-
Report: U.S. companies should consider counter-hacking Chinese hackers
A group studying how the United States should respond to the sustained campaign of cyberattacks conducted by Chinese government hackers against U.S. companies, said the United States should seriously consider a campaign of retaliatory cyberattacks against the hackers.
-
-
Criminals may use new channels to trigger mobile malware
Researchers have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.
-
-
House panel approves CISPA, angering privacy advocates
The U.S. House Intelligence Committee passed a cybersecurity measure by an overwhelming vote, a measure which privacy advocates dislike because, they argue, it does not protect the personal information of citizens.
-
-
DHS, international tech-crime investigative body, partners on cybersecurity
The High Technology Crime Investigation Association (HTCIA) said it would team up with DHS Stop. Think. Connect. Campaign’s National Network. The partnership will promote awareness of cyber security to industry, university, and government organizations nationwide.
-
-
Sponsors of CISPA to address nagging privacy concerns about the bill
House Intelligence Committee chairman Mike Rogers (R-Michigan) and Ranking Member Dutch Ruppersberger (D-Maryland), sponsors of the Cyber Information Sharing and Protection Act (CISPA), say they are currently working on the draft to alleviate privacy concerns civil liberty advocates may have about the bill.
-
-
Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment
Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals
-
-
Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment
Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals
-
-
South Carolina exploring different cybersecurity plans
Last month state officials in South Carolina discovered a massive breach at the Department of Revenue; the attack exposed 3.6 million social security numbers of residents in the state, 387,000 credit and debit card numbers, and information for 657,000 businesses as well as other personal information; now, officials are trying to figure out what security measures they need to take in order to prevent another attack
-
-
ICE, federal agencies train computer forensic investigators
For the past fourteen years, U.S. Immigration and Customs Enforcement (ICE) has been responsible for training ICE officers and special agents to become computer forensic investigators; ICE teaches the class in conjunction with the U.S. Secret Service and the Internal Revenue Service
-
-
Wynyard Group takes New Zealand Police forensics solution global
Developed in 2007, New Zealand Police technology called EVE (Environment for Virtualized Evidence) allows enforcement officers rapidly to analyze seized electronic goods such as mobile phones, PCs, and other storage devices for evidence and intelligence
-
-
FTC charges businesses exposed sensitive information on P2P file-sharing networks
The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems
-
-
June is National Internet Safety Month
Private organizations and government agencies collaborate in promoting June as National Internet Safety Month; the sponsors encourage all Internet users to follow three simple steps when connecting to the Web: STOP – THINK – CONNECT; the National Cyber Security Alliance also encourages Internet users to take a few moments to teach a young person about better online safety so that they use good judgment and behavior all-year long
-
-
SAIC Launches Inaugural Utah Cyber Defense Challenge and Symposium 2012
SAIC will lead a Utah statewide cyber competition and symposium designed to raise cyber awareness across government, academia, and industry; the Utah Cyber Defense Challenge and Symposium (UCDC) 2012, to be held 1 June
-
-
Texas fights identity theft
Everything is bigger in Texas, including the number of instances of identity manipulation; according to an April report from ID Analytics, the cities of Beaumont and El Paso lead the nation in per-capita identity manipulation attempts
-
-
Companies hiring hackers to harden defenses
To burglar-proof your home, it is best hire a burglar as a consultant, as he is more likely to find the security vulnerabilities and demonstrate how they can be exploited; following this approach, companies large and small are now hiring hackers to test the companies’ security system vulnerabilities and find ways to harden these systems to withstand intrusion
-
More headlines
Who's online
There are currently 0 users and 0 guests online.
The long view
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.