Here's something out of the ordinary: an American patriotic hacktivist promises a cyber riot against Wikileaks' Julian Assange and PRISM-leaker Edward Snowden. US authorities probably won't welcome the support.
Other hacktivism comes from Turkey (directed against China in retaliation for Uyghur repression) and (apparently) Jordan (directed against Egyptian government sites in support of the deposed President Morsi).
Several Android vulnerabilities and exploits appeared late last week. Pinterest continues to draw unwelcome attention from cyber criminals. AppRiver notes a trend in spam—"spam blizzards" used as distractions to conceal more serious cyber campaigns.
BAE complains of Chinese cyber espionage. China itself seems to be suffering a rise in cyber attacks.
Facebook plugs an Android leak. Apple updates QuickTime, and Cryptocat fixes a vulnerability in its group chat. Tomorrow is of course Patch Tuesday, and a critical update to Internet Explorer is expected.
Analysts see big data as a very difficult-to-resist temptation to intelligence services. Indeed, in what's either evidence of a successful US tu quoque defense of PRISM or (more likely) a global spasm of defining deviance down, several countries announce electronic surveillance program expansion (in the UK, Russia, and India) while others suffer their own unwelcome revelations (in France and Germany).
US authorities work toward consensus on electronic collection policy as existing practices continue to draw fire from the political right and left.
Three countries—Venezuela, Nicaragua, and Bolivia—offer Snowden asylum. He's also received a Tweeted marriage proposal from celebrity Russian spy Anna Chapman (of Moscow, formerly of Montclair).
Today's issue includes events affecting Australia, Brazil, China, Egypt, European Union, France, Germany, India, Indonesia, Ireland, Israel, Japan, Jordan, Republic of Korea, Nigeria, Russia, Turkey, United Arab Emirates, United Kingdom, United States..
Results of some notable cyber competitions are in. Congratulations to Jim Kozlowski, Rafael Mation, Ross Kaye, Lloyd Jones and William Deitrick, collectively the winning team at the Cyber Challenge Eastern Regional Summer Cyber Camp. Congratulations also to the winners of Kaspersky Lab's global youth cyber competition: Firman Azhari (Bandung Institute of Technology, Indonesia) took first, Dusan Repel (Plymouth University, UK) placed second, and Iwan Gulenko (Technical University of Munich, Germany) came in third. And Embry-Riddle's alumni team Bytecasters (Michael Kouremetis and Maxwell DeWeesg) wins NIKSUN's Cyber Security Tournament.
Cyber Attacks, Threats, and Vulnerabilities
Snowden and Assange Targeted by Pro-US Hacker "The Jester"(Hack Read) A self-proclaimed patriot and shadowy hacker has recently launched several cyber-attacks against Ecuador and has also made the statement that such attacks will be conducted against any nation whosoever seeks of granting asylum to Edward Snowden who is the former contractor of National Security Agency. th3J35t3r" (the Jester) is what the hacker calls himself and has also identified himself as being a former solider. He has also gone on to target Julian Assange. The founder of Wikileaks is helping Snowden out in finding a secure heaven
8 Egyptian Ministry Websites Hacked by Anonymous Jordan(Hack Read) An Anonymous hacker going with the handle of Anonymous Jordan has hacked and defaced eight (8) Egyptian Ministry websites against the taking down of Muslim Brotherhood's government few days ago. The targeted websites belong to different high profile government ministries and departments, such as the website of Ministry of Electricity & Energy
Irishman Hacks Nigeria Govt Website, Gives FG 72 Hours To Renounce Anti-Gay Bill(Africzone.com) Exasperated by the way Nigeria handles the homosexuality matter, an Irish hacker — who goes by the monicker Paddyhack – has conducted a cyber attack on the official government of Nigeria's website. The 'assault' is apparently aimed at making President Jonathan to veto the bill according to which all homosexuals in Nigeria are subject to imprisonment. The website was attacked on Thursday night; though things were later restored, it remains unknown if it were the officials that took matters in their hands, or the attackers stepped back
System Doctor 2014: A fake AV for the upcoming year(Help Net Security) In an effort to keep one step ahead of security solutions and attentive users, peddlers of fake AV solutions often change the name of the malware they are trying to sell. Researchers from Microsoft
Large Pony botnet controller discovered(Help Net Security) Every once in a while we get to peek into the lion's den, this time we'll be checking out a fairly large instance of the Pony botnet controller, containing a large amount of stolen credentials and
