Haaretz reports widespread public concern over next week's threatened OpIsrael.
Panda discovers a banking Trojan active in Brazil that disguises itself as Word and WinHelp files. SEC Consult finds vulnerabilities in older versions (now patched) of Sophos' Web Protection Appliance. Criminals are distributing malware under the guise of email from a networked printer.
Cyber currency manipulation comes to bitcoin: a denial-of-service attack, aimed apparently at spiking bitcoin's price, hits the Mt. Gox exchange. Instawallet is collaterally affected (and suffers its own database attack).
In the Netherlands, ING undergoes a "major Internet banking breakdown" whose causes remain unclear, but which is squeezing retailers badly.
Post mortems on the CyberBunker-Spamhaus denial-of-service campaign suggest unevenly felt effects. Bahrain, for example, complains of major disruptions while American Midwesterners sniff that they barely noticed.
Skype and Dropbox fix a redirect security hole.
Disclosures of cyber losses to the US Securities and Exchange Commission appear lower than expected, given official US warnings of very large exposures.
Federal Computer Week reported recently that the CIA had hired Amazon to provide a cloud for the US Intelligence Community. IT World notes today that the US National Security Agency already has an OpenStack cloud.
Huawei tells investors it expects to take a hit in US sales from security-driven restrictions Congress imposed in its continuing resolution, but that it hopes to make up ground through wireless sales in Europe and Asia. (Both sides in this Sino-American dispute seem quite angry with one another, yet their trading relationship remains very large.)
Today's issue includes events affecting Australia, Austria, Bahrain, Brazil, Canada, China, India, Ireland, Japan, Republic of Korea, People's Democratic Republic of Korea, Mexico, Netherlands, Pakistan, United Kingdom, United Nations, United States..
Banking Trojan disguised as innocuous Word and WinHelp files(Help Net Security) Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other security software. These techniques are eventually recognized and incorporated into the defenses, but it's always interesting for malware analysts to unearth new ones. Panda Security malware researcher Bart Blaze has recently discovered a banking Trojan targeting Brazilian online banking users that employs a novel way to hide its real nature: its executables are delivered in the guise of .hlp (WinHelp) files
Sophos' flagship web security product open to attack(SC Magazine) A popular web security appliance suffers from a number of severe vulnerabilities that could provide hackers with a launching pad to fire attacks against a victim organization. The trio of flaws are present in the previous version of Web Protection Appliance, produced by security firm Sophos. The company since has acknowledged the bugs and released an update, with the final batch of customers receiving the new version on Monday, according to a Sophos advisory. There are no reports of exploits in the wild
Mt. Gox under largest DDoS attack as bitcoin price surges(ComputerWorld) The largest bitcoin exchange said Thursday it is fighting an intense distributed denial-of-service attack it believes is intended at manipulating the price of virtual currency, which has seen volatile price swings in the past few days. Mt. Gox, which is based in Tokyo, said the attacks have caused its worst trading lags ever and caused error pages to be displayed to traders, according to a post on Facebook. By its own calculation, 80 percent of the bitcoin trades in U.S. dollars are executed on Mt. Gox's trading platform and 70 percent of all trades in other currencies
ING internet banking in chaos after 'mysterious' withdrawals(Dutch News) Financial services group ING is grappling with a major internet banking breakdown which has led to thousands of people being unable to use their direct debit cards. In some cases, people have lost thousands of euros from their accounts because of the fault while others have thousands of euros too much, Nos television reported. Even account holders who are not allowed to overdraw have discovered their counts are deep in the red because of double bookings
Retailers call for more action on ING internet banking problems(Dutch News) The disruption to INGs internet banking system on Wednesday night may have dramatic consquences for shopkeepers, the Dutch retail association told BNR radio. Thousands of people were unable to use their ING accounts for several hours because they were wrongly overdrawn or unable to see their balances. The chaos forced ING to shut down its internet banking system for a time
The War Z Hacked(eSecurity Planet) Game and forum e-mail addresses and encrypted passwords were accessed. Game publisher OP Productions LLC recently announced that the forum and game databases for the online game The War Z had been breached, and the the game and forums have been taken down temporarily in response (h/t Softpedia)
University of Florida Warns over 14,000 Individuals of Possible Identity Theft(Softpedia) The University of Florida is notifying 14,339 patients of the UF & Shands Family Medicine at Main medical clinic that their details might have been sold to an identity theft ring by one of the clinics employees. We share our patients frustration regarding this situation and regret that it happened. We are committed to serving our patients and helping them get through any problems that arise stemming from this incident said Susan Blair, chief privacy officer for the University of Florida
