cybersecurity

RSS
  • Obama's CIA nominee an advocate for federal cybersec regulations

    Posted January 7, 2013 - 5:56 pm

    John Brennan, nominated today by President Barack Obama to be the director of the CIA, has been a vocal advocate for federal cybersecurity legislation in recent months.
  • UK civilian beats 2,000 rivals in US military cyber-challenge

    Posted January 7, 2013 - 12:33 pm

    A 26 year-old British software developer has been ranked as the best civilian in the 2012 DC3 Digital Forensics Challenge, an unusually demanding round of the Cyber Security Challenge hosted by the US Department of Defense Cyber Crime Centre (DC3).
  • Dutch government aims to shape ethical hackers' disclosure practices

    Posted January 4, 2013 - 9:42 am

    The Dutch government's cyber security center has published guidelines that it hopes will encourage ethical hackers to disclose security vulnerabilities in a responsible way.
  • Security lessons from 2012

    Posted January 3, 2013 - 12:25 pm

    More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
  • Government tech policy highs and lows of 2012

    Posted December 26, 2012 - 8:28 am

    From cybersecurity to intellectual property battles, mobile broadband to privacy and federal IT, it was a noisy year for technology in the nation's capital. But after all the debates, committee reports and lobbying, what actually changed?
  • Construction company, bank, settle dispute over $345,000 cyber heist

    Posted November 27, 2012 - 5:21 pm

    A Maine construction company that sued its bank after losing $345,000 in an online banking heist settled its dispute after a protracted legal battle that raised questions about a bank's responsibility in protecting customer accounts against cyber fraud.
  • The cybersecurity needs of the borderless enterprise

    Posted November 27, 2012 - 4:55 pm

    As the traditional security perimeter dissolves in a virtualized environment, organizations need a new cybersecurity framework and architecture.
  • NSA: Looking for a few good cybersecurity professionals

    Posted November 14, 2012 - 12:00 pm

    At a time when cyberattacks on America's critical infrastructure have increased 17-fold (between 2009 and 2011), the need for highly trained cybersecurity professionals is acute. However, 83% of federal hiring managers in a recent survey said it was extremely difficult to find well-trained cybersecurity professionals and a projected shortfall of 20,000 to more than 40,000 people is expected in the years to come.
  • DHS official suggests sharing IT resources to survive hacks

    Posted November 5, 2012 - 12:19 pm

    Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested.
  • Hitting back at cyberattackers: Experts discuss pros and cons

    Posted November 1, 2012 - 11:58 am

    The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so?
  • DDoS attacks against banks raise question: Is this cyberwar?

    Posted October 25, 2012 - 11:50 am

    It's been a month of crippling denial-of-service attacks on websites operated by U.S. banks and financial services firms. A terrorist organization called Al-Qassam takes credit online, but now the attacks are being blamed on Iran.
  • Why the government's cybersecurity plan will end in catastrophe

    Posted October 21, 2012 - 7:57 am

    The Department of Defense wants access to private computer systems in the name of cybersecurity. In addition to being a privacy nightmare, CIO.com columnist Rob Enderle says a centralized information sharing system will actually make the United States more susceptible to cyber attacks and suggests an alternate approach to cybersecurity.
  • Cyberthieves loot $400,000 from city bank account

    Posted October 15, 2012 - 4:33 pm

    Burlington, Wash. officials have notified hundreds of employees and residents that their bank account information was compromised last week when hackers broke into city systems and stole more than $400,000 from a city account at Bank of America.
  • Future cyber attacks could rival 9-11, cripple US, warns Panetta

    Posted October 12, 2012 - 1:49 am

    The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. Secretary of Defense said Thursday evening.
  • Iran denies launching cyberattacks on U.S. banks

    Posted September 24, 2012 - 11:33 am

    Iran is being accused of launching cyberattacks against U.S.-based banks that include Bank of America, JPMorgan Chase and Citigroup, an accusation that was firmly rejected by the head of Iran's Civil Defense Organization.
  • U.S. banks on high alert against cyberattacks

    Posted September 24, 2012 - 11:26 am

    The Financial Services Information Sharing and Analysis Center has put U.S. banks on high alert against cyberattackers seeking to steal employee network login credentials to conduct extensive wire transfer fraud.
  • Cyber espionage campaign targets energy companies

    Posted September 24, 2012 - 10:44 am

    Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, Dell's SecureWorks Counter Threat Unit says.
  • German cybersecurity agency prods users to ditch IE

    Posted September 18, 2012 - 3:25 pm

    Germany's cybersecurity agency is urging users to drop Internet Explorer and switch to a rival, like Chrome or Firefox, until Microsoft patches a new critical bug in its browser.
  • Questions loom about Obama's cybersecurity plans

    Posted September 18, 2012 - 11:36 am

    With opposition growing to reported plans by President Obama to issue an Executive Order to bolster cybersecurity for the nation's critical infrastructure, the question now is whether the White House will plow ahead or drop the idea quietly in an election year.
  • Tech policy 2012: Comparing the Democrat's and Republican's platforms

    Posted September 12, 2012 - 3:29 pm

    In the presidential campaign, cybersecurity and Internet freedom won't get top billing as the candidates spar over their plans for creating jobs and cutting deficits, but the two major parties have included positions on several technology policy issues in the platforms ratified at their recent conventions.
  • Obama may start CISPA-style cybersecurity with Executive Order

    Posted September 11, 2012 - 1:06 am

    CISPA, blocked last April in the Senate for overruling privacy protections for citizens, may be put into place by Executive Order.
  • Spotlight on cybersecurity

    Posted September 10, 2012 - 1:10 pm

    Cybersecurity events make splashy news headlines, with damages from data breaches running in the millions of dollars and the spectre of attacks on government agencies and critical infrastructure looming large. Here's what you need to know about cybersecurity and cyber threats.
  • Does a cyber-9/11 loom?

    Posted September 5, 2012 - 8:39 am

    The longer Congress waits to gets its act together on cybersecurity, the longer the U.S. remains at risk of an attack by spies, terrorists, hackers or companies representing themselves or an entire rogue nation. Can Washington rise to the challenge without crushing civil liberties?
  • Playing politics with cybersecurity

    Posted September 3, 2012 - 9:40 pm

    For most people, hackers and malware are nefarious entities intent on compromising their PCs and mobile devices, and perhaps stealing some login credentials or financial details. A successful attack can be quite frustrating,--or even devastating--on a personal level, but nobody gets killed and the world goes on.
  • The Weekly Hash - August 31, 2012

    Posted August 31, 2012 - 11:54 am

    A review of some of the top tech stories for the past week, with tongue planted firmly somewhere near cheek.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness