skip navigation

More signal. Less noise.

Daily briefing.

Turkish hacktivists, this time Kemalist rather than Ottoman, recognize Republic Day by hacking sites they perceive as hostile with Atatürk's image.

An Anonymous cell with an Arabo-Liverpudlian nom de hack claims responsibility for vandalizing Italian university sites (without obvious motive). As Guy Fawkes Day approaches (next Tuesday), big Anonymous calls for physical demonstrations in #OpVendetta, not hacktivism.

A Palestinian hacker seeks renown by pwning Mark Zuckerberg.

Ransomware continues to proliferate. It's retail crime: ordinary users are targets.

Odd episodes are harbingers of exploits in the emerging Internet-of-things: Chinese-made electric kettles (says the Russian press), compromised tradeshow swag, counterfeit money detectors.

Open sources contain interesting information. Consider a 2009 academic paper Chinese researchers published through Elsevier, detailing how the US power grid might be taken down.

Such cyber warfare is much on official minds from Tehran to Beijing (via Tel Aviv, London, Dublin, and Washington). A "cyber Pearl Harbor" is again widely discussed. (But cyber events notoriously can be ambiguous. Pundits might also consider the possibility of a cyber Tonkin Gulf Incident.)

Another historical analogy is also much discussed: the 1970's Church Commission inquiry into the CIA. Fresh allegations of US NSA incursions into Google and Yahoo (denied by NSA's director) seem to bring a Church 2 closer. French authorities recover their momentarily cooled outrage, the Chinese government says it will "take steps" to protect itself, and the Israelis again point out that cyber surveillance is pretty widespread.

Some industry news: interesting new products and a "Dark Mail" project are announced.


Today's issue includes events affecting China, European Union, France, Iran, Israel, Italy, Democratic People's Republic of Korea, Republic of Korea, Palestinian Territories, Philippines, Romania, Russia, Singapore, Turkey, United Arab Emirates, United Kingdom, United States, Vatican..

Cyber Attacks, Threats, and Vulnerabilities

Turk Hack Team Celebrates Turkish Republic Day by Hacking 450+ Websites (HackRead) TurkHackTeam from Turkey, collectively has hacked and defaced 450+ random websites in order to celebrate republic day of Turkey on October 29. Hackers left a deface page with Mustafa Kemal ATATÜRK's image and a greeting message on Turkey's republic day. The deface message was expressed in following words: Since then, every year on October 29 is celebrated as Republic Day in Turkey

Sites of 3 Italian Educational Institutions Hosted on Government Domains Hacked (Softpedia) An Anonymous-affiliated hacker that uses the online moniker Ammar Liverpool has breached and defaced a total of three websites belonging to Italian educational institutions. All of the websites are hosted on government domains

#OpVendetta: Anonymous Calls for Massive Million Mask March on November 5th 2013 (HackRead) The online hacktivists from Anonymous have asked the people to join them on November 5th 2013 in a massive million mask march against the governments around the world in order to bring a change in society. The important point about this protest is that hacking or defacing will not be a part of it. It will be a protest on ground

Anonymous threatens Singapore with hacking attacks, calls for November 5 protest…perhaps (Naked Security) An anonymous person, claiming to be Anonymous, recently fired off a hacking threat against Singapore's financial systems. Should this threat be taken seriously

Path to Success for One Palestinian Hacker: Publicly Owning Mark Zuckerberg (Wired) "You've no idea what I've done," Khalil Shreateh said, bursting into the kitchen of his family's stone-and-concrete house in the South Hebron Hills. The stocky 30-year-old Palestinian ran a hand through his already haphazard hair. "I just posted on Mark

Smaller, Popular Open Source Software Packages Exposed in Sourceforge Review (Threatpost) Metasploit released exploit modules for security issues in seven smaller, yet popular, open source software packages, including e-Learning software Moodle

Cyber–security experts warn computer users of 'explosion of ransomware' (San Jose Mercury News via TribLive) Thousands of consumers are getting a nasty shock when they turn on their computers

Russia: Hidden chips 'launch spam attacks from irons' (BBC) Cyber criminals are planting chips in electric irons and kettles to launch spam attacks, reports in Russia suggest

Counterfeit money detector easily hacked to accept fake money (Help Net Security) A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about when creating them

EU Council Chief Did Not Use Russian USB Stick Given to Summit Leaders (CIO) Media reports say that tainted USB sticks were handed to participants in the G20 summit in September

