12 Jun 2013

Drudge Report Links to Malware-Infected Story

“Drudge readers who clicked on the Free Beacon link would in many cases have been infected immediately. The malware being used had polymorphic code, meaning it changes often and would not have been detected by code-analyzing anti-virus software.” Source:Drudge Report Links to Malware-Infected Story – Technology & science – Tech

Read More
12 Jun 2013

NSA chief says data disrupted ‘dozens’ of plots

“The US electronic spying chief has said massive surveillance programmes newly revealed by an ex-intelligence worker had disrupted dozens of terror plots. In a US Senate hearing, National Security Agency (NSA) Director Keith Alexander defended the internet and telephone data snooping programmes. Also, US Secretary of State John Kerry said

Read More
12 Jun 2013

Unique in the Crowd: The privacy bounds of human mobility

“We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier’s

Read More
11 Jun 2013

Another advanced hacking crew from China is revealed – Red Star

“In the spirit of last February’s report by Mandiant detailing the exploits of a Chinese-government-linked hacker group, Russian IT security giant Kaspersky Lab today released a report on another sophisticated Chinese cyber-espionage outfit, dubbed the Red Star APT (Advanced Persistent Threat) by the lab. According to the lab, this advanced hacker group

Read More
11 Jun 2013

EU to vote on harsher penalties for hackers

“The EU has drafted a new directive that includes harsher penalties for those convicted of hacking. The European Parliament last week approved a draft of the proposal and will vote on it in July.” Source: EU to vote on harsher penalties for hackers | Naked Security

Read More
11 Jun 2013

The Value of a Hacked Email Account

“One prominent credential seller in the underground peddles iTunes accounts for $8, and Fedex.com, Continental.com and United.com accounts for USD $6. Groupon.com accounts fetch $5, while $4 buys hacked credentials at registrar and hosting provider Godaddy.com, as well as wireless providers Att.com, Sprint.com, Verizonwireless.com, and Tmobile.com. Active accounts at Facebook

Read More
11 Jun 2013

Why Insiders, Not Hackers, Are the Biggest Threat to Cybersecurity

“The National Security Agency leaks by Edward Snowden will easily go down as one of the biggest revelations of the year, if not the decade. But the episode also raises new questions about the risk that insiders pose to government and corporate cybersecurity, in spite of the attention lavished on

Read More
11 Jun 2013

Bleak Outlook For Global Defense Industry

“It’s not just that the pie is getting smaller: Traditional defense firms’ percentage slice of that pie is shrinking as well. That’s because what little growth is happening is increasingly moving away from old-fashioned heavy metal – tanks, ships, planes – to information technology, from sensors to communications to cybersecurity.

Read More
10 Jun 2013

Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion

“A Pentagon cybersecurity budget outline calls for spending almost $23 billion through fiscal 2018, as efforts are expanded on initiatives from protecting computer networks to developing offensive capabilities. The Defense Department already has proposed $4.65 billion for such programs in the fiscal year that begins Oct. 1, an 18 percent

Read More
07 Jun 2013

Chinese hacked Obama, McCain campaigns, took internal documents

The U.S. secretly traced a massive cyberespionage operation against the 2008 presidential campaigns of Barack Obama and John McCain to hacking units backed by the People’s Republic of China, prompting high level warnings to Chinese officials to stop such activities, U.S. intelligence officials tell NBC News. via Chinese hacked Obama,

Read More