Twitter bans SEA hacktivists, and the Syrian Electronic Army vows retaliation. Other loosely affiliated hackers make low-grade hits on Australian and New Zealand sites, targets-of-opportunity in a campaign against nations deemed insufficiently enthusiastic for Bashir Assad. Other cybervandalism appears in the Philippines and South Asia.
Other attack techniques in the air today include "stepping stone" infected sites as a route to desirable targets, creative backdoors, and analysis-resistant malware used in Bitcoin mining.
Government surveillance remains in the news, as VPN vulnerability to snooping is reported. Concerns about extensive cooperation with NSA surveillance rise in New Zealand and the United Kingdom; South African media wonder about their country's policies. The US Congress seems poised to restrict some NSA programs.
Cloud providers concerned about their business, post-Snowden, consider "no-knowledge" offerings. A new startup offers the services-for-hire of bug-bounty winners.
UCLA researchers' "jigsaw" approach to software encryption draws more attention. At BlackHat, panelists warn that the industry-standard RSA algorithm will soon be broken, and that new cryptographic approaches are badly needed.
Google's new Moto-X phone may prove an interesting case study of security design.
Today's issue includes events affecting Algeria, Australia, Canada, China, Czech Republic, India, Kenya, Latvia, New Zealand, Pakistan, Philippines, Russia, Syria, United Kingdom, United Nations, United States..
SINET's Innovation Summit is now full, but if you're unable to attend, you can still keep up with the proceedings through the CyberWire's special coverage on August 6 and 7. (Our coverage will also include live updates via Twitter: follow us @thecyberwire.)
Official Websites of Automobile Giants Fiat and Dodge Australia Hacked by Dr.SHA6H(Hack Read) A well known hacker going with the handle of Dr.SHA6H has hacked and defaced 3 official websites of automobile and motor companies including Dodge, formally the Dodge Division of Chrysler Group, FIAT motors Australia and FIAT New Zealand. The sites were hacked today and left with a deface page and a message in support of people of Syria and against the role of US, UN, Arab countries and governments around
Websites of United Nations Development Programme and UN Volunteers Philippines Hacked by Over-X(Hack Read) The well known Algerian hacker going with the handle of Over-X is back, this time by hacking and defacing 2 official websites of United nations (UN) designated for the Republic of the Philippines. One site belongs to United Nations Development Programme (UNDP) and second site belongs to United Nations Volunteers (UNV), left with a deface page along with a simple note
Website of High Commission of India in Islamabad Hacked and Defaced by Spider64(Hack Read) An Indian hacker going with the handle of Spider64 has hacked and defaced the official websites of Indian High Commission in Pakistan. The site was hacked today, left with a deface page along with a message but reason for targeting Indian High Commission site was not mentioned anywhere. The message on the deface page was expressed in following words: We have no rules, hacked by Spider64 Link of targeted
Scans for Open File Uploads into CKEditor(Internet Storm Center) We are seeing a lot of scans for the CKEditor file upload script. CKEditor (aka "FCKEditor") is a commonly used gui editor allowing users to edit HTML as part of a web application. Many web applications like wikis and bulletin boards use it. It provides the ability to upload files to web servers. The scans I have observed so far apper to focus on the file upload function, but many scans will just scan for the presence of the editor / file upload function and it is hard to tell what the attacker would do if the editor is found
Gone in 30 seconds: New attack plucks secrets from HTTPS-protected pages(Ars Techica) Exploit called BREACH bypasses the SSL crypto scheme protecting millions of sites. The HTTPS cryptographic scheme, which protects millions of websites, is susceptible to a new attack that allows hackers to pluck e-mail addresses and certain types of security credentials out of encrypted pages, often in as little as 30 seconds
'Malware–infected hosts as stepping stones' service offers access to hundreds of compromised U.S based hosts(Webroot Threat Blog) Malware-infected hosts with clean IP reputation have always been a desirable underground market item. On the majority of occasions, they will either be abused as distribution/infection vector, used as cash cows, or as 'stepping stones', risk-forwarding the responsibility, and distorting the attribution process, as well as adding an additional OPSEC (Operational Security) layer to the campaign of the malicious attacker
