Chinese cyber espionage seems strongly drawn to theft of drone technology, mainly from the US. (But Sino-American tensions fail to disentangle their tech trade: ZTE plans a major US smartphone launch next year, and is even becoming an NBA sponsor; Alibaba will hold its IPO on NASDAQ or the NYSE, not a Chinese exchange.)
That dodgy Android iMessage app proves indeed a threat, and is pulled from Google Play.
ESET discerns a spike in Filecoder ransomware that encrypts victims' files until they pay up, then (maybe) releases them.
Krebs finds that major data brokers have been hacked by a criminal identity theft service that's now selling birthdays, SSANs, and other sensitive personal information. The data are sold by subscription on the black market using unregulated currencies like Bitcoin and WebMoney.
The researcher who found SIM card encryption flaws early this summer sees little sign that telecommunications companies are addressing them.
The US Army's troubled DCGS intelligence platform is again in trouble—the Army's been told to fix it for Afghanistan in 60 days or replace it with something else (Palantir?)
F-Secure claims Britain's GCHQ and America's NSA are outsourcing significant security functions. Belgium formally asks GCHQ for an explanation of the Belgacom hack, and India expresses concerns over NSA diplomatic surveillance. These controversies find their way to the UN, where Estonia (which always cyber-punches above its weight) presents the body with a dilemma: either extend Westphalian sovereignty to the Internet, or completely overhaul the Westphalian system in the real world.
Today's issue includes events affecting Australia, Belgium, Brazil, China, Czech Republic, Estonia, European Union, Germany, India, Iran, Italy, Japan, Kenya, Republic of Korea, Pakistan, Poland, Romania, Russia, Spain, Ukraine, United Kingdom, United States..
Cyber Attacks, Threats, and Vulnerabilities
Chinese hackers increasingly attracted to the drone technology(Security Affairs) Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers are most persistent collectors for sensitive information is not a mystery, more difficult to demonstrate the direct involvement of the PLA behind the operations of computer experts that systematically seek to unravel the secrets of Western companies and government organizations
Major increase in Filecoder malware(Help Net Security) The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware - Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decrypting software. ESET LiveGrid - the company's cloud-based malware collection system - has shown a rising weekly number of Win32/Filecoder detections by over 200% since July 2013 from average numbers in January - June 2013. The most significant share of detections (44%) are from Russia, but a significant share is reported in southern Europe (Italy, Spain), Central and Eastern Europe (Germany, Czech Republic, Poland, Romania and Ukraine), and the United States
Filecoder: Holding your data to ransom(We Live Security) Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new: in fact, they have been around for several years. These "Filecoders", as we call them, are a prevalent category of ransomware, the other common type of ransomware being lockscreen scareware — ransomware that locks your desktop, displays a massage designed to look as it comes from local law–enforcement and, again demands a payment in order to regain access to your computer
Data Broker Giants Hacked by ID Theft Service(Krebs on Security) An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America's largest consumer and business data aggregators, according to a seven-month investigation by KrebsOnSecurity. The Web site ssndob[dot]ms (hereafter referred to simply as SSNDOB) has for the past two years marketed itself on underground cybercrime forums as a reliable and affordable service that customers can use to look up SSNs, birthdays and other personal data on any U.S. resident. Prices range from 50 cents to $2.50 per record, and from $5 to $15 for credit and background checks. Customers pay for their subscriptions using largely unregulated and anonymous virtual currencies, such as Bitcoin and WebMoney
Newly launched E–shop offers access to hundreds of thousands of compromised accounts(Webroot Threat Blog) In a series of blog posts, we've highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today's efficiency-oriented cybercrime ecosystem, the increasing availability of sophisticated commercial/leaked DIY undetectable malware generating tools, malware-infected hosts as a service, log files on demand services, as well as basic data mining concepts applied on behalf of the operator of a particular botnet. What are cybercriminals up to these days in terms of obtaining such type of data? Monetization through penetration pricing on their way to achieve stolen asset liquidity, so hosts can be sold before its owner becomes
