skip navigation

More signal. Less noise.

Daily briefing.

Israeli PM Netanyahu's official Twitter account briefly followed some Iranian porn sites over the weekend. While good for laughs in Tehran (and Tel Aviv) the episode means little: Twitter follows are indiscriminate; they come and go quickly.

The Dutch government states that, unlike Belgium's, the Netherlands' telecom networks haven't been attacked by foreign intelligence services.

Eid al-Adha occasions some anti-Muslim cyber-rioting in Russia.

The cyber black market sees more use of Bitcoins in payment for criminal services. Trend Micro releases more information on vulnerabilities in vessel tracking systems. While so far confined to ship-tracking, consider this a warning for civil aviation and other transportation modalities as well.

Interesting post-mortems on recent exploits: ZeroAccess, Internet-of-things attacks, KDMS's hack of Metasploit, and the recent Adobe compromise.

New forms of ATM malware are active in Mexico. South Africa's large bankcard breach is traced to criminal work against fast-food outlets. Brazil grapples with social-network organized unrest.

Oracle's quarterly patches are out. D-Link takes steps toward closing vulnerabilities in its routers.

Indonesia has, for now, eclipsed China as the world leader in attack traffic. Akamai finds other significant shifts in malicious traffic, both geographically and at the TCP-port level. In Australia, increased user security awareness apparently pays off—the average cost of a cyber crime drops.

Quantum computing (driven by big data and scientific computing needs) and quantum cryptography (driven by business privacy needs) move closer to the market.

In Senate testimony, NSA Director Alexander corrects (downward) his earlier claims of surveillance success against terror.


Today's issue includes events affecting Angola, Australia, Belgium, Brazil, Canada, China, European Union, Indonesia, Iran, Iraq, Germany, Republic of Korea, Malaysia, Mexico, Netherlands, Romania, Russia, Singapore, South Africa, Taiwan, Turkey, United Kingdom, United States, and Vietnam..

Cyber Attacks, Threats, and Vulnerabilities

Israeli PM's Twitter account caught following Iranian porn Twitter account (HackRead) The official Twitter account of Israeli Prime Minister Benjamin Netanyahu was found following an Iranian porn Twitter account before unsubscribing Sunday morning, about seven hours after The Times of Israel broke the story. On sunday morning, the verified Twitter account of Israeli prime minister @Netanyahu started following around 90 Twitter accounts, mostly belonging to Israeli government and its embassies

No evidence that NSA hacked Dutch telcos, say MPs (ZDNet) Three Dutch ministers have published an open letter stating that, unlike Belgium's incumbent telco, KPN hasn't been targeted by foreign intelligence services. Unlike neighbouring Belgium, the Netherlands' networks haven't received the unwanted attentions of foreign intelligence services, the government has confirmed

Islamic Websites Hacked In Russia (Radio Free Europe/Radio Liberty) The Council of Russian Muftis says its websites have been attacked by hackers just as Muslims around the world celebrate the Eid al-Adha holiday, which marks the end of the hajj

Yet another Bitcoin accepting E–shop offering access to thousands of hacked PCs spotted in the wild (Webroot Threat Blog) The never-ending supply of access to compromised/hacked PCs — the direct result of the general availability of DIY/cracked/leaked malware/botnet generating tools — continues to grow in terms of the number and variety of such type of underground market propositions. With more cybercriminals entering this lucrative market segment, on their way to apply well proven and efficient monetization schemes to these hacked PCs, cybercrime-friendly affiliate networks naturally capitalize on the momentum, ensuring a win-win business process for the participants and the actual owners of the network. In this post, I'll highlight yet another newly launched such E-shop, currently possessing access to

Vulnerabilities Discovered in Global Vessel Tracking Systems (TrendLabs Security Intelligence Blog) Trend Micro researchers have discovered that flaws in the AIS vessel tracking system can allow attackers to hijack communications of existing vessels, create fake vessels, trigger false SOS or collision alerts and even permanently disable AIS tracking on any vessel