Bank card-slurp nasty 'infects tills, ATMs', corrupt staff fingered(Bank card-slurp nasty 'infects tills, ATMs', corrupt staff fingered) Audacious crooks have infected hundreds of shopping tills and cash machines with malware to swipe sensitive debit and credit card data, we're told. Researchers at Russian security firm Group-IB said the software nasty is called Dump Memory Grabber, which targets computers running Microsoft Windows. It can swipe information about cards issued by US banks as well as Nordstrom-branded cards
Hackers dump details on new Secret Service director(Russia Today) Just one week after President Obama appointed Julia Pierson as the first female Secret Service director in the agencys 148-year history, a group of hackers claims to have leaked her personal information. Pierson was among the names listed by hackers behind the website Exposed. re, which advertised Secret Files pertaining to US Attorney General Eric Holder, former Republican presidential candidate Mitt Romney, Microsoft founder Bill Gates, former US president George W. Bush, actress Angelina Jolie and a slew of other celebrities and public figures
Anonymous hits North Korea in giant cyber attack(SC Magazine) Hackers claiming links with Anonymous have hit a number of websites connected with North Korea in what it claims is a response to recent aggressive behaviour by the secretive state towards South Korea and the United States
60 Malicious Codes Found in March 20th Cyber Attack(Arirang) A total of 60 malicious codes have been found in the massive cyber attack that downed systems at South Korea's banks and broadcasters last month. Government authorities say some 48-thousand PCs, electronic devices and ATMs were affected by the attack and that the number of the malicious codes would likely rise. Authorities went on to say that most of the codes came through several countries including the U.S
The Nine-Day Cyber Attack That Broke the Internet(CNBC) It's been awhile since most of us complained about spam choking our inboxes. Like Gangnam Style and designer cupcakes, spam is played out. But the recent cyber attack on Spamhaus, a European anti-spam organization, returned spam to the tip of the tongue. Mostly,because it caused trouble for a lot of innocent bystanders, and it has those of us on cyber security's front lines toting up the lessons
Bahrain 'facing major Internet disruption'(Trade Arabia) Internet users in Bahrain are facing weeks of disruption following what experts are saying is the biggest cyber attack in history by saboteurs, a report said. Millions of people worldwide have already suffered days of slow speeds, according to the
Cyber attack a virtual whack-a mole(Herald Argus) Did you know that one of the largest cyber attacks in history occurred last week? Our super duper information highway experienced a traffic jam that affected millions of users and shut down countless servers. The cyber highway was so gnarled and tangled horns were blaring all around the globe. O.K. so there were no horns but if our computers had horns they would have been blasting forth with the frustrations of internet users from here to Timbuktu
How Attackers Choose Which Vulnerabilities To Exploit(Dark Reading) A look at how the bad guys choose their attack methods -- and what you can do about it. It's an old but true adage: To protect yourself against a criminal, you have to think like a criminal. This certainly applies to IT security professionals working to keep their organizations' systems and data safe: To protect against a cyber attacker, you have to think like a cyber attacker
Security Patches, Mitigations, and Software Updates
Skype And Dropbox Fix Redirect Security Hole That Could've Hacked Your Facebook(TechCrunch) Nir Goldschlager just saved your identity. One of the world's top white hat security researchers, Goldschlager this week helped Skype and Dropbox fix a critical security flaw that could have let hackers take control of their users' Facebook accounts. Tomorrow Goldschlager will detail how he found the exploit, but he gave TechCrunch the early heads up. Here's how hackers exploit the hole
Activists on Front Lines Bringing Computer Security to Oppressed People(Threatpost) Security-related policy or legislation is enacted and then enforced to protect corporate, government or military interests. Civil organizations are often left flailing in the wind, fending for themselves with fewer IT resources and experience than a Middle America mom-and-pop operation. Yet these non-governmental—and not-for-profit—organizations have tasked themselves with helping those targeted by lethal adversaries who aren't just after corporate secrets, but are out to deny people their freedom or, in some cases, their lives
Security professionals don't have secure mobile habits(Help Net Security) Security professionals have embraced BYOD and theyre taking anytime, anywhere access to some pretty interesting locations according a new survey by Ping Identity. Most also admit to employing poor password security practices. The survey, based on 198 responses from attendees at RSA Conference 2013, sought to discover how work habits are changing as a result of cloud and mobile enterprise trends