Analysis of the FBI Tor Malware(Gareth Owen) The Tor network is an anonymising network that allows people to browse the web and access other services without being traced. As part of this network, there is the so called 'darknet', servers only accessible through Tor which host a variety of services from forums to e-mail. Whilst many of these services are innocent and aimed at those concerned about Human Rights abuses, the anonimity naturally attracts those with criminal intent such as the distribution of child pornography. It's then impossible for law enforcement agencies to trace the original IP address. In 2013, a piece of malware was found embedded in Freedom Hosting's darknet server that would exploit a security hole in a particular web browser and execute code on the user's computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed — it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have 'form' for writing malware, may have authored it — this now appears to be true
iFruit Android apps for GTAV may contain malware(Webroot) Android users — Were you excited to see the iFruit app on the Google Play Store? Don't be! They are fake imitations of the iFruit app and may contain malware, according to a story by a computerandvideogames.com report
Fake Notification Spam From Social Networking Sites, iTunes Lead To Online Pharmacy(Trend Micro Threat Encyclopedia) Cybercriminals will always capitalize on the popular and the trusted, and this latest pharmacy spam campaign is no exception. In fact, it proves the theory in spades, as not only does it spoof popular social networking website email notifications such as Facebook and Instagram, it also spoofs iTunes, Google and Fedex
Anonymous in Context: The Politics and Power behind the Mask(CIGI) Since 2010, digital direct action, including leaks, hacking and mass protest, has become a regular feature of political life on the Internet. The source, strengths and weakness of this activity are considered in this paper through an in-depth analysis of Anonymous, the protest ensemble that has been adept at magnifying issues, boosting existing -- usually oppositional -- movements and converting amorphous discontent into a tangible form. This paper, the third in the Internet Governance Paper Series, examines the intersecting elements that contribute to Anonymous' contemporary geopolitical power: its ability to land media attention, its bold and recognizable aesthetics, its participatory openness, the misinformation that surrounds it and, in particular, its unpredictability
Describe the Different Types of Cybercriminals. Which are the Most Dangerous?(Malcovery) When we speak about cybercrimes, such as phishing and malware attacks, we tend to lump cybercriminals into one category and operate under an assumption that they are all motivated to steal credentials that lead to some sort of financial theft. While those types of crimes do occur, it is important to distinguish between the different types of cybercriminals that comprise today's threatscape
Virginia Tech hack caused by human error, official says (Roanoke Times) The cyber-attack exposed sensitive information of about 145,000 job applicants at the university. Human error is to blame for a successful cyber attack on Virginia Tech's human resources department that exposed sensitive information of about 145,000 job applicants, a university spokesman said
Security Patches, Mitigations, and Software Updates
Multiple Vulnerabilities in Cisco Prime Data Center Network Manager(Cisco) Cisco Prime Data Center Network Manager (DCNM) contains multiple vulnerabilities that could allow an unauthenticated, remote attacker to disclose file components, and access text files on an affected device. Various components of Cisco Prime DCNM are affected. These vulnerabilities can be exploited independently on the same device; however, a release that is affected by one of the vulnerabilities may not be affected by the others
Cyber attacks will cause real world harm in next seven years(V3) New technologies such as Google Glass and IPv6 will lead to new, deadly forms of cyber attack if current manufacturing security practices continue, according to experts from Europol, Trend Micro and The International Cyber Security Protection Alliance (ICSPA)
Examining Korea's Rollercoaster Threat Landscape(Microsoft Security Blog) The last time I wrote about the threat landscape in the Republic of Korea, its malware infection rate had increased six-fold in the first six months of 2012. Korea has had one of the most active threat landscapes in the world for many years. According to the latest data published in the Microsoft Security Intelligence Report Volume 14, the last half of 2012 was no different. Figure 1 provides the raw number of systems that were disinfected in Korea and other relatively active locations in each of the four quarters of 2012
Spy agency reveals big increase in cyber attacks(Australian Financial Review) Foreign hacking attacks on government computer networks are rising sharply, while local intelligence chiefs grapple with how to modernise telecommunications laws to reflect changes that have been wrought by the internet. Australia's electronic espionage agency, the Defence Signals Directorate, told The Australian Financial Review the number of serious cyber attacks on government, that necessitated a "heightened response" from its Cyber Security Operations Centre, is up 39 per cent from 2012 and 205 per cent from the year before
Kaspersky Lab et Outpost24 découvrent des failles de sécurité(Informaticien.be) Les experts de Kaspersky Lab et Outpost24 ont récemment mené un audit de sécurité auprès de plusieurs organisations européennes. Ils ont examiné dans ce cadre la présence de vulnérabilités non corrigées, afin de mieux brosser le tableau de la sécurité (ou de l'insécurité) du paysage informatique