Lessons learned from sinkholing the ZeroAccess botnet (Help Net Security) ZeroAccess (or Sirefef) is a piece of malware that is very adept at hiding its existence from users, and brings in huge sums of money to its masters by performing click-fraud and Bitcoin mining

Hackers take control of Internet appliances (Daily Record) The plundering of the Internet of Things has commenced. From a command center in a non-descript high-rise here in the heart of Silicon Valley, security start-up Norse has been gathering shocking evidence of hackers usurping control of Internet-connected appliances, everything from web cams to climate-control systems

Security vendor admits mistake in website take down (ComputerWorld) Rapid7 has acknowledged that it waited too long to take the security actions needed to prevent a pro-Palestine hacking group from taking down two of its websites by sending a fax to the sites' registrar. The group, called KDMS, sent the phony fax Friday to, requesting a change to the IP addresses associated with the URLs of Rapid7 and Metasploit. As a result, visitors to the sites' homepages were redirected to a politically charged message

Black Bloc Rising: Social Networks in Brazil (SecDevFoundation) Brazil was convulsed by massive digitally-enabled protests between June and August 2013. While largely peaceful, a militant anarchist group emerged during this period – the Black Bloc – which seized the public imagination. Although preoccupying media and policy makers, comparatively little is known about what Black Bloc is, where it comes from, or how it operates. This latest publication from the Open Empowerment Initiative considers the presence of Black Bloc in cyberspace. It focuses specifically on Facebook, the dominant social media platform used by more than 80 percent of Brazilian internet users

Analysis of a Malware ROP Chain (Open Security Research) Back in February an Adobe Reader zero-day was found being actively exploited in the wild. You may have seen an analysis of the malware in a number of places. I recently came across a variant of this malware and figured it would be nice to provide a little more information on the ROP chain contained within the exploit

Adobe Source Code Theft Unlikely To Cause Spike In Exploits (Dark Reading) Access to the firm's code for Acrobat, ColdFusion, and Publisher products will make flaws easer to find, but experts disagree whether exploitation will also be easier

Fraudware virus targeting Android users in China and South East Asia (Help Net Security) NQ Mobile has identified, "Copycat App," a new fraudware virus threat targeting Android users in China and several countries in South East Asia

Mass security breach of fast food payment systems in SA (My Broadband) Numerous fast food payment systems in South Africa fell prey to a malware infection which stole credit and debit card information of customers

ATM Malware: Sign of New Trend? (BankInfoSecurity) A group of ATMs in Mexico was recently targeted by a new malware strain known as Ploutus as part of an attack that allowed hackers to remotely manipulate the cash denominations the ATMs dispensed

Security experts recommend safeguards with Chrome personal data store (InfoWorld) Browser stores data, such as credit card numbers, in plaintext in Web history on local storage. Google Chrome users should take extra precautions when using the browser to type personal data, such as credit card numbers, into website forms, experts say

EasyJet website crashes and burns (Register) Barrel-scraping orange airline easyJet is apologising to staff over a "technical" error that has brought down its website worldwide, preventing punters from booking flights or checking in. The site has been down for several hours with the firm taking to Twitter to 'fess up to the unspecified gremlins affecting the systems "both on web and mobile"

Cyber attack briefly takes down 'Las Vegas Sun' website (Fox 5 KVVU-TV) An attack in cyberspace took down the website of the Las Vegas Sun on Tuesday morning. The southern Nevada newspaper first reported trouble with its website about 9 a.m. in a tweet and post on its Facebook page

Security Patches, Mitigations, and Software Updates

Oracle releases 127 security fixes, 51 for Java alone (Naked Security) Oracle has released its quarterly software update fixing more than 100 security vulnerabilities in its products. Java is at risk from more than 50 flaws, so it is time to update immediately if you still use it