Carna Compromise Delivers Data, But Casts Suspicions(Dark Reading) An anonymous researcher who infected more than 420,000 systems with a program aimed at collecting data on the Internet has resurrected a debate over whether the compromise of systems can be justified in pursuit of a beneficials aims
Cyberattacks Abound Yet Companies Tell SEC Losses Are Few(Bloomberg) The 27 largest U.S. companies reporting cyber attacks say they sustained no major financial losses, exposing a disconnect with federal officials who say billions of dollars in corporate secrets are being stolen. MetLife Inc., Coca-Cola Co. (KO), and Honeywell International Inc. were among the 100 largest U.S. companies by revenue to disclose online attacks in recent filings with the Securities and Exchange Commission, according to data compiled by Bloomberg. Citigroup Inc. (C) reported "limited losses" while the others said there was no material impact
Internal Audit Teams Target IT Security in 2013(Dark Reading) As internal audit teams juggle the entire stack of enterprise risk management concerns, IT security and data privacy will continue to grow in priority amid other concerns like competition and risk from financial markets. Two new reports over the last few weeks point to the growing concern for IT risk management among internal auditors and the increasing trend for internal audit teams to beef up their IT security acumen throughout the rest of 2013."There's a continuing emphasis around information security and how auditors help reduce that risk to a more nominal level," says Brian Christensen, executive vice president, global internal audit, at Protiviti. "Despite valiant efforts to get their hands around that, it remains an ever-growing challenge
Advanced Cyber Attacks Occur up to Once Every Three Minutes(MarketWatch) FireEye, Inc., the leader in stopping today's new breed of cyber attacks, today announced the release of its 2H 2012 Advanced Threat Report. The report shows that malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy defenses up to once every three minutes
Firms need to drill staff on data security(ihotdesk - IT News) The majority of firms are unable to respond adequately to cyber attacks, says a new report from Guidance Software. However, by regularly reviewing communication strategies and processes firms could increase their ability to bounce back from such an attack by as much as 70 per cent
Turns out, there already is a cloud for spooks(IT World) The NSA is running an OpenStack cloud. A week and a half ago, a well-researched article in Federal Computer Weekly indicated that the CIA had asked Amazon for help building a private cloud. As it turns out, another spy agency, the National Security Agency, already has a private cloud, this one built on OpenStack
Should U.S. limit China-government influenced IT systems?(CSO) New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers "owned, directed or subsidized by the People's Republic of China" due to national-security concerns. But is this a smart tactic? Stuck into the massive spending bill passed by Congress and signed by the President are two short paragraphs about these new IT-purchasing restrictions that have been placed on the Department of Commerce, Department of Justice, the National Aeronautics and Space Administration (NASA) and the National Science Foundation (NSF). These restrictions represent a U.S. backlash against what many believe to be evidence over the last decade of massive cyber-espionage and theft of intellectual property by China. It comes amid rising fears that IT equipment produced, assembled or manufactured by a company "owned, directed or subsidized by the People's Republic of China" could be used to somehow sabotage the U.S. But it remains to be seen if this will be a short-lived backlash brought by Congress or it becomes the foundation for U.S. policy moving forward
Accusing China a diversion of US cyber force(China Economic Net) Recently, the US has started a new round of hype of "Chinese hacker threat", not only accusing Chinese enterprises of stealing America's commercial secrets through the internet, but also pointing the blame directly at the Chinese government and its military. As we all know it, the US has a powerful internet industry and absolutely advantageous hardware equipment and technology. It can't be denied that the development of the internet has brought great convenience to the world. In recent years, however, the US has been making use of its advantages to strengthen its cyber prowess. What is absurd and ridiculous is that the US is using all kinds of excuses to draw China into the focus of criticism
Australian Victoria Police seeks self-imposed data logging and filter(ZDNet) Australia's Victoria Police has gone to market to find a service provider that will help it implement a data filter and retention scheme for its employees using the internet. Described as a "web content filtering solution", Victoria Police's request for tender seeks to retain an audit trail of its employees internet usage for a minimum of seven years. Victoria Police's specifications require audit reports to include a "complete audit of internet usage by a specific individual", with enough detail that it can use it "for use in criminal prosecution or disciplinary hearings
Cyber Liability Insurance at the State Government level(idexpertscorp) I read an interesting article recently on Cyber Insurance within the public sector titled "Are Governments Ready to be Buyers of Cybersecurity Insurance". There were two main points that stood out to me and a surprise as well. We know that the actual penetration of Cyber Insurance in the privacy sector is somewhere around the 20% mark and that it is lower in the government sector