Hot Knives Through Butter: Bypassing File-based Sandboxes(FireEye) Diamonds are a girl's best friend. Prime numbers are a mathematician's best friend. And file-based sandboxes are an IT security researcher's best friend. Unfortunately, malware authors know this. Aware that researchers are using sandboxes to monitor file behavior, attackers are building sandbox-evading techniques into new advanced persistent threat (APT) attacks — and even using these tricks to resurrect notorious malware classics
Java Back Door Acts as Bot(McAfee) The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently, we received an interesting malware binary-a JAR package that opens a back door for an attacker to execute commands and acts as a bot after infection
More Creative Backdoors – Using Filename Typos(Sucuri) When a site gets compromised, one thing we know for sure is that the attackers will leave some piece of malware in there to allow them access back to the site. We call this type of control capability a backdoor. Backdoors are very hard to find because they don't have to be linked anywhere in the site, they can be very small, and can be easily confused with "normal" code. Some of them have passwords, some are heavily encrypted/encoded and can be anywhere in your site
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code(McAfee) Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware and tools development. AutoIt allows both easy interface creation for rapid development and full Windows API access for whatever is not directly supported. We have seen an increase in the use of AutoIt scripts by malware authors and other bad guys to achieve their malicious ends
Malicious Bitcoin Miners target Czech Republic(Avast) Today we are going to talk to those of you who use Bitcoin digital currency to pay for a variety of goods and services – along with a warning about yet another source of Bitcoin miners – the sharing services. You may think that if you avoid cracks and keygens while browsing the web you will be safe. Well, we would recommend that you reconsider that position. Recently we found that on the uloz.to file sharing service someone uploaded a lot of fake files containing Bitcoin miners
Security breach at Opscode as attackers download databases(The Register) Attack blocked in five minutes flat. Updated Opscode, the commercial side of the open source Chef configuration management tool beloved by Google, Facebook, and IBM, has warned customers that a flaw in an unnamed third-party application has left its wiki and ticketing system pwned
Ubuntu puts forums back online, reveals autopsy of a brag hacker(The Register) Canonical hardens security, shows Sputn1k_ only wolfed down useless salted hash. Ubuntu Forums are back to normal following a serious hack attack that exposed the usernames, email addresses and hashed passwords of 1.8 million open source users
SIG Australia Hacked(eSecurity Planet) Several user names and clear text passwords were published online
Harbor Freight latest target of cyber attack on credit accounts(WFIE 14News Evansville) An Evansville man learned that he was a victim of credit card fraud after shopping at a local hardware store. Harbor Freight tools is issuing a warning to customers that they have been the victim of a cyber attack, and your credit card information could be in the hands of thieves
SCADA Experts Simulate 'Catastrophic' Attack(Dark Reading) SCADA experts here today demonstrated just how easy it is to commandeer the antiquated networking protocols used in an oil well pumping station and other SCADA environments, causing a simulated oil tank to nearly overflow using spoofed commands to the programmable logic controller (PLC)
Industrial control systems targeted by malicious attackers, research shows(CSO) A researcher uses a network of simulated water pump systems to monitor how frequently industrial control systems are attacked. Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps
Can you spot phishing? Probably not!(CTO Vision) North Carolina State just conducted a study that showed only 7.5% ( yes, that is less than 10%) of the participants were able to identify fake emails. The study also showed that more than 50% of the group missed half of the fake emails and still deleted at least one authentic email. Yet, prior to taking the test, 89% of the participants stated they were "confident" in their ability to differentiate between a legitimate email and one sent by a scam artist
Using Google Image Search to Find Linkedin Invitation Scams(TripWire) I've been getting a lot of fake LinkedIn invitations to connect lately, so I thought I'd share this simple method of separating the real from the fake. Of course, if your gut says it's fake, it probably is. That person you don't recognize who hasn't really filled in much of their profile probably isn't a connection you want or need