D–Link begins fixing router backdoor (ComputerWeekly) Networking equipment company D-Link has begun releasing security patches to close the backdoor discovered on some of its routers. This come after researcher Craig Heffner of Tactical Network Solutions found a simple hack that would allow some D-Link routers to be breached, bypassing the authentication process

Kaspersky 2014 gets 'Patch B' release, essential for forthcoming Windows 8.1 (Beta News) Kaspersky has released updated installer versions of Kaspersky Internet Security 2014 and Kaspersky Anti-Virus 2014. Both updates include the recently rolled out "Patch B", which adds support for Windows 8.1 and Firefox 23/24

Cyber Trends

New Report Says Cyberthreats Multiplying Like Tribbles (IEEE Spectrum) Hackers have proven time and time again that they'll eventually find a way to defeat any single digital security method. Their motivation to do so is evident in the fact that, on average, more than 150 000 new, unique malware strains are unleashed each day. That's one of the startling conclusions drawn by analysts from the Aite Group in the report "Cyberthreats: Multiplying Like Tribbles" that was released earlier this week

A Q&A with Charlie Miller, Computer Security Researcher at Twitter (InfoSecurity Magazine) At the recent Hacker Halted conference in Atlanta, Infosecurity Editor Eleanor Dallaway, spoke to Twitter's computer security researcher, Charlie Miller, also known for his public hacks on Apple products and his tenure at the NSA. They talked about mobile threats, car hacking and the evolution of the information security industry's mindset

Indonesia Passes China to Become Top Source of Cyber–Attack Traffic (Bloomberg) The unexpected surge in cyber-attacks coming from Indonesia earlier this year wasn't a fluke. The country has overtaken China to become the No. 1 source of attack traffic in the world, according to a report by Akamai Technologies to be published later today

How Edward Snowden is nudging our privacy desires (USA Today) Here's some fresh empirical evidence that the continuing series of revelations leaking from the Edward Snowden documents may yet nudge the privacy pendulum back to where it was, pre-Facebook

Cost of cyber attack in Australia drops (Sky News) The average cost of a cyber attack in Australia has dropped by $100 over the past 12 months. The average victim now loses $200, down from an average of $300 just 12 months ago, according to the annual Norton cyber crime report from security firm Symantec

Akamai: Malicious Internet traffic shifting borders (ZDNet) The latest report from Akamai on the state of the Internet shows that attack traffic is shifting geographically and at the TCP port level. Akamai's State of the Internet report for the second quarter of 2013 is out. It shows changes in the sources and methods of attacks worldwide on the Internet. Akamai, as the dominant content distribution network (CDN), is one of a small number of companies with a network presence throughout the world, close both to end users and major providers

Project 2020 (International Cyber Security Protection Alliance) Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building. The scenarios in this document are not predictions of a single future

Cyber criminals steal $1 billion according to Symantec's annual Norton Report (The Daily Telegraph) Symantec's annual Norton Report shows the cost of cyber crime in Australia plunged from $1.65bn last year to just over $1bn this year, as criminals skimmed

Era of Big Discrimination invisible to consumers and regulators (FierceBigData) Microsoft principal researcher Kate Crawford warned: "Personal data harvested by marketers is growing so vast and far reaching that it is threatening to unleash a new wave of digital discrimination, one that ordinary people won't even be able to see happening," according to an article in Yahoo! Finance

63 Percent of U.S. Adults Don't Know What Financial Data Is On Their Smartphones (eSecurity Planet) Still, according to a recent survey, more than half don't lock their mobile device with a PIN. A recent Zogby poll of more than 1,000 adults found that 63 percent of people don't have a clear sense of what financial information is stored on their smartphones, and nearly 70 percent believe that storing payment information on their smartphone is unsafe

