cybersecurity


An old attack vector has re-emerged with a twist. This time the attackers are patient, and have defined the attack process in a manner that will increase the effectiveness.

An email with a semi-customized subject matter is sent to a selected group of targets all sharing a similar interest – CYBERSECURITY. The email is about a job opening and has two attachments. The first attachment is labeled job description. If the email recipient is interested and clicks on the download – you guessed it – malware is downloaded and installed. The second attachment is for the recipients that want to unsubscribe. If you click on that download, yes once again malware is downloaded and installed. Keep reading →

The Department of Veterans Affairs will lock employees out of its networks if they fail to take the required yearly cybersecurity and privacy training on time – 365 days after their last refresher course.

VA CIO Roger Baker announced the policy last week to button down security and privacy on the VA’s internal and external internet sites that have been hit by security breaches and privacy violations – both internal and external – on a regular basis. An employee who doesn’t meet the yearly deadline will be blocked out on Day 366. Keep reading →


It seems that “real time” is the Holy Grail these days for cybersecurity – everything on the network monitored, analyzed for concerns, and either fixed or at least quarantined in a moment’s notice. Obviously this is never completely possible, so we need to pick those areas that either lower risk or increase opportunity. The technology discussed in this article happens to offer both.

I recently attended a few briefings and watched real time patching and configuration management across all assets on a network. While this represents only part of the automated continuous monitoring and remediation processes needed on any network, I found it compelling because patch management and configuration management are fundamentals of security and can also be money savers. Keep reading →


From tinkering with an old Amiga computer in college to prosecuting one of the first computer hacking cases in the country, Chris Painter’s life has always revolved around computers and technology.

Painter has even adorned his office walls with posters from science fiction movies that involve hackers on the run, espionage and computers taking over the world. He said the posters “highlight for visiting diplomats and industry leaders the popular misperceptions of computers.” Keep reading →


White House Cybersecurity Coordinator Howard Schmidt has announced three priority areas where federal departments and agencies “need to focus their cybersecurity activity” –and a new set of cyber security goals to be reached by 2014.

Schmidt, in a White House blog posted Friday, said his office has recognized “the challenge of knowing which (types of technology and talent) will be most effective when dealing with advanced adversaries, especially in a limited budget environment.” Keep reading →

Cyber Sit-ins, cyber protests and other forms of demonstration have grown year after year and are now considered formidable method of protests.

How to respond to those new forms of protests, amid other cybersecurity threats, has become a challenge around the world for government elections, politicians, corporations, law enforcement organizations all of which have experienced the wrath of those who oppose their actions. Keep reading →


Washington area Metro riders may be wondering who changed the names of all of their metro stops. If they work in federal IT, that’s just the reaction executives at electronics giant, Intel, are hoping for.

Intel created an altered version of Washington’s Metro subway map as part of a new advertising campaign in Washington that is catching attention with the region’s riders on the way to work. Keep reading →


NEW YORK (CNNMoney) — Anonymous and other “hacktivist” groups rose to new prominence in the cybercrime universe last year, and a new report shows that they made some serious mischief.

Verizon’s (VZ, Fortune 500) annual Data Breach Investigations Report, released Thursday, found that hacktivist groups were responsible for 58% of all data stolen last year. The telecom giant compiled data breach information from its customers and from law enforcement agencies in five countries. Keep reading →


Negligent insiders are the leading cause of data breaches at U.S. companies and public sector agencies, according to a new study by the Ponemon Institute. At the same time, malicious or criminal attacks are on the rise and are more costly to organizations than data breaches triggered by employees or system glitches, according to the study.

In its report, the 2011 Cost of Data Breach Study, the Michigan-based research organization found that 39% of data breaches in the U.S. involved employee negligence. Keep reading →


It used to be relatively easy for Greg Schaffer to carve out some time in his week to kayak or row and enjoy some time on the water. These days, however, most of his time is spent helping organizations navigate the choppy waters of cybersecurity.

As assistant secretary for cyber-security and communications at the Department of Homeland Security, Schaffer helps organizations safeguard and secure cyberspace at a time when cyberattacks are increasing and the use of new technology such as mobile devices is on the rise. Keep reading →

Page 13 of 291...91011121314151617...29