Is the person sitting next to you a malicious insider?(FierceITSecurity) Insider threats carried out by employees within an organization can cost companies millions of dollars, Patrick Reidy, chief information security officer at the Federal Bureau of Investigation, warned an audience here at the Black Hat security conference
Tracking down a DDoS attacker(FierceITSecurity) A major customer of a Canadian ISP was subjected to a gigabit-plus size distributed denial of service attack that "took down everything," related Robert Masse, security consultant and partner at Swift Identity, at the Black Hat security conference
NSA Surveillance Can Penetrate VPNs(Dark Reading) The National Security Agency has a system that allows it to collect pretty much everything a user does on the Internet, according to a report published by The Guardian on Wednesday, apparently even when those activities are done under the presumed protection of a virtual private network (VPN)
US spy agencies eavesdrop on Kiwi(Stuff) The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war
The phantom of the boot sector.(Eugene Kaspersky-Nota Bene) In the ongoing battle between malware and anti-malware technologies, there's an interesting game that keeps getting played over and over - king of the castle
Black Hat: Android Master Key Vulnerability Makes Us Safer(eSecurity Planet) When is an Android security flaw a good thing? When it makes us safer, says researcher during his Black Hat presentation. Jeff Forristal, aka Rain Forest Puppy, made headlines around the globe earlier this month when he revealed a new Android master key vulnerability that could potentially put all Android devices at risk of exploitation
Carriers hack into their own SIM cards to fix security issue(CNN) CNN reports that the security researcher who detailed a SIM card security flaw that might have put 750 million phones at risk says several carriers have fixed the issue. The hack, revealed last month by Karsten Nohl, the founder of German firm Security Research Labs, exploited a flaw in cards using DES (Data Encryption Standard) to secure data, and allowed the researcher to intercept text messages, make carrier payments, and impersonate the phone's owner
Is the risk of cyber-warfare overrated?(The Economist) The argument so far has been chiefly semantic, about the definition of warfare. Thomas Rid is not disputing that cyber-attacks are nasty. He is just saying that none so far meet all the (his) criteria for "warfare" which is violent, not metaphorical. The internet is a vector for sabotage, espionage and subversion, but these are less, not more violent when done by computer. Talk of "cyber-warfare" militarises the discussion and distracts from the truly hard questions, about defending society while constraining the intelligence agencies and preserving liberty. Richard Bejtlich attacks that head-on
'Security? We've heard of it': Cloud contracts hazy on security, says Gartner(Computing) Security provisions of commercial cloud services - especially software-as-a-service (SaaS) - are frequently inadequate, with contracts containing "ambiguous terms regarding the maintenance of data confidentiality, data integrity and recovery after a data loss incident", according to analyst group Gartner
Rising cyber-attacks leave firms with huge losses(Standard Digital) Cyber-attacks and security threats to businesses have risen sharply in the recent past, resulting in huge financial losses to firms in Kenya. A report released by the Telecommunications Service Provider of Kenya ( TESPOK) yesterday indicated that most businesses were suffering from recurrent disruptions
Five Points About Cyber Risks that CEOs Must Consider(IT Business Edge) Online threats and cyber crimes increase with intensity and complexity almost daily. Couple this with the fact that nearly all business functions rely on the Internet and IT in some way, and you have big reasons to fear a failure in your company's online defenses
Finding Maryland's next cyber security darling(Baltimore Business Journal) Industry leaders consider the sale validation of their efforts to promote cyber here. "It's a real affirmation not only of Sourcefire and the good work they were doing
There is no 'I know what I am doing' trump card in security(Virus Bulletin) NSA activities could make millions avoid US-based services. We have all been there. To continue the product you're working on, you need to get some extra permission: a port needs to be opened, or perhaps some files need to be uploaded onto a protected system. You ask the IT department for this permission and, much to your frustration, they won't give it to you until you've explained in full detail why you need it, and even then they will have to check with their management. "But I know what I'm doing. And my manager says it is fine."
