Blog Posts Tagged with "Government"
December 19, 2010 Added by:Headlines
Richard Stiennon's latest publication, Surviving Cyberwar, presents a decisive case study and evidence that the specter of cyberwarfare is not merely theory, but is in fact actively being employed as a strategy...
December 17, 2010 Added by:Thomas Fox
At the FCPA hearings on November 30 before the US Senate Judiciary Committee, Subcommittee on Crime and Drugs, Michael Volkov (an Infosec Island contributor) presented an interesting idea which he believes will maximize incentives for companies to comply with the FCPA...
December 16, 2010 Added by:Headlines
The notion that UK government websites may be targeted surround the arrest of WikiLeaks founder Julian Assange, who is currently free on bail, but may ultimately be extradited to Sweden to face charges not directly related to the group's disclosure of classified U.S. documents...
December 15, 2010 Added by:Kevin L. Jackson
The shift to “light technologies,” that is, cloud services, which can be deployed rapidly, and shared solutions will result in substantial cost savings, allowing agencies to optimize spending, and allowing agencies to reinvest in their most critical mission needs...
December 12, 2010 Added by:Headlines
Senator Tom Carpenter has proposed legislation in reaction to the denial of service attacks that have been targeting websites in the wake of the WikiLeaks disclosures. The bill will seek to centralize command and control operations within the White House, and further public and private cooperation...
December 06, 2010 Added by:Headlines
A diplomatic memo from June of 2009 reveals that the Chinese security firm TOPSEC had access to the source code for Microsoft Windows and allowed the Chinese government to provided it to hackers in order to develop targeted attacks to exploit weaknesses in the operating system...
November 30, 2010 Added by:Robert Siciliano
Every city, state, and town has its own set of regulations determining the collection and management of public records, including birth, death, marriage, court, property, and business filings. Many of these documents include Social Security numbers. And many are posted on the Internet...
November 30, 2010 Added by:Anthony M. Freed
The WikiLeaks Twitter account displays the messages, "We are currently under another DDoS attack," and "DDoS attack now exceeding 10 Gigabits a second," which dwarfs the 2-4 Gbps attack perpetrated by self-proclaimed "patriot hacker" known only as The Jester (th3j35t3r)...
November 29, 2010 Added by:Anthony M. Freed
Infamous hacker The Jester is claiming responsibility for a DoS attack that disabled WikiLeaks hours before the release of thousands of documents. The WikiLeaks Twitter account said, "We are currently under a mass distributed denial of service attack," for several hours on Sunday...
November 28, 2010 Added by:Headlines
WikiLeaks, the secret-sharing website that has been plaguing the U.S. government with the release of thousands of classified documents, allegedly suffered a denial of service (DoS) attack that took it offline just hours before the scheduled release of more embarrassing records...
November 23, 2010 Added by:Headlines
An administrator at VisionTech plead guilty to charges she assisted in selling sub-grade Chinese computer processors to DoD contractors for use in U.S. military weapons systems. Companies that bought the components include Northrop Grumman, Raytheon Missile Systems, and BAE Systems...
November 20, 2010 Added by:Headlines
Even if there were a systemic change in the way of we prepare kids for technology careers, the US would still be a generation behind nations in Asia and Europe. The result could be the loss of our competitive edge in the marketplace, and result in the loss of our status a cyber superpower...
November 19, 2010 Added by:Headlines
Privacy advocate Christopher Soghoian did some snooping of his own through the Freedom of Information Act and found that Google charged the DEA $25 per case for access to user data. Yahoo, in an ongoing to effort to best Google at something, charged the agency $29 per case...
November 17, 2010 Added by:Headlines
Creating systems to easily and quickly un-encrypt data could produce a threat to sensitive information that would otherwise remain secure. The widely publicized Aurora attacks originating in China used back-doors that were originally created to give the government easy access to communications..
November 17, 2010 Added by:Headlines
Regardless of the outcome of the proposed legislation, in the case of a national emergency, Internet access will be marginal at best, and business continuity plans that rely heavily on the notion that employees will be able to login to corporate networks from home are severely flawed...
November 16, 2010 Added by:Headlines
The U.S.-China Economic and Security Review Commission will release a report which is expected to detail the recent hijacking of 15% of worldwide internet traffic through Chinese telecom networks which contained data packets from the United States military, Executive Branch, and NASA...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013