Internet of Things: Defence warns more devices means more risks (ComputerWorld) As the Internet of Things expands, industry and government must collaborate to bolster security of critical systems, according to Alex Zelinsky, chief defence scientist at the Department of Defence

Brandon University Hacked (eSecurity Planet) Names, addresses, birthdates and social insurance numbers from student applications between 2004 and 2009 may have been exposed

Cascade–based attack vulnerability on the US power grid (Elsevier) The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US power grid, we compare the effects of two different attacks for the network robustness against cascading failures, i.e., removal by either the descending or ascending orders of the loads

Security Patches, Mitigations, and Software Updates

Windows XP Malware: 6X As Bad As Windows 8 (InformationWeek) Need another reason to quit Windows XP before Microsoft ends support for the operating system in six months? Then consider that real-world Windows XP systems already sport a much higher rate of malware infections than Microsoft's more recent operating systems

Google Webmaster Tools Adds "Security Issues" Section (Search Engine Land) Google has announced the addition of a new section within Webmaster Tools named "Security Issues." This new section is aimed at better communicating to website owners security issues, such as site hacks, malware, and so on and then giving a more detailed and concise method of fixing the problem and submitting a review request

Experts weigh in with wish lists for Android 4.4 KitKat security (CSO) With the next version of its mobile OS, Google has a chance to prove that it's a good fit for the enterprise crowd

New Spamcop Traps Raise Old Issues (Return Path) Spamtrap operators play a valuable role in the email ecosystem. As stated in "M3AAWG Best Current Practices For Building and Operating a Spamtrap", spamtraps are "designed to capture any sort of email abuse." A well-run spamtrap network can identify many types of email abuse, from the very malicious – botnet command and control centers – to the mostly harmless but annoying – email marketers who are inadvertently sending to the wrong subscribers. In order to remain effective, spamtrap operators must frequently update their networks to ensure that they are adequately capturing enough data to identify abuse. As such, many spamtrap operators are continually preparing new traps which they can begin using at any time without warning

Cyber Trends

Anonymity is the enemy of privacy, says RSA grand fromage (The Register) RSA boss demands revamp of outdated privacy, security regs. RSA Europe 2013 A dogmatic allegiance to anonymity is threatening privacy, according to Art Coviello, executive chairman of RSA

Risk versus hype: What is the real impact of insider security threats? (SerchSecurity) In a recent survey of international corporate executives, insider threats were their No. 1 security concern. Does data justify this level of concern? Should the top priority (and subsequent resources) of enterprise infosec teams be to curb insider security threats

Social Engineers Pwn The 'Human Network' In Major Firms (Dark Reading) Apple, General Motors, Home Depot, Johnson & Johnson, Chevron, Boeing, and other major corporations easily fall to social engineers in recent contest, new report shows

DM Warns of Enemies' Cyber War against Iran (Fars News Agency) Iranian Defense Minister Brigadier General Hossein Dehqan warned of enemies' possible plots to wage a cyber war against the country to destroy Iran's scientific and industrial infrastructures

Cyber Warfare at Home and Abroad (Daily NK) Of late, there has been constant criticism of online political meddling carried out by the National Intelligence Service (NIS) and ROK military Cyber Command; incidents that have inflicted further harm on public trust in South Korea's state security apparatus. Though justified, this criticism has also led to confusion over the value of online defenses against North Korea's own cyber warfare. This is problematic, as cyber security experts mostly agree that Pyongyang is engaged in more such actions today than at any time in the past

'A Cyber Pearl Harbor' looms for vulnerable networks, McConnell says (Chicago Tribune) The United States is losing a "cyberwar" and it will take a "cyber Pearl Harbor" for the country to take the steps necessary to protect critical computer systems, the nation's former intelligence chief said

Eugene Kaspersky's roadshow on cyber–nasty woes of modern life (Irish Times) Kaspersky Lab, one of the top four global security firms, warns about the threat of cyberwarfare

How Can We Realistically Prep For A Cyber Attack? (National Geographic) American Blackout is not a movie about cybersecurity. It is about disaster preparedness. The 90-minute docudrama devotes less than five minutes to the cyber attack, saying only that it involves some sort of "malicious code" that somehow causes transformers and substations to blow up all over country. The rest of the movie follows the breakdown of civil society during a ten-day, nationwide blackout

