bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:55 am, April 16, 2014

Search Result

Search Tags:  cyber security

Mobile Phones threatened

The chief scientist with Berlin's Security Research Labs, revealed recently that he led a research team at the German firm that figured out a way to remotely gain control of and also clone some mobile SIM cards. Karsten Nohl, a well-known security expert said mobile carriers have quickly protected customers from that security bug that he revealed 10 days ago and that he estimated had put more than 500 million phones at risk of cyber-attacks.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:11pm EDT

Secret Service solicits tweets

On August 6, 2013 - 10:24 AM, a critical day a what was called the biggest Al Qaida threat since 9/11 was unfolding, the US Secret Service tweeted "Contact your nearest field office with time-sensitive or critical info or to report a tweet." While some question the solicitation, there is merit, as the very next day Wikileaks posted a tweet warning former NSA Director Mike Hayden that if NSA leaker Edward Snowden is extradited Cyber terrorist would destroy Hayden.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:10pm EDT

Google Glass vulnerable

Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without the user's knowledge, when the user merely took a photo that captured a malicious QR code. Lookout was able to force Google Glass to silently connect to a Wi-Fi access point, which let the researchers view all of the data flowing to and from the device. When combined with an Android 4.0.4 web vulnerability, the hack apparently gave researchers full control of the Glass headset.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:09pm EDT

Jurors held in contempt

Two London men have each been sentenced to two months in jail following contempt of court convictions for misusing the Internet while serving on a jury. One of them posted a Facebook message while the other used Google to search for extra information about the victims of a fraud case and later shared the information with other jurors. A 2010 UK survey by the Guardian found that about 12 percent of jurors involved in high-profile cases had supplemented courtroom evidence with Web searches.

Tags: UMUC , cybersecurity , The Cyber Security Report , J.J. Green

Monday - 08/05/2013, 10:58am EDT

U.S. Cyber Industry takes lead

Both the White House and Congress have asserted that protecting the nation's resources from cyber-attacks is a top priority. Techworld is reporting enacting legislation designed to enhance security for critical infrastructure components such as water, power, telecom and transport facilities that is acceptable to both political parties has been a struggle. The problem political differences. But Cyber industry leaders have started to work on a voluntary standards and best practices platform to provide some level of security.

Tags: UMUC , The Cyber Security Report , J.J. Green , cybersecurity

Monday - 08/05/2013, 10:55am EDT

Wall Street Conducts cyber drill

Cyber-attacks on banks are growing more frequent. Wall Street has just conducted a cyber-defense exercise called "Quantum Dawn 2,". During the drill, bank employees were stationed at their normal offices, and were emailed throughout the day with bits of information that could indicate an encroaching hacker attack. They monitored a simulated stock exchange for irregular trading and were pressed to figure out what was going on and how to react while sharing information with regulators and each other.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:23pm EDT

Center watches cyber threats

Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:20pm EDT

The Cybersecurity Imperative

All agencies are fighting cyber-attacks. The FBI Director of Cyber Security believes there are two groups of organizations: those whose systems have been attacked and those who do not know they have been attacked. In the federal space, the velocity and variety of attacks has dramatically increased. With Advanced Persistent Threats (APT), the time it can take to comprise a system ranges from hours to days, yet the time it takes for its discovery averages 6 months. The cyber security solution has shifted from the perimeter (firewall) or how to stop the attacks to how to deal with the attacks after they occur. The emphasis is now on the controls and minimizing what the attacker is doing once he gets in. The cost of the attacks is down time and data loss. With a 200% to 300% increase in attacks on agency's systems, it is imperative the federal government implements a holistic solution including hardware, software, training and compliance.

Tags: NetApp , WWT , The Cybersecurity Imperative , Ari Baranoff , Lee Vorthman , Aamir Lakhani , Leo Scanlon

Tuesday - 07/16/2013, 11:21am EDT
Listen

Cyber warriors are targets

Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:19pm EDT
  •  
  • 6
  •