Cybersecurity
Any Word on Zeus?
Earlier this year, the <a href="http://krebsonsecurity.com/2010/02/zeus-attack-spoofs-nsa-targets-gov-and-mil/">Zeus</a> banking Trojan infected hundreds of computers within the federal government leaving experts no choice but to prepare for a mass attack. The then e-mail campaign was designed to steal passwords, but at the time was only sent to government and military e-mail addresses.
Cybersecurity
More on Cyberwar
The debate about what constitutes a cyberwar still rages on. The latest installment comes from a conference put on by cybersecurity vendor ArcSight in National Harbor, Md., where Eneken Tikk, head of the legal and policy branch of the Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, discussed the 2007 attacks on that country's networks.
Cybersecurity
Canada to U.S.: Step Up
Canada's privacy commissioner took a swipe at her U.S. counterparts on Monday.
Cybersecurity
CIOs are ahead of the curve on improving accountability
Some technology executives already were on the path to enhanced scrutiny of risky projects, before President Obama sent a reminder.
Cybersecurity
TechAmerica: Just Do It
In hopes that Congress will get something of note accomplished before year's end, IT industry association TechAmerica released a statement on Friday encouraging the Senate to pass a vote on several popular cybersecurity reforms before breaking later this month.
Cybersecurity
GSA may recompete HSPD-12 contract
Violations of procurement policies revealed in an IG report could lead to a new competition for a services contract at GSA.
Cybersecurity
VA gets visibility with cybersecurity tool
A VA IT official said a new tool that provides an overview of all computers and IT devices on the department's central network should be operating soon.
Cybersecurity
Strange Facebook Status Updates
Another day, another potential <a href="http://www.facebook.com/">Facebook</a> vulnerability.
Cybersecurity
Nigerian Hackers Sell Man's House
News of a scam in Australia hit the Web on Wednesday, and I have to say it's a doozy. A man allegedly had his home sold by Nigerian-based scammers, and he had no idea what was going on.
Cybersecurity
What's the Future of Cyber Spending?
Tim Stevens, a blogger and researcher in the War Studies Department at King's College in London, pondered on Monday at risk the United Kingdom's cybersecurity budget may be in the future given the nation's tight budget and poor economic outlook. Writing for Forbes.com, Stevens says despite the promises to spend more on cybersecurity - "the Tories labeled the U.K. the <a href=http://ubiwar.com/2009/09/25/uk-cyber-strategy-overhaul-needed-say-tories/sick man of cybersecurity</a>," he wrote - the expected £2 billion earmarked for security may fall to financial realities.
Cybersecurity
Don't Tweet Your Password. Duh.
Twitter users report seeing tweets claiming if a user types his or her password into the live feed, twitter will automatically obfuscate it. These posters claim to have entered in their passwords to demonstrate, and allegedly all asterisks appeared when the tweet went live. If you've seen this tweet please ignore it, it's not true. The tweet is just a ploy/gimmick/joke to get people to post their passwords. Here's <a href="http://bash.org/?244321">an example</a> of this kind of nonsense.
Cybersecurity
DOD, DHS earn failing grades in foreign language
The Defense and Homeland Security departments don't have enough specialists who are fluent in Middle Eastern and Asian foreign languages. Can technology help bridge the gap?
Cybersecurity
Cyber partnership still eludes government and industry
Industry doesn't want to risk trade secrets, and government likes to classify critical information. No wonder cyber threats get less concerted attention than they deserve.
Cybersecurity
NIST to help retrain NASA employees as cyber specialists
Cybersecurity research institute would prepare laid-off workers to fill the tens of thousands of technicians the federal government needs.
Cybersecurity
Malware Toolkit
Antivirus is no guarantee of a clean, well functioning computer. There are times IT professionals need to manually clean their machines. As such, a topic of conversation for a computer advisory board I read regularly has been on toolkits for infected workstations. The toolkit addresses removing malware from these infected workstations. One member suggested the below steps, those of which seemed like a reasonable approach:
Cybersecurity
Now That's Ironic
Oh the irony: According to a report released Thursday by the DHS inspector general, the very system used by the U.S. Computer Emergency Readiness Team to exchange and access mission-critical data about the security posture of civilian networks was vulnerable to attack.
Cybersecurity
Fed's cybersecurity watchdog found to have security issues
The U.S. Computer Emergency Readiness Team had 540 vulnerabilities that put its systems at risk, IG says.
Cybersecurity