Alexander: Defending Against Cyberattacks Requires Collaboration (American Forces Press Service) Catastrophic cyberattacks loom in the nation's future, and only collaboration among government agencies, Internet service providers and U.S. allies worldwide can help citizens prepare for them, the commander of U.S. Cyber Command said this afternoon

The Haunted House of Cyber Scares (PCMagazine) Don't think supernatural baddies exist? You're about to be proved wrong. Vampires and witches pose some of the most dangerous cyber threats out there. In the spirit of Halloween, Trend Micro released an entertaining infographic that pairs some of the spookiest frights to their cyber counterparts

Naming And Shaming Unlikely To Work For Cyberespionage (Dark Reading) Why a whistleblower's evidence of widespread surveillance by the NSA has caused the U.S. government to react, but Mandiant's revelations about Chinese espionage fail to curb that nation's efforts

The emerging turf battle between information and physical security pros (CSO) As security threats increasingly cross role boundaries, information and physical security pros struggle to get along, so what are the best practices for uniting both teams under a common goal


Romania's Bitdefender says "a listing on the stock exchange before 2016 is unlikely" (actmedia) "We are now reviewing our strategy for the next 3 to 5 years. Bitdefender will not list on the stock exchange before 2016. I am referring to the fact that we need to reach critical mass, and the first stage of this will probably happen in 2015," Florin Talpes, CEO and founder of Romanian security solutions provider Bitdefender, said

Lavabit And Silent Circle Join Forces To Make All Email Surveillance–Proof (Forbes) In recent months, Lavabit, based in Texas, and Silent Circle, based in Washington, D.C., both shuttered their encrypted email services. The companies said they couldn't keep them running knowing they were vulnerable to surveillance if faced with a dedicated enough attacker... which for Lavabit came in the form of the federal government when it wanted access to NSA whistleblower Edward Snowden's Lavabit account. Now the companies are teaming up with plans to offer an open-source tool that could make peer-to-peer, end-to-end encryption an easy add-on for any email service. The challenging part: they need to get other email providers — especially the heavyweights, Google, Yahoo, and Microsoft — to join them in offering the tool

Northrop Grumman Receives Two 2013 Nunn–Perry Awards for Superb Performance in the DOD Mentor–Protege Program (MarketWatch) Springfield, Va.-based MVLE Inc. and Kimmich Software Systems, Inc., of Columbia, Md., are protege partners

Lockheed Martin Brings FireEye, Red Hat And Splunk To Its Cyber Security Alliance (MarketWatch) Lockheed Martin (NYSE: LMT) today announced that FireEye (NASDAQ: FEYE), Red Hat (NYSE: RHT) and Splunk Inc. (NASDAQ: SPLK) have joined its Cyber Security Alliance and have agreed to collaborate on solutions that can enhance an intelligence driven defense approach to solve customers' hardest problems

Why you should care about something as boring as an accounting firm merger (Quartz) PriceBoozHouse. PricewaterhouseBooz. BoozPrice. Pooz? Those are just a few of the scintillating names that could come from combining two of the world's biggest professional services firms, accounting behemoth PricewaterhouseCoopers, and management consulting house Booz & Company. The firms announced plans to tie up today, which should help give sluggish PricewaterhouseCooper a boost. But what's good for the bottom line isn't always good for the integrity of the business; the move raises concern about the accounting industry's longstanding troubles with conflicts of interest

Products, Services, and Solutions

EMT announces availability of Secunia PSI in Arabic (Kipp Report) The availability to help individual PC users across the Arab world to stay more secure with the latest version of Secunia Personal Software Inspector

Sophos delivers cloud–based endpoint security (Help Net Security) Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today's advanced threats. This first version of Sophos Cloud provides protection at the endpoint

Secure corporate BYOD solution by ForeScout (Help Net Security) ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination enables companies to accelerate

RSA takes a big data approach to help with high–risk threats (Help Net Security) RSA, The Security Division of EMC, unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations improve their overall security posture by analyzing massive

Lockheed Martin Cyber Solution Enables Secure Data Sharing Between Top Secret and Unclassified Security Domains (Wall Street Journal) Lockheed Martin (NYSE: LMT) has developed a cyber security solution that allows intelligence to be securely shared among personnel working at all security levels -- from highly classified intelligence sites to unclassified users in the field. This high assurance information solution, called Trusted Sentinel, allows data to be manually and/or automatically transferred between two or more differing security domains by using a single consolidated configuration of hardware and software