FAA registry of pilots' data at risk of data breach(FierceGovIT) Personally identifiable information kept within the Federal Aviation Administration's Civil Aviation Registry is at risk for breach, says the Transportation Department office of inspector general
2.5 million Californians had personal info compromised(Help Net Security) Attorney General Kamala D. Harris released the first report detailing the 131 data breaches reported to her office in 2012, showing that 2.5 million Californians had personal information put at risk
The 'cyber-attack' threat to London's Olympic ceremony(BBC News) Fears that the 2012 London Olympics opening ceremony might have come under cyber-attack have been detailed by officials for the first time. The concern was that the lights could have been turned off during the ceremony. The threat did not materialise
Security Patches, Mitigations, and Software Updates
Internet Explorer pegged for critical fix on Tuesday(CSO) Microsoft's monthly patch release for July covers six remote-code execution vulnerabilities. Microsoft's monthly patch release for July will cover seven security issues, six of which could be remotely exploited by an attacker. The company publishes an advisory in advance of its patch date, which is the second Tuesday of the month, so administrators knows what products will be affected. It does not describe the vulnerabilities, however, until the security fixes are released
Apple Updates QuickTime for OS X Security(InternetNews.com) Apple is pushing out its Security Update 2013-003 to users, fixing a trio of vulnerabilities that affect Apple's QuickTime media player. What's even more surprising is that the vulnerabilities were all reported to Apple via HP's Zero Day Initiative
Critical Cryptocat group chat bug fixed(Help Net Security) A critical security vulnerability in Cryptocat versions older than 2.0.42 has been patched and developers are urging users to update to the latest available version of the encrypted online chatting
Cyber strikes(The News International) The fact remains, though, that in the event of a sustained cyber attack on business, security forces and agencies, the armed forces or the various arms of governance all of which rely heavily on the internet, they would be almost defenceless
An Addendum from Nathan Myhrvold on Cyber(Lawfare) In the days since Ben posted my paper, I've been asked a fair bit why my treatment of strategic terrorism does not mention cyber terrorism, or other forms of cyber-attack. It's a fair question, to which there are several answers: First, the world seems
Big Data turning US into Big Brother?(Stuff.co.nz) The revelations that the National Security Agency is perusing millions of US customer phone records at Verizon Communications and snooping on the digital communications stored by nine major internet services illustrate how aggressively personal data is
GCC prone to cyber attack, say IT experts(Arab News) Over 65 percent of technology experts in the Gulf Cooperation Council states believe that the region is a fertile land for cyber attack. A recent survey, conducted by a computer giant, has revealed that 35 percent of the cyber crimes occur because of
"Critical entities not prepared for cyber war"(Globes) Scores of water companies, hundreds of food and basic goods factories, pharmaceuticals manufacturers and distributors, and important financial institutions must take major steps to protect their computer systems against cyber attacks, Institute for National Security Studies (INSS) cyber warfare program director Dr. Gabi Siboni told "Globes"
Facing up to the cyber-espionage battle ahead(Public Service Europe) Cyber-attacks are now viewed as the number one threat to our security and we are only just beginning to realise how vulnerable we are in this digitalised world. This week, Britain's intelligence agencies - MI5 and Government Communication Headquarters - warned that the country is under daily cyber-espionage attack, with approximately 70 sophisticated operations identified every month. Often backed by foreign intelligence services, these attacks are reported by Sir Iain Lobban - director of GCHQ - as happening on an 'industrial scale' and focused on the theft of intellectual property from organisations; for the financial benefit and competitive advantage of state-owned organisations
Preparing for cyberwarfare(Japan Times) The realm of conflict between states that could lead to war has expanded in recent years. The United States and other major military powers are gearing up to defend themselves from attack in cyberspace, just as they have done in the past from land, sea, air and outer space attack. The U.S. has identified, but not yet named, more than 20 nations that now have military units dedicated to employing cyber technology in war. The roll call certainly includes China and Russia, as well as the U.S. itself
Cyber espionage moves out of the shadows(Help Net Security) During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, the United States was the
Economic espionage threat to security(Pacific Daily News) Further, the report concluded from Mandiant the breaches can be linked to the People's Liberation Army's Unit 61398. The accusations and supporting evidence increased pressure on the United States to take more action against the Chinese for what
Bitcoin trust inspires a funny look at ETFs(FierceFinance) For the Winklevoss twins, the rise of Mark Zuckerberg has been a blessing and curse. On the one hand, the twins blame him for stealing the idea that went on to become Facebook. On the other hand, they have rocketed to fame and fortune thanks to the success of their nemesis. The Social Network made them icons
NSA recruitment drive goes horribly wrong(The Guardian) Staff from the National Security Agency got more than they bargained for when they attempted to recruit students to their organisation earlier this week
Hacking competitions seek cybersecurity superstars(BBC News) Private contractors and government agencies like the Federal Bureau of Investigation and Department of Homeland Security use the cyber camp to scout for that talent. A student with the right skills can pretty much pick and choose a career. "Personally
Top defence and telecom firms join UK cyber security war(Telegraph.co.uk) BAE Systems, Rolls-Royce, BT Group, Lockheed Martin and Hewlett Packard are among companies that will team up with government to share information on tackling cyber threats, the Ministry of Defence said on Friday. Britain made cyber security one of its
BT, Verizon call for shared cyber threat intelligence(Total Telecom) BT and Verizon on Wednesday called on telcos and enterprises to be more forthcoming with information about the cyber attacks they have suffered, as security threats become more frequent and high profile. Speaking at Total Telecom's Network Management
ManTech to Run DOJ IT Services Desk(GovConWire) ManTech International (NASDAQ: MANT) has won a potential $16 million contract to operate an information technology services desk and provide IT services for the Justice Department
Digital Management snags $16M Pentagon MDM contract(FierceMobileIT) Digital Management will provide a mobile device management system and mobile application store for the Pentagon, under a contract awarded by the Defense Information Systems Agency that is worth up to $16 million over three years
ISS backs Dell founder's offer(USA TODAY) A top proxy advisory firm is recommending that Dell shareholders vote in favor of a deal that would allow the company's founder and an investment firm to buy the computer maker and take it private
Dell battle turns on proxy advisor recommendation(FierceFinance) There has been a lot of talk as of late about how the main proxy advisory services have lost their clout, a victim of conflicts of interests in at least one case. But when it comes to the Dell leveraged buyout drama, Institutional Shareholders Services (ISS), the most controversial of the proxy advisors, has moved center stage
See your metadata the way the NSA does(Boston Globe) Wondering what kind of information the National Security Agency can glean from your metadata? Try it on yourself: A new project from MIT's Media Lab maps out your social networks by tapping into your e-mail metadata — similar to what the NSA does
Ultra Electronics to launch EnergyGuard in Mideast(Trade Arabia) London-based Ultra Electronics is set to launch its new generation Scada protection solution, EnergyGuard at a cyber security forum to take place in Abu Dhabi in October. "EnergyGuard is designed to protect…Developed by Ultra's 3eTI business, the
Iran Domestic Email Service Online(Cyberwarzone) Iran Information and Communication Technology Minister Mohammad Hasan Nami said in an interview with state TV that Iran has opened its own domestically made national email service
Bitdefender's Wildly Different Antivirus Tools Both Shine(PC Magazine) Security products tend toward a certain sameness in their user interface. The background may be slate grey, white, blue, black, green, yellow, or polka-dot, sure. But whatever the color, the main window will probably display a green, yellow, or red