Kaspersky Lab partners with INTERPOL to combat cyber crime and cyber threat(Global Post) Kaspersky Lab, a leading developer of secure content and threat management solutions and the INTERPOL Global Complex for Innovation (IGCI) Singapore have bonded together to combat cyber crime and cyber threat. This was according to Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, who announced on Tuesday the meeting he had with Ronald Noble, INTERPOL Secretary General, and Noboru Nakatani, IGCI Executive Director that was held at Kaspersky Labs headquarters in Moscow recently."I am most pleased with the outcome of this meeting. I have been pushing for the creation of what I used to call an 'Internet-INTERPOL' for over a decade now, at last it has finally come to pass," Kaspersky said
Cara Beston and Becky Swain of PwC's Risk Assurance Practice Recognized with CloudNOW's Top 10 Women in Cloud Award(MarketWatch) PwC Risk Assurance Partner Cara Beston and Becky Swain, PwC Cloud Assurance Director, today received CloudNOW's "Top 10 Women in Cloud Award" for their exceptional contributions and thought leadership to the cloud community. CloudNOW, an executive consortium of the leading women in cloud computing, presented the award during UBM Tech's Cloud Connect in San Jose, California. In addition, Ms. Swain will be speaking at Cloud Connect on the new initiatives led by the Cloud Security Alliance, in collaboration with international standards development organizations, to establish new forms of assurance and reporting with the mission of helping to build out a disparately desired trusted cloud ecosystem
Roger Baker Appointed Chief Strategy Officer at Agilex(GovConWire) Roger Baker, chief information officer at the Department of Veterans Affairs from 2009 until 2013, has joined Chantilly, VaDepartment of Veterans Affairs.-based federal technology contractor Agilex Technologies as chief strategy officer. He will be responsible for helping grow the company's presence in the government market as Agilex aims to become a billion-dollar company
Robert Logan Named CIO for SAIC Natl Security, Health Spinoff(GovConWire) Robert Logan, director of engineering for information technology services at Science Applications International Corp. (NYSE: SAI), has been appointed chief information officer. The appointment is effective April 1 and Logan will also serve as CIO of the future independent national security, health and engineering business after SAIC separates into two companies, SAIC said Wednesday
BlackBerry Gets A Helping Hand From Canada, With A $256M Loan To Telefonica For BB Devices(TechCrunch) BlackBerry last week posted better than expected quarterly results, but it's not out of the woods yet. Now Canada is stepping in to help. Today, Export Development Canada, the Canadian export credit agency, announced that it has provided a €200 million ($256 million) working capital facility to Telefonica, one of the world's biggest mobile operators, to procure BlackBerry
Products, Services, and Solutions
Absolute Software and Samsung partner on KNOX(H-online) Device security and management company Absolute Software has announced that it is partnering with Samsung to bring tracking, remote wipe and management capabilities to Samsung's KNOX security framework. Samsung KNOX, which is based on SE Android, was unveiled in March as a solution to secure business data storage on Android-based mobile devices. KNOX is expected to be launched in the second quarter of this year and, with the addition of Absolute Software's Computrace technology, will also include cloud-based security and management, including the option of having the company's investigation team trace and recover stolen devices with the help of local law enforcement
People Power turns old iOS devices into surveillance equipment(CSO) People Power's free app turns your iOS devices into surveillance equipment. Fancy home surveillance systems may be out of your budget, but you can always turn that aging smartphone or tablet into a wireless security camera. A new iOS app, People Power's Presence, helps you turn unused iPhone, iPods, or iPads into a makeshift security system that you can monitor remotely. You install the free app on your old device and your current smartphone, create a Presence account, and point the cameras in the direction you want to keep an eye on
The HTTP 'Range' Header(Internet Storm Center) One of the topics we cover in our "Defending Web Applications" class is how to secure static files. For example, you are faced with multiple PDFs with confidential information, and you need to integrate authorization to read these PDFs into your web application. The standard solution involves two steps
An Inside look at avoiding cloud risks(Windowsecurity) At the speed at which companies and individuals are adopting multiple cloud platforms, the high level of risk is unavoidable. In this article we will cover recent events in the UK and Europe, which have exposed millions of users due to lack of planning and contingency. It is important to point out that I am in no way against cloud technologies, in actual fact I have been involved in building some of the largest platforms for over ten years