FireEye Introduces New Virtual Machine–Based Threat Protection for Remote or Branch Offices (MarketWatch) FireEye, Inc. FEYE -3.80% , the leader in stopping today's advanced cyber attacks, today announced the launch of the FireEye(R) NX 900, extending the FireEye virtual machine-based threat protection to remote or branch offices. With the FireEye NX 900, organizations can better protect one of the weakest links in enterprise security against advanced attacks. The FireEye NX 900 will be generally available before the end of the year

Five free apps for encrypting email (TechRepublic) Whether you are using an email client or a web-based email solution, you can encrypt your email

Facebook may start logging your cursor movements (Ars Technica) Facebook wants to know not just where your mouse ends up, but where it's been

Network IDS reduces "white noise" for more focus on critical vulns (Help Net Security) RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe

Technologies, Techniques, and Standards

NIST revises cybersecurity training special publication (FierceGovIT) The National Institute of Standards and Technology released Wednesday a public draft of a special publication governing federal agency cybersecurity role-based training

Improving Critical Infrastructure Cybersecurity: Executive Order 13636 (NIST) The Preliminary Cybersecurity Framework for improving critical infrastructure cybersecurity is now available for review. The Preliminary Cybersecurity Framework is provided by the National Institute of Standards and Technology (NIST). If the Cybersecurity Framework is to be effective in helping to reduce cybersecurity risk to the Nation's critical infrastructure, it must be able to assist organizations in addressing a variety of cybersecurity challenges. The National Institute of Standards and Technology (NIST) requests 9 that reviewers consider the following questions

Arab world to get internet addresses in Arabic script (The National) Internet addresses can now be registered in Arabic script following approval from the global regulator last week

Compliance Checklist: Cloud Encryption Best Practices for Banks and Insurance Companies (Ciphertext) For industries whose handling of sensitive consumer data renders them subject to strict regulations, the cloud is anything but a simple choice. Before you can commit to the cloud, you'll have to understand exactly what cloud information protection measures you must take to remain in regulatory compliance. Follow this checklist to protect your organization's data and business interests

Do you have your security checklist for deploying on the cloud? (Trend Micro Simply Security) With AWS re:Invent 2013 right around the corner, I know many of you have the cloud on your mind. Which makes me wonder – is security one of the cloud topics you are thinking about

BSIMM Advancing Software Security (eSecurity Planet) The annual Building Security in Maturity Model (BSIMM) study adds new software security data every year. Nearly 70 companies contributed to version five, introduced this week

Making metadata meaningful for network security (CSO) Metadata is most simply data about data. From a network security perspective it has multiple uses ranging from real-time incident detection to post-prevention forensic analysis. Before you start exploring the many uses of metadata extracted from your network environment, there are some variables that must be considered

Critical Manufacturing Sector Named as One of the Critical Infrastructures Carrying Large Supply Chain Cyber Risk According to Cyber Security Executive Order (Cyber Data-Risk Managers) Due to the increasing pressures from external threats, organizations responsible for critical infrastructure need to have a consistent and iterative approach to identifying, assessing, and managing cybersecurity risk. The critical manufacturing sector was named as one of the critical infrastructures that carries large (supply chain) cyber risk according to the Cyber Security Executive Order that is expected to be released in its final form in February 2014


America's Best Student Researchers to Compete in NYU–Poly Cyber Security Awareness Week (Sacramento Bee) Judges chose 10 of the best young researchers to progress to the final round of the prestigious Best Applied Security Paper Contest during the world's biggest student cyber security challenge event. The 10 doctoral candidates from across the United States will gather on the Brooklyn campus of the Polytechnic Institute of New York (NYU-Poly) for the 10th annual Cyber Security Awareness Week

Capitol Hosts Cybersecurity Awareness Event (Capitol College) [On October 16, 2013], Capitol College hosted students from Oxon Hill High School, Charles H Flowers High School, Frederick Douglas High School and Fort Meade High School for a cybersecurity awareness event in honor of National Cybersecurity Awareness month. Every October is National Cybersecurity Awareness Month and it is an excellent opportunity to help create a safe, secure, and resilient cyber environment

Legislation, Policy, and Regulation

Remarks as delivered by James R. Clapper Director of National Intelligence (IC on the Record) Open Hearing on Continued Oversight of the Foreign Intelligence Surveillance Act to the House Permanent Select Committee on Intelligence