Security-Enhanced Android: NSA Edition(Businessweek) Tech giants listed as part of the National Security Agency's Prism spying program have gone to some lengths to convince the world they aren't in bed with the U.S. government. Google (GOOG) has filed a request with the U.S. Foreign Intelligence
NETGEAR introduces R6100 WiFi router(Help Net Security) NETGEAR is expanding its family of 802.11ac wireless products with the R6100 WiFi Router. The R6100 is a dual band router that supports combined WiFi speeds up to 1200 Mbps with Fast Ethernet wired
Is Metadata the Magic in Modern Network Security?(Internet Storm Center) Today's security tools used to analyze or detect suspicious activity, collect metadata which is usually refers to data about data to describe the how, when, where and who was involved. Metadata is a way of organizing, gluing together and discovering information that otherwise would be very difficult to manage, analyze and produce insightful reports
Branch office security in the spotlight(Naked Security) The ideal solution for branch offices is some kind of VPN, or virtual private network. But setting up a VPN in the first place creates something of a paradox: how do you securely set up a branch office connection without a secure connection over which to set it up
Geeks have a solution to digital surveillance in India: Cryptography(DNA) While you were thinking of what to post on Twitter, the government has stealthily put an ambitious surveillance programme in place that tracks your every move in the digital world — through voice calls, SMS, MMS, GPRS, fax communications on landlines, video calls and emails. The programme, conceived in 2011, has now been brought under one umbrella referred to as the centralised monitoring system (CMS)
How to cloud compute securely(WhaTech) Much of the advice available on cloud security comes from the Cloud Security Alliance (CSA), a not-for-profit organisation with a mission to promote the use of best practices for providing security assurance within cloud computing. It also aims to
Combat cyber crime with least privilege methodology(Boston.com) This was the case with South Carolina's Department of Revenue, where an employee unknowingly clicked an email link and opened the government agency to a large-scale cyber-attack, costing the state $14 million and compromised the personal and
Can agencies team up in responding to cyber attacks?(GCN) The National Institute of Standards and Technology is planning guidance on how agencies can better cooperate and respond to cybersecurity incidents. "Unfortunately, modern computing systems frequently are exposed to various forms of cyber attack," NIST
Flash FPGAs Incorporate Differential Power Analysis Countermeasures(Electronic Design) DPA support was licensed from Cryptography Research, a division of Rambus. DPA support applies to the chip as a whole, not just a memory or cryptography/security subsystem. This means a powered chip will always be radiating power in a random fashion
Quantum information: Killer apps(New Scientist) In October 2007, a quantum cryptography system developed by Nicolas Gisin and his colleagues at the University of Geneva in Switzerland was used to transmit votes securely between the city's central polling station and the counting office during the
Have you ever wondered how cyber crimes are plotted?(Hack Read) Derby University of mathematics and computing is helping the world to fight from cyber crime in most unusual way. Have you ever wondered how cyber crimes are plotted? Well, you might think of it in a simple way of how a robbery is conducted i.e. on some paper or by discussion with some more robbers. But, it's not true most of the cyber crimes are plotted through games
Embry-Riddle Team Wins NIKSUN Cybersecurity Competition(Newsday) The tournament tasked two-person teams with using the IT skills they learned in college to solve four real-world cybersecurity challenges as quickly as possible by analyzing recorded Internet traffic. A team of two recent graduates from Embry-Riddle Aeronautical University's Daytona Beach Campus, called Team ByteCasters, recently won the first-ever NIKSUN Cybersecurity Tournament
Winners of Kaspersky's global cybersecurity competition announced(Infosecurity Magazine) The finals of Kaspersky Lab's global youth competition, Cyber Security for the Next Generation (CSNG) 2013, were held at Royal Holloway, University of London last week – and the winners have been announced. Overall winner was Firman Azhari from the Bandung Institute of Technology, Indonesia. Second was Dusan Repel from the of Plymouth University, UK. And third was Iwan Gulenko from the Technical University of Munich, Germany