Attackers sharpen skills: What that really means for CISOs(Help Net Security) Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their knowledge of the evolving vulnerability and attack landscape, such as mobile and social technologies, to more effectively combat emerging security threats
Survey highlights ignorant IT behavior in the workplace(Help Net Security) You receive a strange email. It looks shady. You're probably being phished - a hacker is attempting to gain access to your enterprise. They must want to hijack your user name, password or credit card number. You click on the email anyway? That's the case for the nearly 1 in 5 (19%) U.S. employees working in an office setting who admit they have opened an email at work they suspected to be fake or a phishing scam — without notifying the IT department — according to the results of a survey by Harris Interactive
Concerns around insider threats escalate(Help Net Security) Vormetric announced the results of its "Insider Threat" survey, which surveyed more than 700 IT decision-makers. The study of mid-market and enterprise organizations indicates that 54 percent believe it is more difficult to detect and prevent insider attacks today than it was in 2011. Additionally, 46 percent say they are vulnerable to an insider threat attack - in spite of their existing security skills, resources, processes, and technologies
Cyber Security Insurance Only Goes So Far(IT Business Edge) In a recent study, The Ponemon Institute looked at an emerging strategy for mitigating cyber security risks: insurance policies. Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age (available for download with registration) found that 31 percent of its sample of risk managers and executives in a range of small and enterprise-size companies reported that they have "cyber risk" insurance
Widespread disregard for corporate cloud policies(Help Net Security) While most business professionals are worried about the security of cloud-based applications, they are not deterred from using them to store their personal and professional data, and they are not losing sleep over their data and information, according to a recent survey from SafeNet Labs
Three Top Cybersecurity Risks for Banks(American Banker) Cyber threats are increasing at a rapid rate and banks are going to have to work quickly — and spend significant resources — to keep pace, according to two top banking regulators dealing with the issue
NSA disclosures, mass shootings expose big data problem(FierceBigData) Sure, the government may know everything about us but it's still flailing about, trying to find a way to make that information actionable. Sound familiar? It probably does since most big data projects suffer the same challenge and therefore many practitioners and managers have seen this state of affairs before
How To Deploy the Most Effective Advanced Persistent Threat Solutions(FierceITSecurity) Traditional defense tools are failing to protect enterprises from advanced targeted attacks and the broader problem of advanced malware. In 2013, enterprises will spend more than $13 billion on firewalls, intrusion prevention systems (IPSs), endpoint protection platforms and secure Web gateways. Yet, advanced targeted attacks (ATAs) and advanced malware continue to plague enterprises
DHS looks for veterans to fight cyber threats(Camp Lejeune Globe) The Department of Homeland Security is hiring veterans to join in their fight against cyber attacks on the nation's critical infrastructure and other vulnerable targets. No country, industry, or individual is immune to cyber attacks
Cyber Security Red Hot on Wall Street(Nasdaq) "If you give a man a fish, he'll eat for a day. If you teach a man to spearphish, he'll use your credit card to buy dinner!" This little tech joke speaks volumes about the impact of cyber threats in today's computer-dependent economy. Quite obviously, the financial industry is the worst affected by the rising menace of cyber crime
QinetiQ to Support SPAWAR with Software and Systems Engineering(GovConWire) QinetiQ North America has won a three-year, $10 million contract to develop and test various net-centric programs for the Space and Naval Warfare Systems Command Systems Center Atlantic. The QinetiQ Group plc subsidiary won the work under the Defense Information Systems Agency's ENCORE II contract, QNA said Monday
Will Twitter's IPO mark the top of a bubble?(MarketWatch) hough Twitter's upcoming IPO has rekindled worries that another dot-com bubble may be forming, the new-issue market actually is nowhere close to being as overheated as it was in the weeks leading up to the top of the internet bubble in March 2000
Twitter Deals Blow To Nasdaq's Tech IPO Dominance(Forbes) When Steve Jobs launched Apple AAPL +0.15%'s initial public offering in 1980, he chose to list his Silicon Valley computer company on Nasdaq. Apple sold its shares for $22 each, or $2.75 on a split adjusted basis. Six years later, Bill Gates took Microsoft MSFT -0.73% public on Nasdaq and ever since hot new tech companies have aligned with Nasdaq when it came time to make the big leap and become a publicly-traded company. In the 1990s, Netscape launched the Internet IPO on Nasdaq and companies like Google and Facebook continued the tradition