"You can't have your privacy violated if you don't know your privacy is violated" (Naked Security) House Intelligence Committee Chairman Mike Rogers suggested during a hearing at the US National Security Agency (NSA) on Tuesday that it's impossible to have your privacy violated if you don't know that your privacy is being violated

Google 'outraged' by government snooping; NSA chief denies claim (CNN) The National Security Agency's director flatly denied a Washington Post report Wednesday that the NSA secretly broke into communications links to Google and Yahoo servers overseas

NSA fires back at Washington Post report (Politico) A new report that the U.S. government had infiltrated links to Google's and Yahoo's data centers around the globe drew a sharp rebuke Wednesday from the National Security Agency, which declined to comment whether such collection had ever occurred

NSA bombshell shocks former spooks (Foreign Policy) Former intelligence officials, technology industry executives and lawmakers reacted with anger and anxiety over the latest revelations that the National Security Agency is reportedly infiltrating some of the world's biggest technology companies and making off with the private communications of millions of their customers

'Numerous' NSA Analysts Don't Like The Google Cloud Hack, And For Good Reason (Business Insider) The National Security Agency has found a way to circumvent the encryption process between Yahoo/Google's public Internet and cloud encryption through a program codenamed MUSCULAR, reports Barton Gelmann of the Washington Post

Analysis: NSA's data grab ought to boost privacy concerns (Louisville Courier-Journal) The latest revelation of how government spies tap into the personal data that U.S. consumers so blithely place into the control of the Internet's advertising giants is the most profound yet

NSA denials are 'Implausible,' France says (Washington Post) France rejected as implausible assertions by U.S. intelligence agencies Wednesday that they had not collected phone records of millions of European citizens, and a French government spokeswoman said the charges "appear to have been thoroughly substantiated"

European and German delegations visit White House to talk National Security Agency surveillance (Politico) Delegations from the European Union and Germany visited the White House Wednesday to discuss the ongoing controversy over National Security Agency surveillance that allegedly swept up communications of European leaders and members of the public

U.S. security agency denies reports it targeted Vatican (Reuters) The National Security Agency, responsible for U.S. electronic eavesdropping, said on Wednesday that it does not target the Vatican, and called an Italian media report that it had done so "not true."

China says it will take measures to uphold its information security in the wake of NSA allegations (Washington Post) China says it will take steps to protect its data better in the wake of allegations that the U.S. National Security Agency collected millions of phone

What Hides in the 'Box'? (Israel Defense) Ronen Solomon reveals: the US embassy in Tel Aviv and other US embassies around the world possess devices similar to the one used for wiretapping purposes in Berlin, according to the investigation by Der Spiegel

NSA uproar could spark changes not seen since 1970s (USA Today) As criticism of the National Security Agency mounts, the U.S. intelligence community is bracing for an overhaul of how it does business on a level not seen since Sen. Frank Church held hearings into intelligence abuses nearly four decades ago

Woodward: "Secret" Government Under Obama Administration Needs To Be Reviewed (Face the Nation via Real Clear Politics) BOB SCHIEFFER: What is so interesting, Bob Woodward, and you know, you and I have seen a lot of these things. BOB WOODWARD: Too much. SCHIEFFER: The first thing that agencies tend to do is try to make sure they can't be blamed for something. And, clearly, that is why the FBI and the CIA did not come clean with the Warren commission, and why maybe they didn't even tell the agents in Dallas what was going on

Breaking Bad: America Has Used Walter White Logic Since 9/11 (The Atlantic) The earliest moral compromises made to fight terrorism spiraled out of control, doing grave harm at home and abroad

PayPal Tells Government How to Improve Electronic Payments Regulation (Storefront Backtalk) PayPal (NASDAQ: EBAY) is telling global governments how they can better regulate technology companies–especially, of course, payment processors such as itself. Really

Senate bill calls for random background checks for clearance holders (Federal News Radio) In the aftermath of the Sept. 16 shootings at the Navy Yard and security leaks caused by former National Security Agency contractor Edward Snowden, a group of senators has decided it's time to update how the government conducts security clearance background checks

Swalwell Passes Amendment to Recruit Veterans and Mid–Career Professionals for Cybersecurity Careers (Livermore Patch) U.S. Representative Eric Swalwell (CA-15) passed an amendment in the Committee on Homeland Security to direct the Department of Homeland Security (DHS) to take a broader approach in its cybersecurity workforce recruitment on Oct. 29