SpiderOak Takes Novel Approach To Data Privacy(InformationWeek) Prism episode has increased interest for cloud services like SpiderOak, which does not keep copies of user encryption keys -- and thus can't provide access to user files. Ethan Oberman has a problem with cloud computing. "A person should be able to use cloud technologies without relinquishing his or her privacy," explained Oberman, CEO of cloud storage service SpiderOak, in a phone interview
Dell, buyout group close to new deal ahead of vote(MarketWatch) Dell Inc. DELL +5.06% and the buyout group looking to take the computer maker private are nearing a deal that would raise the price being offered to shareholders in exchange for a change in voting rules so that abstentions aren't counted as no votes
CACI's Recent Intelligence Contracts Worth $425M(Executive Biz) CACI International Inc. revealed that recently awarded contracts with intelligence community customers totaled more than $425 million amid the company's efforts to expand and help bolster national security
SAIC completes $85 million sale of Tysons campus(Washington Business Journal) SAIC recently closed on the $85 million sale of its three-building Tysons Corner headquarters to The Meridian Group, setting the stage for a multimillion-dollar redevelopment of the 18-acre campus in the years ahead
Booz Allen CEO: Snowden 'was not a Booz Allen person'(Washington Post) McLean-based Booz Allen Hamilton reported a more than 13 percent jump in quarterly profit Wednesday and said its government customers have been supportive since the company's former employee Edward Snowden acknowledged leaking government secrets. Booz Allen's chief executive, Ralph W. Shrader, rebuked Snowden's actions on Wednesday in his first public remarks on the topic.Shrader said during a conference call that he has met with Booz Allen employees on the matter
Former NSA analysts start company to research zero-day vulnerabilities in websites(NetworkWorld) Idea behind Synack is making bug-bounty experts from around the globe -- and the NSA -- available for hire. Two former National Security Agency (NSA) computer network operations analysts have set up a company called Synack that is offering to match bug-bounty security experts from around the world -- including from within the NSA on a freelance basis -- to discover zero-day vulnerabilities in websites
SAIC President Deborah Lee James Nominated AF Secretary(GovConWire) Deborah Lee James Deborah Lee James, president of Science Applications International Corp.'s (NYSE: SAI) technology and engineering sector, has been nominated by President Barack Obama to serve as Air Force secretary, Defense News reported Thursday
Free first aid kit for computer viruses(Help Net Security) Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free onto any CD or USB stick
VERIS: A New Database for Sharing Security Incident Information(Infosecurity Magazine) A new community database has been launched by Verizon to help bridge the uncertainty gap in data breach information: what we know and what we need to know. Based on VERIS, it is designed to facilitate the secure sharing of incident information for the good of all
Security Intelligence and Threat Intelligence are not the same thing(HP) Enigo Montoya said it best in "The Princess Bride" - You keep using that word. I do not think it means what you think it means. The last two months have been interesting. I've found myself in conversations where the phrases "threat intelligence" and "security intelligence" have been used virtually interchangeably without thinking anything of it. Don't get me wrong, I wouldn't dare disparage this behavior too harshly. Some of the people who have done it are at the heads of their respective organizations. Before I really got wrapped into this on a daily basis I was prone to the same mistakes and misspoken phrases
Keep your laptop safe while using Wi-Fi hotspots(Help Net Security) The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a recent study, Bitdefender
The rise of BYOD: What are the key security risks and how can SMEs overcome them?(ITProPortal) It's no secret that the momentum of the BYOD (bring your own device) trend has surged like a tidal wave across organisations of all sizes and industries recently. In this Q&A we talk with Don Smith, technology director at Dell Secureworks, to discuss the major concerns around BYOD and examine how businesses can overcome these challenges
McAfee exec on Mandiant, cyberspies and costs(DeepDiveIntel) The Internet security firm McAfee takes a traditional view on the question of whether private companies should name names when it comes to responsibility for cyber attacks and espionage. Its answer is no. McAfee describes events in dry, geographic terms, without references to governments. It's a quaint approach compared to that of Mandiant, the U.S. cyber forensics company that earlier this year accused a Chinese "cyber espionage unit" of stealing American intellectual property and blamed China for hacking the New York Times. In an interview with Deep Dive, McAfee's Tom Gann explains his company's approach to attribution; its support for a public-private partnership with the U.S. government; and its decision to underwrite a cybercrime and espionage cost study by the Center for Strategic and International Studies, a Washington, D.C., think tank
Design and Innovation