U.S. Cyber Challenge and Virginia Tech Hosted Successful Cyber Security Competition(PRNewswire) Virginia Tech, in partnership with U.S. Cyber Challenge, hosted the U.S. Cyber Challenge Eastern Regional Summer Cyber Camp in Roanoke, Virginia. The Summer Cyber Camp was conducted June 24-28, 2013, and included four days of instruction by SANS instructors, a career fair, an Executive Roundtable and a cyber competition. The team consisting of Jim Kozlowski, Rafael Mation, Ross Kaye, Lloyd Jones and William Deitrick emerged as the winner of the competition
Legislation, Policy, and Regulation
Information era causing problems for US intelligence agencies(NorthJersey.com) Nowadays, an intelligence analyst works directly for Booz Allen Hamilton, not for the government. Snowdon's case is an example of the laxity of the vetting process. Now the intelligence community is faced with the overwhelming job of damage control
Pentagon 'Psy-Ops' Missions Hit Home (Washington Post) Given the global nature of online communications, the Pentagon's information operations are perhaps inevitably becoming entangled on the home front. At a time of intense focus on the targeting of Americans' communications by the National Security Agency, Warsame's case also illustrates how other parts of the U.S. government monitor the material that some Americans post online
National view: We can handle the truth on NSA spying(Budgeteer) I don't believe government officials when they say the National Security Agency's surveillance programs do not invade our privacy. The record suggests that you shouldn't believe them, either. It pains me to sound like some Rand Paul acolyte
Tools For Treason(TechCrunch) If we are to start again on the Internet with knowledge of prying eyes that turn the law to their own purposes, our founding principle cannot be the establishment of trust, but rather the impossibility of trust. The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? Tools for treason are the only tools that will suffice from now on
NSA leaks unite left and right on privacy protection(Salt Lake Tribune) Disclosures about the National Security Agency's operations of late have helped forge new bonds on Capitol Hill, proving that while Congress is deeply divided along partisan lines, there are those issues that can bridge the gap. Take Rep. Jason Chaffetz
Here's who spent their Fourth of July protesting the NSA(Washington Post) Hundreds of protesters gathered in Washington's McPherson Square Thursday, the Fourth of July, for a rally against the National Security Agency's secretive domestic surveillance programs. The event was part of a nationwide "Restore the Fourth" campaign
I Spy an Excuse(Wall Street Journal) If recent press claims are true, the National Security Agency (NSA) has found the number—and is listening very carefully. Reactions from Europe's national governments to alleged U.S. spying have so far been stern, yet cautious: French President
American espionage and Europe(The Economist) Material leaked to Germany's Der Spiegel and Britain's Guardian by Edward Snowden, a former contractor at the National Security Agency, says its programmes "can and often do target the signals" of around 30 "third-party" states, with which America has
European Parliament condemned US intelligence activities(ArmenPress) The European Parliament called on Thursday for the scrapping of two agreements granting the United States access to European financial and travel data unless Washington reveals the extent of its electronic spying operations in Europe
Spying allegations could delay U.S.-E.U. trade talks(Washington Post) The economic fallout over accusations of U.S. spying on European diplomats widened on Wednesday, with France's government saying it wanted to delay the start of major U.S.-E.U. trade talks and a German minister suggesting that citizens there stop patronizing American Internet companies such as Google and Facebook if they are concerned about their privacy
Snowden's revelations highlight the moral decline of America(Financial Times) It is widely believed that the revelations by Edward Snowden, the former National Security Agency contractor, have dented US moral hegemony. America will no longer be able to criticise states that subordinate civil liberties to reasons of state
Surprise: France Spies on Its Citizens, Too(Slate) The NSA's once-secret surveillance program unsurprisingly has company in Europe. French newspaper Le Monde reported yesterday that France has a secret electronic surveillance apparatus that relies on many of the same tactics as the American programs
Révélations sur le Big Brother français(Le Monde) Si les révélations sur le programme d'espionnage américain Prism ont provoqué un concert d'indignation en Europe, la France, elle, n'a que faiblement protesté. Pour deux excellentes raisons : Paris était déjà au courant. Et fait la même chose