UK businesses call for support to close virtual security skills gap (ComputerWeekly) A quarter of UK organisations do not have the knowledge to manage virtual security deployments, a study has revealed. More than half say this is due to a lack of training or funds available to train, according to the study by security firm Trend Micro in collaboration with Vanson Bourne


Cyber warrior shortage hits anti–hacker fightback (Economic Times) For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back. Hostile computer activity from spies, saboteurs, competitors and criminals has spawned a growing industry of corporate defenders who can attract the best talent from government cyber units

FireEye Coverage Initiated at Bank of America Corp. (FEYE) (WKRB) Analysts at Bank of America Corp. assumed coverage on shares of FireEye (NASDAQ:FEYE) in a research report issued to clients and investors on Tuesday, AR Network reports. The firm set a "buy" rating and a $50.00 price target on the stock. Bank of America Corp.'s target price would suggest a potential upside of 20.34% from the stock's previous close

NASDAQ OMX Leverages FireEye Threat Prevention Platform To Strengthen Defense Against Cyber Attack (MarketWatch) FireEye Inc. FEYE -1.66% , the leader in stopping today's new breed of cyber attacks, and NASDAQ, the inventor of the electronic exchange, today announced that NASDAQ OMX NDAQ -0.99% , the world's largest exchange company, will leverage the FireEye(R) Threat Prevention Platform to boost defenses against cyber attacks on its exchanges. The FireEye Multi-Vector Virtual Execution(TM) (MVX) engine will also be tapped to strengthen security against Web, email, and file attacks

LogRhythm Snags Channel VP From Kaspersky (TechRockies) Boulder-based cyber security software developer LogRhythm has bolstered its channel sales efforts today, with the hiring of a new VP. According to the company, it has hired Nancy Reynolds as its new Vice President of America Channels. Reynolds joins the company from Kaspersky Lab, where she was Senior Vice President of Corporate Sales, North America

CommVault, EMC, Symantec lead European data protection and recovery software market, says IDC (FierceGovIT) CommVault Systems, EMC and Symantec (NASDAQ: SYMC) are the top vendors in the data protection and recovery software market in Europe, according to IDC's latest MarketScape study

Federal IT spending to plateau for next 5 years, says TechAmerica Foundation (FierceGovIT) Total known and unclassified federal information technology spending will hover around $70 billion annually through fiscal 2019 when measured in today's dollars, predicts the TechAmerica Foundation in its annual near-term forecast

Products, Services, and Solutions

CipherCloud Delivers Searchable Strong Encryption (Dark Reading) Searchable Strong Encryption (SSE) solution enables encryption of information in real time before it's sent to the cloud

Capturing The Flag, SQLi–Style (Dark Reading) Black Hat SQL injection workshop instructor develops real-world SQL injection sandbox simulator, invites public for capture the flag event later this month

Review: HyTrust Appliance 3.5 (eSecurity Planet) Reviewer Matt Sarrel finds HyTrust Appliance 3.5 an easy-to-use, hardware-based solution for mitigating security risks associated with virtualization

Aaron Swartz's unfinished whistleblowing platform finally launches (Ars Technica) SecureDrop was heavily audited by Bruce Schneier, Jacob Appelbaum, and others

RemoteView 4 Geospatial Intelligence Software Improves Analysts' Productivity (MarketWatch) Overwatch Geospatial Solutions, an operating unit of Textron Systems, a Textron Inc. TXT +0.83% company, announced today the release of its RemoteView™ 4 geospatial intelligence (GEOINT) software, offering a slate of new features and capabilities that provide analysts enhanced productivity and performance

Lacoon Aims to Set New Benchmarks for Enterprise Mobile Security (MarketWatch) Lacoon Mobile Security today emerged from stealth with a mission of empowering enterprises to fully embrace mobility while remaining protected from cyber espionage and cybercrime. Lacoon is announcing general release of its MobileFortress product and a $8M Series A funding round led by Index Ventures and joined by existing angel investors including Shlomo Kramer, co-founder of Check Point Software Technologies and CEO and founder of Imperva