Enterprises warned against first true Google phone, Moto X(CSO) Ease-of-use in the Moto X, such as always-ready microphone for voice actions, likely to tickle consumers — but haunts security pros. The security nightmare corporations face with the bring-your-own-device (BYOD) trend just got worse with the release of Google's new Moto X. With the Android smartphone unveiled Thursday, Google is hoping to lure customers with a personal digital assistant that's easy to use and can guess what information or services people want by reading emails and schedules and tracking search queries. While all this data collection may make the device invaluable, it also should make corporations very nervous
Research and Development
Crypto experts issue a call to arms to avert the cryptopocalypse(Ars Technica) Nobody can crack important algorithms yet, but the world needs to prepare for that to happen. At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved in cryptography, from software developers to certificate authorities to companies buying SSL certificates, to switch to newer algorithms and protocols, lest they wake up one day to find that all of their crypto infrastructure is rendered useless and insecure by mathematical advances
Black Hat: Elliptical curve cryptography coming as smarter algorithms threaten RSA(NetworkWorld) Rapid advances in math techniques signal the eventual demise of the currently standard crypto systems. Within five years the math for cracking encryption algorithms could become so efficient that it may render today's commonly used RSA public key cryptography algorithm obsolete, Black Hat attendees were told. While it might take longer, the end of RSA as an effective tool is inevitable, says Alex Stamos, CTO of the Artemis division of NCC Group. "It almost certainly will happen before we retire," he told the group attending his briefing on the topic
Big data degrees? Oh puh–lease(FierceBigData) Given that the majority of job openings are in tech related fields in the midst of the slowest economic recovery ever, and also given that big data is the big kahuna in tech, it's natural for job hungry people to lunge for a degree in big data. And wherever there is a hungry lunge, equally hungry universities will be there to net the lungers
The Real Bradley Manning Problem(National Journal) The leaker gets sentenced--and the government still doesn't know how to share intelligence. Now that a military judge has acquitted Pfc. Bradley Manning of aiding the enemy and convicted him of violating the Espionage Act, civil libertarians are breathing a small sigh of relief. But the Obama administration still has a big problem: how to control the flow of information between government agencies so you don't have a system that allows a private stationed in Iraq--or a contractor dating an acrobat in Hawaii--from downloading and distributing secret documents
NSA In The Cross Hairs(USA Today) In a clear signal of slipping political support for the surveillance strategy, President Obama called a meeting Thursday with a group of lawmakers representing both sides of the increasingly divisive debate. They included the NSA's most prominent critics -- Rep. Ron Wyden, D-Ore.; Rep. James Sensenbrenner, R-Wis.; and Sen. Mark Udall, D-Colo.-- and it fiercest supporters -- Sen. Dianne Feinstein, D-Calif., and Rep. Mike Rogers, R-Mich., the respective chairs of the Senate and House intelligence committees
NSA secrets kill our trust(CNN) In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company's blog to deny it. Turns out that wasn't quite true
Snowden Asylum Could Blow Up Nuke Talks(Foreign Policy) It's one of the signature issues of President Obama's second term, and Edward Snowden may have caused it to crack. On Thursday, nuclear arms control advocates shuddered as Washington erupted in rage over Russia's decision to grant temporary asylum to the former NSA contractor. With Republicans in Congress demanding retaliation and White House officials openly casting doubt on a planned Moscow summit, the worry is that Obama's ambitious goal of reducing deployed strategic nuclear weapons by one-third may have just flown out the window
GCHQ plan to spy on "any phone, anywhere, any time"(Computing) British spy agency GCHQ is being paid £100m to spy on behalf of the US secret services, and is developing the capability to spy on "any phone, anywhere, any time". That is the claim arising from the latest set of documents to be released in The Guardian from the US National Security Agency (NSA) whistleblower Edward Snowden
UK Porn Filter Could Also Censor Other Content(Mashable) Last week, UK Prime Minister David Cameron announced that broadband subscribers will be required to declare if they want to maintain access to online pornography. Now, according to several Internet Service Providers (ISPs), the filters may censor even more. According to Open Rights Group, a digital rights organization that spoke with several ISPs scheduled to implement the UK's porn filter, filters can be enabled across a wide range of content, such as file-sharing websites, dating sites and more
The Bugging of South Africa(All Africa) Recent revelations by former National Security Agency (NSA) computer analyst Edwin Snowden that the NSA was undertaking unwarranted mass surveillance of Americans has thrown the communications surveillance activities of governments into sharp relief
CFAA violations key to 2012 Obama victory?(ZDNet) An important tactic of the Obama reelection campaign was likely a violation of Facebook's terms of service, and therefore a violation of federal law. This is yet more evidence that Justice Department interpretations of the Computer Fraud and Abuse Act are unreasonable and need to be curtailed
