bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
3:31 am, April 20, 2014

Search Result

Search Tags:  cybersecurity report

IT Managers Expect More Network-born Threats

A new study that finds 80-percent of I-T managers expect network-born threats to increase over the next year. Perhaps even more troubling, more than half of managers told netForensics their organization was not budgeting enough, or recruiting enough new talent, to counter any added cyber-threats. Almost 25-percent of respondents said they saw a decrease in staff size in the last year.

More than half of the managers polled did however say their organization was more secure now than it was a year ago.

Tags: technology , Cybersecurity Report , cybersecurity , IT , Scott Carr

Friday - 07/09/2010, 10:43am EDT

Cybersecurity Framework Created for Governments Worldwide

A software trade association has produced a first-of-its-kind cybersecurity framework to help guide governments' security efforts worldwide. Officials with the Business Software Alliance say it's needed to help countries put together policies that will thwart the many kinds kinds of cybersecurity threats that exist.

Working with the private sector and prosecuting cyber-criminals are key parts of the framework.

Tags: technology , Cybersecurity Report , cybersecurity , Business Software Alliance , business , Scott Carr

Friday - 07/09/2010, 10:43am EDT

Wikileaks Chief Sends Pleas for Help

The editor-in-chief of the controversial web site Wikileaks' is sending out pleas for financial and legal help. Julian Assange is looking for some support in the formation of local "Friends of WikiLeaks" chapters to help build out the site's mission to (ostensibly) protect whistleblowers, journalists and activists. With pressure on the site coming from several directions - possibly including the Pentagon - regarding its publication of potentially sensitive information - Assange has sent out emails with the header "WikiLeaks may be under attack."

Tags: technology , Cybersecurity Report , cybersecurity , Pentagon , Scott Carr

Thursday - 06/17/2010, 06:30pm EDT

U.S. Seeks Allies in Fighting Cyber Crime

Deputy Secretary of Defense William Lynn traveled to Ottawa recently to try and drum up support for a new international organization to combat cyber warfare. He told the Canadian audience the U.S. can't defend its networks alone, and pointed to increasing threats from hackers and computer viruses. The visit marked the kick-off a U.S.-led initiative to create such an international organization. Discussions have begun with several countries.

Tags: technology , Cybersecurity Report , cybersecurity , Deputy Secretary of Defense , William Lynn , Scott Carr

Thursday - 06/17/2010, 06:20pm EDT

AT&T Approved Under Networxx

The General Services Administration and Homeland Security Department have approved the first government-wide provider of cybersecurity services under the Networx telecommunications contract. AT&T has received authority to operate its Managed Trusted IP Services (or MTIPS) program, a move that took almost a year to approve. Qwest, Sprint and Verizon also received awards to be MTIPS providers, but have not received the authority to operate on a governmentwide basis.

Tags: technology , Cybersecurity Report , GSA , DHS , Networx , Telecommunication , AT&T , Managed Trusted IP Services , Qwest , Sprint , Verizon , Scott Carr

Tuesday - 06/15/2010, 07:23pm EDT

Conficker Worm is Alive and Well

The Department of Homeland Security is putting together a report on the global response to Conficker Worm attacks, while analysts warn, the Worm is still alive and well, though probably well hidden. Atlantic Monthly columnist Mark Bowden says, botnets like the Conficker Worm are evidence that worms and viruses are now being developed by those who have intricate knowledge of cryptography, a prospect that makes defending against attacks increasingly difficult.

Tags: technology , Cybersecurity Report , DHS , Conficker Worm , Mark Bowden , Scott Carr

Tuesday - 06/15/2010, 07:21pm EDT

What Will CYBERCOM'S Mission Be?

The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.

Tags: technology , Cybersecurity Report , cybersecurity , U.S.Cyber Command , CYBERCOM , Pentagon , DoD , Scott Carr

Monday - 06/07/2010, 09:00pm EDT

Don't Let Tab-Nappers Catch You Napping

Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.

Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.

Tags: technology , Cybersecurity Report , cybersecurity , Scott Carr

Monday - 05/31/2010, 07:55pm EDT

Scientist Infected with Computer Virus

A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.

Tags: technology , Cybersecurity Report , cybersecurity , Mark Gasson , University of Reading , Scott Carr

Monday - 05/31/2010, 07:52pm EDT

Zeus Botnet Is Knocked Offline

It could be a small win in the fight against malicious botnets. An Internet service provider known for hosting command and control channels for the Zeus botnet has been knocked offline. Media reports say the company was based in Russia. The take-down happened when the firm's upstream service provider shut down it's connection. It's unclear, however, what effect the move might have as, often, hackers who run botnets will move to other service providers.

Tags: technology , Cybersecurity Report , cybersecurity , Zeus , Scott Carr

Tuesday - 05/25/2010, 07:41pm EDT
  •  
  • 3
  •