Los Angeles creates 'Cyber Intrusion Command Center' (Reuters via Yahoo! News) Los Angeles Mayor Eric Garcetti, citing warnings by President Barack Obama and National Intelligence Director James Clapper about the threat of attacks on computer networks, on Wednesday announced the creation of the city's first "Cyber Intrusion Command Center"

Litigation, Investigation, and Law Enforcement

How enterprises can avoid violating the Stored Communications Act (SearchSecurity) I saw that there was a recent case in Ohio, Lazette v. Kulmatycki, where a company was found in violation of the Stored Communications Act, or SCA, because it didn't adequately tell employees how it monitors communications on BYOD devices. What sort of BYOD monitoring details should we include (or not include) in our policy

Adobe cyber attack to trigger flood of legal action, forecast lawyers (The Lawyer) A welter of legal action could tumble out of Adobe's admission yesterday that it had suffered a far greater breach of data security in a cyber attack earlier this month, leading technology lawyers warn

Boris Johnson defends Guardian's coverage of NSA espionage revelations (FreeNewsPos) The mayor of London said today that he believes the Guardian's exposure of espionage within UK and US intelligence agencies was right and that the public deserved to know

PNP bags 4 Koreans in 'voice phishing' scam (FreeNewsPos) Four Koreans involved in the so-called "voice phishing" scam were nabbed by the Cyber Response Team of the Philippine National Police-Anti-Cybercrime Group (PNP-ACG) during operations in 30 Bb. Librado Avelino St., Circulo 12, BF Homes, Paranaque City Thursday

Edward Snowden gets a thrilling new gig — doing Russian tech support (VentureBeat) If you thought Edward Snowden's renown as a famed leaker of corporate secrets has made him unemployable for life — you thought wrong

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

CyberInnovation Briefing (Baltimore, Maryland, USA, November 7, 2013) As cyber attacks plague critical infrastructure, financial institutions, and the federal government, liability and privacy remains a growing concern. With losses mounting and sensitive information being...

RSA Conference Europe (Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...

TrustED 2013 (Berlin, Germany, November 4, 2013) In this workshop we consider selected aspects of cyber physical systems and their environments. We aim at bringing together experts from academia, research institutes, industry and government for discussing...

OKTANE 1 (San Francisco, California, USA, November 3 - 5, 2013) OKTANE13 is an identity, security and mobility event. Whether you're just getting started with cloud applications, evaluating a mobile strategy, building a hybrid enterprise IT, or looking to make your...

MIRcon 2013 (Washington, DC, USA, November 5 - 6, 2013) With targeted attacks becoming more prevalent, today's incident responders are faced with the tremendous challenge of accelerating their response times while capturing relevant data from attacks in progress.

KMWorld 2013 (, January 1, 1970) KMWorld 2013 is a must-attend event for those concerned with improving their organizations' bottom line, business processes, and productivity, as well as streamlining operations, and accelerating development...

Maryland Art Place Annual Fall Benefit (Baltimore, Maryland, USA, November 9, 2013) Maryland Art Place (MAP) is pleased to announce the participating artists of its 2013 Annual Fall Benefit, the Starlight Dinner - highlighting technology and innovation in contemporary art. The dinner...

cybergamut Technical Tuesday: Location Based, Context Aware Services for Mobile — Today and Tomorrow by Guy Levy-Yurista, Ph.D. (available at various nodes, November 12, 2013) As we continue to grow our dependence on mobile devices in our daily routine from taking pictures to delivering corporate documents, the contexts in which these devices are acting becomes increasingly...

Cyber Education Symposium (Arlington, Virginia, USA, November 19 - 20, 2013) Both the public and the private sectors suffer from a lack of highly trained and effective cyber security leaders. In response, the government, businesses, and academic institutions are all exploring ways...

APPSEC USA (New York, New York, USA, November 18 - 21, 2013) Welcome to Appsec USA 2013, New York - a world class software security conference for developers, auditors, risk managers, and entrepreneurs, bringing you the world's top speakers, the most relevant security...

IT Forum Expo/Black Hat Regional Summit (, January 1, 1970) Black Hat Regional Summit will introduce a mix of local in-region experts and researchers from around the globe, discussing the latest trends in information security with an audience of peers. The sessions...

2nd Annual East Africa IT and Cyber Security Convention 2013 (Nairobi, Kenya, November 28 - 29, 2013) The 2nd Annual East Africa IT and Cyber Security Convention 2013 will bring together leading Cyber and IT Security experts who will provide key insights into critical cybersecurity issues surrounding cyber...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.