At RSA, specious arguments against security awareness(ComputerWorld) It takes two to tango, and at least two opinions to tangle. That's why the security awareness panel held during the recent RSA conference was so frustrating: There was a remarkable lack of diversity in opinion. I attended with hopes for a proper debate, but that would require intelligent dialogue from representatives on both sides of the issue at hand
In wake of gTLD security criticism, ICANN announces emergency back-up registry operators(ComputerWorld) The Internet Corporation for Assigned Names and Numbers (ICANN) has selected three emergency back-end registry operators to guarantee domain names within a new generic top-level domain (gTLD) will resolve in the event of a failure at a new TLD operator, it said on Tuesday. The China Internet Network Information Center (CNNIC), U.S. based Neustar and the U.K. based Nominet were selected, the ICANN said in a news release. Emergency back-end registry operators, or EBEROs, are activated if a registry operator fails to provide or is unable to sustain five critical registry functions temporarily, or in the case of transition from one registry operator to another, ICANN said
How Can You Protect Your Business From Cyber-Attacks?(Business 2 Community) Forty percent of all cyber-attacks target businesses with fewer than 500 employees, the article notes, with an average cost of $190,000 per attack, according to statistics from the Department of Homeland Security and antivirus software firm Symantec
Blocking zero-day application exploits(Help Net Security) But that can't be done with blacklisting solutions, as we have seen with the recent New York Times, Washington Post and Wall Street Journal breaches. Since most targeted attacks exploit zero-day vulnerabilities, an effective solution must be able to
Identifying And Remediating Security Vulnerabilities In The Cloud(Dark Reading) Another good starting point is the Security, Trust & Assurance Registry maintained by the Cloud Security Alliance. The registry provides a record of self-assessed security practices of IaaS, SaaS and PaaS vendors, and can give organizations a sense of
Design and Innovation
Cisco's Lew Tucker On The Internet Of Everything And The Tie To An App-Centric World(TechCrunch) Cisco's Lew Tucker stood onstage today at Cloud Connect and pitched the networking giant's "Internet of Everything," an app-centric world that will be worth $14.5 trillion over the next couple of years. Whereas the Internet of Things is all the objects in our world, Tucker says the IoE is the smart grids and, really, the entire supply chain and its transformation. Big
The Idiocy Of The Social Animal(TechCrunch) As we move closer to the launch of the (probably awful) Facebook phone, let's examine just what the social network and its ilk have created. Millions of us use these new tools to joke, flirt and share memories, but just as many of us use these tools much to our disadvantage. In some ways, however, that is making things better for all of us
Research and Development
Quantum cryptography: On wings of light(Eureka! Science News) Quantum physicists believe they can provide secret keys using quantum cryptography via satellite. Unlike communication based on classical bits, quantum cryptography employs the quantum states of single light quanta (photons) for the exchange of data
MIT to Improve Cyber Security to Protect Itself Against DDOS Attacks(Softpedia) After the recent distributed denial-of-service (DDOS) attacks, hacks, and the gunman hoax, the Massachusetts Institute of Technology (MIT) is determined to improve campus security, including the organizations cyber security. In a security memo published a couple of days ago, MIT reveals that it will implement a series of changes to its networks to ensure theyre better protected. One of the most important changes refers to strengthening network traffic policies by blocking all traffic that originates from outside of MIT
AGA Commends CFCT Commissioner Chilton's 'End User Bill of Rights'(AGA) The American Gas Association (AGA) commends U.S. Commodity Futures Trading Commissioner Bart Chiltons End User Bill of Rights. Americas natural gas utilities, along with other end user energy market participants, enter into both financial and physical commodity transactions that are being regulated by the Commodity Futures Trading Commissioner (CFTC) for the first time under the Dodd-Frank Act. AGA member companies are regulated entities and are committed to compliance with the CFTCs regulations
A Cyber-Survivable Military(The National Interest) A recent report by the Defense Science Board (DSB) proposes a comprehensive approach to improving the U.S. military's resiliency to cyber threats. Many of its recommendations would address the cyber espionage plaguing the Department of Defense every day. But the study also considered how technologically-savvy, well-resourced states, such as China or Russia, might use cyber weapons against the United States in a war
Department of Homeland Security Monitors Peaceful Protests(JD Journal) The Partnership for Civil Justice Fund (PCJF) obtained government documents using the FOIA records request that show the Department of Homeland Security monitors peaceful, lawful protests on a daily basis as part of policy, according to PCJF. The documents show that the DHS "Threat Management Division" directed Regional Intelligence Analysts to issue a "Daily Intelligence Briefing" that involves reporting on "Peaceful Activist Demonstrations" as well as "Domestic Terrorist Activity."