Litigation, Investigation, and Law Enforcement
In Defense of Leakers: Snowden and Manning(New Yorker) On the day that Edward Snowden finally left Moscow's airport in a taxi to take up Russia's offer of temporary asylum and the sentencing portion of Bradley Manning's trial continued, it is worth restating what should be obvious. Leaking classified information is a crime, and it can be damaging to the national interest; but, in some circumstances, it can also be a patriotic and useful act that helps bring about necessary reforms
The Government Has Made Its Point(New York Times) The first thing to be said about Bradley Manning's trial is that the entire exercise was unnecessary. There was no real factual dispute, since Manning admitted he had leaked the documents to WikiLeaks, and he offered guilty pleas that would have allowed a sentence of up to 20 years
Snowden Wins Asylum, WikiLeaks Declares Victory(Foreign Policy) And just like that, Edward Snowden's Moscow airport vacation is over. On Thursday, the NSA leaker's lawyer put him in a taxi and sent him off to a secret location, ending a 39-day stay in Sheremetyevo Airport's so-called "transit zone." Russian migration authorities granted Snowden a one-year temporary asylum, and Anatoly Kucherena, the Russian lawyer who has been assisting his asylum application, proudly displayed a copy of that document for reporters at the airport
Google Pressure Cookers and Backpacks, Get a Visit from the Feds(Atlantic Wire) Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists. Which prompts the question: How'd the government know what they were Googling
Google 'pressure cooker,' get a police visit? Maybe not.(Washington Post) The FBI denies a Long Island journalist's claims that a local Joint Terrorism Task Force visited her house after she searched the terms "backpack" and "pressure cooker" on Google. Now the question is: Who did? And, perhaps more importantly, did it actually have anything to do with Google
Hidden threat: Dirty data leads to damaging lawsuits(FierceBigData) It should be self-evident by now that dirty data, i.e. incorrect data, is harmful to organizations since it leads to bad business decisions and more than a few "terrible, horrible, no good, very bad" days. It should be self-evident but apparently not
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
International Conference on Cyber Security(New York, New York, USA, August 5 - 8, 2013) The Federal Bureau of Investigation and Fordham University will host the fourth International Conference on Cyber Security (ICCS 2013) on August 5 - 8, 2013 in New York City. ICCS, the White Hat Summit,...
Third Annual SINET™Innovation Summit(New York, New York, USA, August 6, 2013) SINET™, the premiere community builder and innovation catalyst for the Cybersecurity industry hosts their third annual Innovation Summit at Columbia University on August 6th. SINET programs are where the...
SINET Innovation Summit(New York, New York, USA, August 6, 2013) The purpose of the Innovation Summit is to reinvigorate public private partnership efforts and increase relationships between industry, government and academia that fosters sharing of information and collaboration...
3rd Annual Cyber Security Training Forum(Colorado Springs, Colorado, USA, August 6 - 7, 2013) The Information Systems Security Association (ISSA) - Colorado Springs Chapter and FBC, Inc. will once again host the 3rd Annual Cyber Security Training Forum (CSTF). Formerly known as the Cyber Security...
AFCEA Tinker AFB Information Technology & Cyber Security Expo(Oklahoma City, Oklahoma, USA, August 8, 2013) Commercial vendors are invited to Tinker Air Force Base on Thursday, August 8th to exchange information and provide products demonstrations to the military and civilian personnel on base. IT and Information...
AIAA Aviation 2013(Los Angeles, California, USA, August 12 - 14, 2013) Leading cybersecurity experts will speak at AIAA AVIATION 2013, being held August 12-14 at the Hyatt Regency Century Plaza, Los Angeles, Calif. Hosted by the American Institute of Aeronautics and Astronautics,...
Security in Government (SIG) (Canberra, Australia, August 12 - 14, 2013) The 25th annual Security in Government (SIG) conference is to be held from 12-14 August 2013 at the National Convention Centre in Canberra. Assistant Director for the National Security Resilience Policy...
A Cloud Computing Introduction for Managers(Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...
A Cloud Computing Introduction for Manager(Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...
Resilience Week 2013(San Francisco, California, USA, August 13 - 15, 2013) The 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...
Resilience Week 201(San Francisco, California, USA, August 13 - 15, 2013) 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...
Kirtland AFB/Sandia/DOE Cyber Security Seminar & IT Expo(Albuquerque, New Mexico, USA, August 15, 2013) This expo is designed to stimulate exchanges of information between industry partners and Kirtland AFB Information Management Officers', Information Technology personnel, Contracting Officers' as well...
National SCADA Conference(Melbourne, Victoria, Australia, August 15 - 16, 2013) The 12th Annual National SCADA Conference, Australia's largest and longest running SCADA conference, will bring together many of the luminaries of the Australian and International SCADA community to evaluate...
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.