4 free tools for Cyber Security Awareness Month — and beyond! (Naked Security) It's Cybersecurity Awareness Month, so we've been urging you to get more serious about security. A number of you have replied, "Where do I start? What should I do?" Here are 4 free tools to help you on your way

Barracuda unveils new firewall models (Help Net Security) Barracuda Networks announced five new models of the Barracuda NG Firewall F600, which feature multiple port options and hot-swappable power supplies to accommodate varying network requirements

Social identity theft protection (Help Net Security) Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their social accounts

Yahoo (finally!) to make SSL encryption the default for webmail (Naked Security) Yahoo has confirmed it will finally enable encryption by default for its web-based email starting on 8 January 2014, according to The Washington Post - one year to the day after it rolled out the option of protecting users' webmail privacy with HTTPS

Deutsche Telekom plans to keep all web traffic in Germany to hide from PRISM spies (V3) Deutsche Telekom has moved to protect its customers from government spy agencies by changing its processes to only route local internet traffic through domestic servers

Technologies, Techniques, and Standards

Insider–led Data Breaches Drive a Need for Holistic Defense Frameworks (InfoSecurity Magazine) Despite the ongoing, headline-grabbing news that international spies are always trying to breach the cyber-castle walls at government agencies and businesses, it turns out that internal threats are the biggest cause of data breaches, according to new research. Industry experts say that's no surprise — and are urging considered approaches to the issue

Cyber expert Spafford calls for more manager, employee accountability (Federal News Radio) The one action that may make the most difference in how federal agencies secure their computer networks involves no new whiz-bang technology. It has no up-front real-dollar costs either

5 tips for hiring security–savvy IT professionals (Naked Security) How do you make sure your new IT recruits are security-aware? Ross McKerchar is Sophos's IT Security Manager and has been involved in hiring for five years. Here are his tips to winnow away the chaff and discover what your candidate really knows about security

WordPress security threats, protection tips and tricks (Help Net Security) Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website owners on how to protect themselves, and much more

Solving the dilemma of vulnerability exploitation disclosure (Help Net Security) The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed to the manufacturer

Security standard answers market worries over cloud (CRN Australia) The new Star Certification was developed by standards body BSI, incorporating NCSI, in partnership with the Cloud Security Alliance. The certification certifies a

Big data company detectives seek to catch cybercriminals in the act (FierceBigData) These days, finding cybercriminals is not just about looking for clues at the scene of the crime. Such an approach isn't acceptable because it's after the fact when harm has already been done. Antivirus and malware programs too can only be programmed to detect known attacks thus limiting their protection capabilities. Security pros are now using big data analytics and visualizations to catch cybercriminals red-handed and stop them in the act. But that is not to say that all security teams are succeeding at using big data in this way

Enterprises use old technology to combat new APT-style attacks (FierceITSecurity) Traditional IT security strategies, such as firewalls and antimalware software, will not stop advanced persistent threat attacks, warns a new book about APTs from the non-profit IT standards association ISACA

Three Simple Steps to Keep Hackers Out of Your Baby Monitor (Wired) For years, I've been telling new parents not to buy a dedicated Internet-connected baby monitor. These $200 cameras are wastes of money, I argue, because you can accomplish the same thing with an IP camera and smartphone apps for $75 or less. What's more, you'll probably get better pictures and sound to boot. Clearly, given the prevalence of IP cameras in Amazon's baby store, I'm not the only one espousing this anti-baby-industry dogma. But here's the thing: These cameras can be terribly insecure, especially right out of the box

Design and Innovation

Europe Invests €1 Billion to Become "Graphene Valley" (IEEE Spectrum) The European Commission (EC) last week announced a €1 billion ($1.3 billion) investment in graphene research and development that will be spread over 10 years. The aim of the huge funding initiative will be to smooth the path for pushing graphene from the research lab to the marketplace