5 Reasons FireEye Antimalware Technology Is Overvalued By Wall Street(CRN) FireEye, which has been gaining attention for its white-hot antimalware detection system, was one of the most anticipated tech IPOs of 2013, and FireEye's IPO on Friday exceeded expectations. The Milpitas, Calif.-based security appliance maker valued its IPO at $20 per share, and Wall Street investors have embraced the company's stock. It ended its first day of trading with gains of 80 percent at $36.00 per share
Procera gets clear show of support(optionMONSTER Research) One trade apparently believes that any downside in Procera Networks will be limited for the next two months. optionMONSTER's tracking systems detected the
Alibaba Plans US Listing(Wall Street Journal) Alibaba Group Holding Ltd., China's most valuable e-commerce company, will hold its highly anticipated initial public offering in the U.S
AVAST Acquires Jumpshot(Dark Reading) AVAST will integrate and make Jumpshot's technology available to its users by end of year. AVAST Software, maker of the most trusted antivirus in the world, today announced that Jumpshot is now part of AVAST. Jumpshot's simple, clever solution optimizes customers' PCs in one easy step. The technology comes in the form of an animated team of minions who remove junk files, unnecessary toolbars, and files that slow down a PC's performance. The process of cleaning up and enhancing a computer's performance thus becomes effortless and entertaining. AVAST will integrate and make the technology available to its users by the end of the year
Geritz's LifeJourney venture aims to foster STEM careers(BizJournals) Imagine being given the opportunity to "test drive" a career while still in school. Imagine going into college with a sense of direction, knowing what career path you already want to pursue. For Rick Geritz, founder and CEO of LifeJourney, the difficulty of knowing what's really out there makes it hard for students when deciding what they want to do in life. "Imagine walking into a restaurant and being handed a blank menu, or something that just says lettuce and meat. It's not an easy decision to make." For Geritz, children always respond to the question of, "what do you want to be when you get older?" with the usual lawyer, doctor or teacher
s Kindle Fire HDX: Power, with a Helping Hand
(The Verge) The Kindle Fire tablets have always served primarily as portals to Amazon's massive troves of content. But this year, as the company introduces the new Kindle Fire HDX, Amazon tablets are on the precipice of becoming something much more powerful, and much more useful besides. Amazon's ready to compete on specs, on content, and on price — and it makes a compelling case in every respect
IDS, NSM, and Log Management with Security Onion 12.04.3(Internet Storm Center) This is a "guest diary" submitted by Doug Burks. We will gladly forward any responses or please use our comment/forum section to comment publicly. I recently announced the new Security Onion 12.04.3…What is Security Onion? Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes
Evaluating the IT security posture of business partners(Homeland Security Newswire) Evaluating the IT security of businesses is increasingly becoming a necessity when forming new business relationships. A start-up has launched a rating service, similar to a credit rating, to measure the security posture of a company based on a number of factors
LogRhythm Enters Network Forensics and NBAD Markets(BWW) LogRhythm, the leader in cyber threat defense, detection and response, today announced that it is entering the rapidly growing network forensics and network behavior anomaly detection (NBAD) markets with the availability of LogRhythm Network Monitor. Network Monitor significantly extends the accessibility of this critically important class of technology by being far more intuitive, expedient and cost-effective than traditional network forensics and NBAD solutions. Network Monitor eliminates significant blind spots plaguing most IT security organizations, allowing them to detect and respond to advanced threats and breaches faster and with greater precision than ever before
Rootkit detector for OS X(Help Net Security) ESET Rootkit Detector is a new security tool for OS X that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the OS. When the rogue kernel extensions hook inside OS X, they can bypass any security measure thus allowing complete access of system privileges
U.S. command in Afghanistan gives Army 60 days to fix or replace intel network(Washington Times) The Pentagon's main battlefield intelligence network in Afghanistan is vulnerable to hackers -- both the enemy or a leaker -- and the U.S. command in Kabul will cut it off from the military's classified data files unless the Army fixes the defects within 60 days, according to an official memo obtained by The Washington Times. The confidential memo says the Army's Distributed Common Ground System (DCGS) flunked a readiness test and does not confirm the sources of outside Internet addresses entering the classified database
BBJ unveils CyberBiz blog(BizJournals) "We've got a movement going here." With these words, Art Jacoby hooked me on Maryland's potential as a cyber security juggernaut
