesday - 08/13/2013, 12:13pm EDT

NSA and hackers relationship suffers

The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private researchers express disillusionment with the National Security Agency. Experts say much of the goodwill that existed has been erased after the NSA's classified programs to monitor phone records and Internet activity were exposed by former NSA contractor Edward Snowden.

Tuesday - 08/13/2013, 12:12pm EDT

Mobile Phones threatened

The chief scientist with Berlin's Security Research Labs, revealed recently that he led a research team at the German firm that figured out a way to remotely gain control of and also clone some mobile SIM cards. Karsten Nohl, a well-known security expert said mobile carriers have quickly protected customers from that security bug that he revealed 10 days ago and that he estimated had put more than 500 million phones at risk of cyber-attacks.

Tuesday - 08/13/2013, 12:11pm EDT

Secret Service solicits tweets

On August 6, 2013 - 10:24 AM, a critical day a what was called the biggest Al Qaida threat since 9/11 was unfolding, the US Secret Service tweeted "Contact your nearest field office with time-sensitive or critical info or to report a tweet." While some question the solicitation, there is merit, as the very next day Wikileaks posted a tweet warning former NSA Director Mike Hayden that if NSA leaker Edward Snowden is extradited Cyber terrorist would destroy Hayden.

Tuesday - 08/13/2013, 12:10pm EDT

Google Glass vulnerable

Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without the user's knowledge, when the user merely took a photo that captured a malicious QR code. Lookout was able to force Google Glass to silently connect to a Wi-Fi access point, which let the researchers view all of the data flowing to and from the device. When combined with an Android 4.0.4 web vulnerability, the hack apparently gave researchers full control of the Glass headset.

Tuesday - 08/13/2013, 12:09pm EDT

DHS to standardize cyber protections through new contract

DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.

Tuesday - 08/13/2013, 11:51am EDT

Thrift Investment Board picks SAIC to run IT services

The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.

Monday - 08/12/2013, 05:33am EDT

DHS building actionable response plans for cyber attacks on critical infrastructure

Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.

Thursday - 08/08/2013, 05:41am EDT

Serious doubts remain about VA's ability to secure veterans' data

A recent briefing between the House Veterans Affairs Committee, VA IT executives and DHS ended with the lead majority staff member walking out before the meeting ended. The rising tensions between the House Veterans Affairs committee's majority and VA come as a report surfaced showing veterans are at a higher risk of identity theft than the average citizen.

Wednesday - 08/07/2013, 08:32pm EDT

CIO Council reorganizes, seeks more active role

The council is restructuring to match the Obama administration's technology priorities for innovation, governance and cybersecurity. It will now operate with three main committees instead of five.

Wednesday - 08/07/2013, 07:07am EDT

White House details initial ideas for industry cyber incentives

The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.

Wednesday - 08/07/2013, 06:28am EDT

Jurors held in contempt

Two London men have each been sentenced to two months in jail following contempt of court convictions for misusing the Internet while serving on a jury. One of them posted a Facebook message while the other used Google to search for extra information about the victims of a fraud case and later shared the information with other jurors. A 2010 UK survey by the Guardian found that about 12 percent of jurors involved in high-profile cases had supplemented courtroom evidence with Web searches.

Monday - 08/05/2013, 10:58am EDT

U.S. Cyber Industry takes lead

Both the White House and Congress have asserted that protecting the nation's resources from cyber-attacks is a top priority. Techworld is reporting enacting legislation designed to enhance security for critical infrastructure components such as water, power, telecom and transport facilities that is acceptable to both political parties has been a struggle. The problem political differences. But Cyber industry leaders have started to work on a voluntary standards and best practices platform to provide some level of security.

Monday - 08/05/2013, 10:55am EDT

Booming cyber business starting to resemble 'Wild West?'

Howard Schmidt, the former cybersecurity coordinator for the Obama administration, joined In Depth with Francis Rose to discuss the growing market in zero-day detection

Thursday - 08/01/2013, 02:00pm EDT
  • 18