Businesses, privacy activists wrestle over California privacy bill(CSO) For privacy advocates, bill a 'foundational step,' but the Chamber of Commerce says proposed law goes too far. Businesses and privacy advocates are squaring off over a proposed law that would make California the first state in the nation to give people the right to see all the information companies have on them and to find out who the data is shared with
California introduces 'right to know' data access bill, and why Silicon Valley will hate it(ZDNet) As California considers going above and beyond what the EU gives its citizens in data access request rights, technology and Web firms in Silicon Valley will likely fight any hopes of such rights hopping across the Atlantic. The European Union has long championed its citizens' right to submit a request to acquire the data a company holds on them in order to ensure that such data is up to date and correct. In recent years, one Austrian law student took this "habeas data" right to public light by demanding his Facebook data from the social network. Americans do not have this right -- and generally have almost zero legal protection from the state or federal government against data thefts, unauthorized disclosures and other privacy-related matters, unlike in the EU
NIST, NTIA seek feedback on voluntary cybersecurity incentives(FierceGovernmentIT) Under the cybersecurity executive order signed by President Obama in February, the National Institute of Standards and Technology is to develop within one year a framework for incorporating "consensus standards and industry best practices" for voluntary adoption by operators of critical infrastructure
NSA Chief Wants Companies to Share More Info With the Government(PolicyMic) Speaking at a conference at Georgia Tech, Director of the U.S. National Security Agency General Keith Alexander pressed Congress last week to pass legislation creating a more effective information-sharing regime between government and businesses to
CISPA Explainer #2: Who Can Information Be Shared With?(American Civil Liberties Union News and Information) In the latter scenario, companies even get to decide whether your information can be delivered to civilian agencies like the Departments of Homeland Security (DHS), Treasury, or Energy, or whether it can go to military ones like the National Security Agency
CISPA would let companies legally hack, says CDT(FierceGovernmentIT) Broadly-written provisions within the re-introduced Cyber Intelligence Sharing and Protection Act would place too much power within companies sharing cyber threat information with the government and within the federal government, privacy advocates from the Center for Democracy & Technology said during a April 3 press call
Litigation, Investigation, and Law Enforcement
Apple's iMessage Encryption "Impossible To Intercept" For Surveillance Purposes, Claims DEA Report(TechCrunch) Apple's iMessage text messaging replacement and chat service has frustrated U.S. federal agents looking to get access to suspect communications, a new report from CNET reveals. According to government documents obtained by the news source, iMessage and its encryption are not vulnerable to existing methods used by the DEA, meaning that in a recent February 2013 investigation in particular, it was
US Takes First Step to Implement Cyber Executive Order(Main Justice) With higher profiles come more money, but Bruce McConnell, senior counsel on cybersecurity at the Department of Homeland Security, suggested business leaders don't fully appreciate the gravity of the threat. "How do we tell CEOs how much to spend and
US patent office drops the bomb on Apple(FierceMobileIT) The U.S. Patent and Trademark Office has dropped a bomb on Apple's (NASDAQ: AAPL) efforts to sue its competitors. The USPTO issued a Final Office Action rejecting Apple's "bounce-back" patent claim, a major part of the lawsuit that netted Apple $1 billion from Samsung, until a federal judge threw out $450 million of that award. The judge called for a new trial on that portion because the jury had some math problems
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Thriving in the Post-Sequestration GovCon Era(McLean, Virginia, USA, May 14, 2013) The Potomac Officers Club is hosting a summit for GovCon executives and government leaders to collaborate and share ideas on how to navigate a new era involving sequestration. At least five speakers, each...