Snowden reveals Australia's links to US spy web(Sydney Morning Herald) Classified US National Security Agency maps leaked by Mr Snowden and published by US journalist Glenn Greenwald in the Brazilian O Globo newspaper reveal the locations of dozens of US and allied signals intelligence collection sites that contribute to
Brazil Target Of US Spying, Globo Newspaper Reports(Huffington Post) The U.S. National Security Agency monitored the telephone and email activity of Brazilian companies and individuals in the past decade as part of U.S. espionage activities, the Globo newspaper reported on Sunday
Snowden, surveillance and snooping in India: FAQs(Business Standard) An internal code-name for a top-secret surveillance programme run by the US National Security Agency, with real-time access to user data (from Google, Facebook and seven others) instead of requiring ad-hoc wiretap requests or court orders for
Russian Army to create Cyber Command(Pravda) Before the end of 2013, a separate branch of service is to be created in the Russian army. The new department will deal with the struggle against cyber threats, sources at Russia's Defense Ministry said. The plans to create the Cyber Command were
China, US To Discuss Cyber Security At Forum(Yahoo.com) China's government says it is ready to discuss strengthening cybersecurity at a high-level forum with U.S. officials next week and wants Washington to help settle territorial disputes in East Asia
DoD looks to quarantine employees from leaked documents(FierceGovIT) Classified information, even if it's already in the public domain, remains classified until it's been declassified by a government authority, said the Defense Department's Director of Security Timothy Davis, in a June 7 memo to DoD security directors
EU adopts stricter penalties for cyber criminals(Help Net Security) Cyber criminals will face tougher penalties in the EU, under new rules adopted by Parliament on Thursday. The draft directive, already informally agreed with member states, also aims to facilitate
Gov't to reinforce cyber security manpower(Global Post) The government said Thursday that it plans to train 5,000 experts by 2017 and boost cooperation among related government agencies to better cope with rising cyber security concerns
The Future of US Cyber Command(The National Interest Online) For months it has been an entertaining parlor game in the nation's capital: guessing what will happen next with U.S. Cyber Command, the military organization designed to defend the country's networks and attack its adversaries. The topic will
Dempsey: Spy Has Harmed Relations(Philadelphia Inquirer) The Joint Chiefs of Staff chairman says NSA leaker Edward Snowden's disclosures about U.S. surveillance programs have undermined U.S. relationships with other countries and affected what he calls "the importance of trust."
Snowden made the right call when he fled the U.S.(Washington Post) Many people compare Edward Snowden to me unfavorably for leaving the country and seeking asylum, rather than facing trial as I did. I don't agree. The country I stayed in was a different America, a long time ago
Privacy Group to Ask Supreme Court to Stop N.S.A.'s Phone Spying Program(New York Times) A privacy rights group plans to file an emergency petition with the Supreme Court on Monday asking it to stop the National Security Agency's domestic surveillance program that collects the telephone records of millions of Americans. The group, the Electronic Privacy Information Center, says it is taking the extraordinary legal step of going directly to the Supreme Court because the sweeping collection of the phone records of American citizens has created "exceptional circumstances" that only the nation's highest court can address
Venezuela, Bolivia offer asylum to Edward Snowden(CSO) Nicaragua has also indicated that it may offer asylum. The presidents of Venezuela and Bolivia have offered to give asylum to Edward Snowden, the former contractor of the National Security Agency who leaked documents about the agency's surveillance programs
Why Won't Anyone Take Edward Snowden?(Slate) Because he is a terrible candidate for asylum. Poor Edward Snowden! He's willing to live nearly anywhere, but no country is willing to accept him. Not Ecuador. Not China, Russia, Norway, or Spain. Why not? Because he is a terrible candidate for asylum
NSA leaks raise concerns on background checks(Ocala) Before Edward Snowden began leaking national security secrets, he twice cleared the hurdle of the federal government's background check system. The first was at the CIA, and the second was as a contract technician at the National Security Agency