Research and Development

New effort to fully audit TrueCrypt raises $16,000+ in a few short weeks (Ars Technica) Crypto prof: "We have nearly, but not quite enough to get a serious audit done." For nearly a decade, TrueCrypt has been one of the trusty tools in a security-minded user's toolkit. There's just one problem: no one knows who created the software. Worse still, no one has ever conducted a full security audit on it—until now

Can you trust 'NSA–proof' TrueCrypt? Cough up some dough and find out (The Register) Fundraising drive to shove a microscope up mysterious encryption software. Security researchers are raising funds to conduct an independent audit of TrueCrypt, the popular disk encryption utility. TrueCrypt is widely used as a tool to strongly encrypt and decrypt entire drives, partitions or files in a virtual disk. It can also hide volumes of data and said to be easy to use

Security in quantum physics (The Verge) Cryptography is having a rough few months. On September 5th, leaked NSA documents revealed a systematic effort by the agency to undermine encrypted communications across the board, breaking accepted standards like SSL and systematically weakening others. But while the news has been unsettling for math-based cryptography, it's fueled interest in less conventional means of secure communication, particularly a fiber-optic technique called "quantum cryptography" that uses the properties of light to fend off would-be wiretappers. For years, it's been an object of interest for the cryptography scene — but after Snowden, it's becoming big business

Quantum computers, machine learning and big data (FierceBigData) I can see you thinking "yes but" already. Yes, but quantum computing is still a ways off, you're thinking. To which I would reply, yes, but not as far off as you probably think. Interestingly, big data is fueling its acceleration. How so, you ask? In many cases, such as the Large Hadron Collider at CERN, extreme big data has outgrown current computing capabilities and a new computing model is urgently needed soon


Lockheed Martin talks cybersecurity with high school students ( Teens look at college programs, future careers in cybersecurity. Terms like "advanced persistent threat" and "denial of service" might sound foreign to you, but these students can tell you exactly what they mean

Cybersecurity talent pipeline not being fed by high schools, new Raytheon survey finds (Yahoo! Finance) Survey finds less than one-quarter of young adults express interest in a career in this field

Legislation, Policy, and Regulation

NSA director misled Black Hat attendees — claims of PRISM's value overstated (CSO) Statistics provided by Alexander at conference proven false after true number of terrorist plots stopped by data collection program is divulged. Earlier this month, during a Senate Judiciary Committee hearing, Senator Patrick Leahy pressed the NSA's director, General Keith Alexander, on whether or not the figures that are used to support data collection programs, notably the bulk collection of phone records, were accurate

Shutdown misstep: How Obama administration plan put country at risk (Kansas City Star) It may be one of the most serious missteps of the federal government shutdown. After weeks of planning, the nation's spy chief sent home nearly three-quarters of the workers at the government's intelligence agencies when faced with the partial shutdown. The move, James Clapper later admitted himself, put the United States at greater risk of terrorist attacks. He then reversed course and brought thousands of employees back to work

Espionage is a fact of life. Oversight should be, too (Ottawa Citizen) Canadians ought not to be wringing their hands at the news that our electronic eavesdropping agency is spying on the Brazilian mining industry. Espionage — both for security and economic advantage — is a fact of international life

Litigation, Investigation, and Law Enforcement

Australian privacy commissioner slams telco for privacy breach (FierceITSecurity) Australian Privacy Commissioner Timothy Pilgrim has found that Australian telco AAPT, a subsidiary of Telecom New Zealand, violated the country's Privacy Act by failing to secure customer information prior to a July 2012 Anonymous hack that resulted in the theft of 40 GB of data

Big data privacy challenge requires due process response, says paper (FierceGovIT) Big data doesn't just utilize data: It creates data often of a highly personal nature, and that's a challenge to today's set of privacy protections, argues a paper by a Microsoft researcher and a law academic