CSO40(Braselton, Georgia, USA, April 2 - 3, 2013) The CSO40 Security Confab + Awards will honor and share the critical viewpoints of today's leading CSOs, CISOs and security executives at the nation's leading CSO thought leadership conference.
Cloud Connect Silicon Valley(Santa Clara, California, USA, April 2 - 5, 2013) Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry...
Cyber 1.3(, January 1, 1970) Maj. Gen. Suzanne Vautrinot, USAF, commander, 24th Air Force, and commander, Air Force Network Operations, will discuss the global strategic implications that relate to the cyber domain at the Space Foundation...
HITBSecConf2013(Amsterdam, the Netherlands, April 8 - 11, 2013) HITB2013AMS will feature cutting edge attack and defense research including the a presentation on the inner workings of the iOS 6.1 Evasi0n jailbreak presented by members of the world famous Evad3rs Team,...
SANS Northern Virginia 2013(Reston, Virginia, USA, April 8 - 13, 2013) This event features comprehensive hands-on technical training fand includes several courses that will prepare attendees for DoD 8570 and GIAC approved certification exams. Four of the courses can apply...
INFILTRATE 2013(Miami, Florida, USA, April 11 - 12, 2013) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere.
Software Engineering Institute Invitational Career Fair(Pittsburgh, Pennsylvania, USA, April 11 - 12, 2013) Attention software engineers and cyber security professionals, the Carnegie Mellon Software Engineering Institute needs your top notch skills to meet today's challenges. SEI staff will be interviewing...
Information Tech Expo Series - Hawaii(Oahu, Hawaii, USA, April 12 - 19, 2013) This 6-series showcase will feature stops at 5 DoD locations and 1 Intel Center on the island of Oahu. Celebrating 20 years of these expos is a true testament to the government and military's readiness...
InfoSec World Conference & Expo 2013(Orlando, Florida, USA, April 15 - 17, 2013) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen...
Cyber Guardian 2013(Baltimore, Maryland, USA, April 15 - 20, 2013) Cyber Guardian is the SANS Institute's annual, interactive training session for cyber security professionals. All courses are associated with a GIAC Certification, and cover topics like intrusion detection,...
Infosec Southwest 2013(Austin, Texas, USA, April 19 - 21, 2013) InfoSec Southwest is intended to be a general security and hacking conference with no specific industry or topical focus. As such, nearly all topics (other than vendor pitches) are fair game and the attending...
Mobile Device Security for Defense and Government(Alexandria, Virginia, USA, April 23 - 24, 2013) This Defense Strategies Institute conference addresses the challenges of operating mobile devices in networks whose security is mission critical. The symposium's overall theme will focus on DOD's plan...
Infosecurity Europe(London, England, UK, April 23 - 25, 2013) Europe's number one Information Security event. Featuring over 350 exhibitors, the most diverse range of new products and services, an unrivalled education programme and over 12,000 visitors from every...
INSA Leadership Dinner Featuring Betty Sapp, Director, NRO(Reston, Virginia, USA, April 25, 2013) - This leadership dinner will feature a keynote address from Betty Sapp, Director of the National Reconnaissance Office highlighting her focus on innovation at the NRO and for the Intelligence Community.
23rd Annual Government Procurement Conference(Washington, DC, USA, April 25, 2013) This unique one-day event attracts more than 3,000 participants representing government agencies, prime contractors and small businesses from around the country. Participating companies are able to network...
TechExpo Cyber Security Hiring Event(Columbia, Maryland, USA, April 30, 2013) A hiring event for experienced cyber security professionals, with many leading companies in attendance and interviewing on-the-spot. Learn from the distinguished speakers' panel, details of which will...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.