Deals with foreign cable owners, secret court rulings broaden NSA spying potential(Ars Technica) Leaked documents and other sources show some of the structure behind surveillance. New information this weekend gave a glimpse into the efforts made by the US to establish a broad network of surveillance around the world. Some of the efforts involve using a proxy telecommunications company to manage the information gathered by local telecom companies in foreign countries, creating internal corporate cells with access to foreign-owned fiber optic cables, and using unchallenged rulings from Foreign Intelligence Surveillance Courts (FISC) to broaden the NSA's power
In Secret, Court Vastly Broadens Powers of NSA(New York Times) Last month, a former National Security Agency contractor, Edward J. Snowden, leaked a classified order from the FISA court, which authorized the collection of all phone-tracing data from Verizon business customers. But the court's still-secret
Wiretaps up 24 percent in 2012(FierceGovIT) The number of federal- and state-court authorized wiretaps during calendar year 2012 increased by 24 percent from 2011, newly released court data shows. In an annual report from the Administrative Office of the U.S. Courts, federal, state and territorial jurisdictions report having authorized 3,395 wiretaps last year--87 percent of the time, in cases where illegal drugs was the most serious offense under investigation
Manning defense to present case(Independent Online) Court-martial prosecutors have spent the last five weeks in a courtroom at Fort Meade, Maryland - home of the ultra-secret National Security Agency - building their case that Manning committed espionage in leaking more than 700 000 classified files
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Digital Forensics and Incident Response Summit(Austin, Texas, USA, July 9 - 10, 2013) The 6th annual Forensics and Incident Response Summit will again be held in the live musical capital of the world, Austin, Texas. The Summit will focus on high quality and extremely relevant content as...
London Summer 2013(London, England, UK, July 9 - 16, 2013) SANS London Summer takes place at the London Marriott Hotel Kensington and gives security professionals the opportunity to take one of four of SANS most popular 6-day courses and the 2-day "Securing The...
3rd Cybersecurity Framework for Critical Infrastructure Workshop(San Diego, California, USA, July 10 - 12, 2013) NIST is inviting cybersecurity experts, industry and academia from across the nation to attend one of its regional workshops at UC San Diego to identify, refine and guide the many interrelated considerations,...
cybergamut Technical Tuesday: Remote Digital Forensics(Columbia, Maryland, USA, July 16, 2013) 'The remote control changed our lives. The remote control took over the timing of the world. Within three seconds, click, click, click. So can we do remote forensics?' Ken Zatyko of Assured Information...
Remote Digital Forensics(Columbia, Maryland, Sioux Falls, July 16, 2013) Incident response, packaging, and mailing is a lengthy process averaging many days to get media into a forensics examiner workstation in Maryland. The current process primarily uses stand alone workstations.
Mobility Solutions for the Federal Market(Falls Church, Virginia, USA, July 16, 2013) With the improvements in mobile technology, smart phones and tablets, DOD, DHS and Civilian agencies have an opportunity to improve their service delivery models and the programs that serve their constituents.
2013 World Comp(Las Vegas, Nevada, USA, July 22 - 23, 2013) 2200 leading researchers, academics, and executives from government, academia and industry will come together at this annual event which facilitates communication among researchers in different fields...
EAGB Summer Quarterly Webinar(Webinar, July 24, 2013) Join us Wednesday, July 24 from 10:00-11:00 AM as Patrick Dougherty discusses the EAGB's two newest reports: the Summer 2013 Quarterly Regional Economic Update and Cyber Security in Greater Baltimore:...
Black Hat 2013(Las Vegas, Nevada, USA, July 27 - August 1, 2013) Black Hat USA is a major international security conference, featuring learning, networking, and skill-building. Sessions include training, briefings, technical presentations, and more.
SECRYPT 2013(Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...
AFCEA Global Intelligence Forum(Washington, DC, USA, July 30 - 31, 2013) During this day and one half unclassified conference in the National Press Club in downtown Washington, D.C., leaders from across the government, military, and industry will explore the role that the Intelligence...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.