McAfee exposes scope of digitally funded crime extends to contract killings (ComputerWeekly) Virtual currencies are being used to enable an extremely wide range of crime - including contract killings - a report by security firm McAfee has revealed. "The perceived anonymity of virtual currencies is helping drive crime at a scale not seen before," said Raj Samani, chief technology officer of McAfee Europe and co-author of the report

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Hack-in-the-Box Security Conference 2013 (Kuala Lumpur, Malaysia, October 14 - 17, 2013) The 11th annual HITB Security Conference (16th/17th October) will be a triple track offering featuring keynotes by Andy Ellis, Chief Security Officer at Akamai and Joe Sullivan, Chief Security Officer...

SNW Fall 2013 (Long Beach, California, USA, October 15 - 17, 2013) SNW is the world's largest independently produced conference series focused on the evolution of architecture for a new world of mobility, Big Data and business agility. Produced by Computerworld -- and...

Hexis Exchange (Athens, Greece, October 16 - 17, 2013) Attendees will have the opportunity to participate in a knowledge exchange of the latest enterprise security topics through expert led business and technology forums, hands-on sessions, and training. Such...

Cybersecurity Symposium: "Protect. Defend. Educate." (Linthicum, Maryland, USA, October 16 - 17, 2013) The Cybersecurity Symposium being held October 16-17, 2013, will deliver first-class training for government and industry security professionals while simultaneously offering high-level keynote speakers,...

NSU Healthcare Cyber Security Summit (Fort Lauderdale, Florida, USA, October 17, 2013) In today's modern healthcare systems, data is everywhere, including sensitive patient data that needs to be secured and monitored. Join top healthcare security professionals from Nova Southeastern University,...

Nuclear Regulatory Commission Cyber Security Conference & Expo (Rockville, Maryland, USA, October 17, 2013) This one-day conference will consist of cyber sessions in the NRC Auditorium given by government and industry speakers. Exhibit tables will be set-up just outside the Auditorium and companies will have...

Securing the Internet of Things Summit (San Francisco, California, USA, October 21, 2013) The Internet of Things is still in its infancy and the security community has a chance to build in new approaches to security if we get started now. More secure embedded operating systems and applications,...

13th Industrial Control Systems Cyber Security Conference (Atlanta, Georgia, USA, October 21 - 22, 2013) Industrial Control Systems (ICS) operate the infrastructures of electric power, water, chemicals, manufacturing, transportation, defense, etc. and link the digital and physical worlds. Their cyber security...

Cloud Connect (Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...

cybergmut Technical Tuesday: Cyber Security Strategy — Why We're Losing and What's Needed to Win (Columbia, Maryland, USA, October 22, 2013) CrowdStrike's Steve Chabinsky of CrowdStrike explains the situation. Everybody seems to be spending more on cybersecurity, but with questionable return on investment. In fact, the problem clearly is getting...

Cyber Security Seminar and IT Expo at Peterson AFB (Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest... 2013 (Luxembourg, October 22 - 24, 2013) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society.

Joint Federal Cyber Summit 2013 (Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...

NSU's 12 Simple Cybersecurity Rules For Your Small Business (Fort Lauderdale, Florida, USA, October 24, 2013) In this presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security...

BREAKPOINT 2013 (Melbourne, Australia, October 24 - 25, 2013) Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.

Ruxcon (Melbourne, Australia, October 26 - 27, 2013) Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities...

2013 ACT–IAC Executive Leadership Conference (Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...

FIRST Energy Symposium (Leesburg, Virginia, USA, October 28 - 29, 2013) Recent reports have shown that the Energy Sector has seen a large increase in the reported number of cyber attacks. The need to protect against threats and improve upon incident management has never been...

SAP NS2: National Security Solutions Summit (Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.

RSA Conference Europe (Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...

Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...

NSA Hawaii — Cyber Security, Intelligence & IT Day (Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.