Raytheon announces Suite B cryptography for cross domain access solution(Raytheon Trusted Computer Solutions) Raytheon Trusted Computer Solutions (RTCS), a wholly owned subsidiary of Raytheon Company (NYSE: RTN), today announced that Trusted Thin Client(TM), a commercial-off-the-shelf, enterprise-class, cross domain access solution, now utilizes Suite B cryptographic algorithms, providing the ability to meet the widest range of government information protection requirements. Trusted Thin Client is a cross domain access solution that enables access to multiple classified or sensitive networks, at various classification levels, from a single device
Is mobile anti–virus even necessary?(CSO) Experts disagree over whether or not there are any immediate threats to mobile devices that can be addressed with anti-virus software. Should you invest in AV for your smartphone or tablet
Why A Hardware Root Of Trust Matters For Mobile(Dark Reading) As the IT industry grapples with the security implications of mobile devices, some experts believe that one of the most important first steps it can take is to stop getting caught up in irrelevancies
Connecting The Dots With Quality Analytics Data(Dark Reading) Security analytics practices are only as good as the data they base their analysis on. If data simply isn't mined, if it is of poor quality or accuracy, if it isn't in a useable format or if it isn't contextualized against complementary data or risk priorities, then the organization that holds it will be challenged to scratch value out of analytics
5 Steps To Stop A Snowden Scenario(Dark Reading) No organization wants to believe one of its own could go rogue. But after being blindsided by the Edward Snowden leaks, even the highly secretive National Security Agency has been forced to overhaul its procedures to lock down just what its most privileged users can access and do with sensitive information
How the NSA cheated cryptography(Graham Cluley) Of all the revelations made by Edward Snowden, I find the recent one about Dual_EC_DRBG definitely the most intriguing and possibly the most shocking — even if it wasn't really news. It intrigues me because it is about elliptic curves. I love elliptic curves. I studied them quite extensively when I worked as a mathematician and although I don't use them anymore, I still feel a fondness for them
Python tools for penetration testers(Dirk Loss) If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This page lists some of them
Deloitte: Preparation key to networked device security(FierceHealthIT) Anticipation and preparation are key to mitigating the security and patient safety risks associated with networked medical devices, according to a new report from the Deloitte Center for Health Solutions
Apple Touch ID Fingerprint Reader Hack Heightens Biometrics Debate(Dark Reading) That didn't take long. The biometrics hacking team of the Chaos Computer Club (CCC) has defeated Apple's Touch ID feature, a fingerprint reader unveiled last week as part of Apple's announcement of the iPhone 5s. The move by Apple led some security experts to express hope that its adoption could lead to increased interest in biometric technologies among consumers. But CCC researchers say it's proof that fingerprint readers should be viewed skeptically
Apple Fingerprint Hack: A Great Reminder(InformationWeek) Apple's hacked fingerprint reader serves as a reminder to enterprise users: Be cautious about which two-factor mechanism you use. Of course it was just a matter of time before Apple's fingerprint reader was hacked. It's just impressive that the Chaos Computer Club did it quite so quickly. And it's a great reminder that using fingerprints as an authentication mechanism is simply a bad idea, especially in the enterprise
De–Serial Killer: Deserialization Perils(SecurityWeek) The root cause of many serious security incidents is some vulnerability in the implementation of the serialization-deserialization process. Just recently, such vulnerability was fixed in the WordPress application. Although these vulnerabilities can be extremely harmful, they seem to be less widely understood than the ones that involve direct user input. Therefore, this column is dedicated to taking a deeper look at them
Stop securing your virtualized servers like another laptop or PC(Tech Republic) Many IT managers don’t take the additional steps to secure their virtual servers, but rather leave them vulnerable to attacks with only antivirus software and data loss prevention packages. Here are the most common mistakes made and how to prevent them
Design and Innovation
African Accelerators Change Tack As 'Savannah Valley' Emerges From The Wilderness(TechCrunch) Kenyan accelerators, following mixed results from their rookie season, have tweaked their strategies for mentoring and investing in local entrepreneurs, in a bid to produce more successful startups. Accelerators 88mph and Savannah Fund are experiencing the growing pains felt by nascent, global startup ecosystems, attempting to transplant the popular investment model pioneered by
*ORA(CASOS) *ORA is a dynamic meta-network assessment and analysis tool developed by CASOS at Carnegie Mellon. It contains hundreds of social network, dynamic network metrics, trail metrics, procedures for grouping nodes, identifying local patterns, comparing and contrasting networks, groups, and individuals from a dynamic meta-network perspective. *ORA has been used to examine how networks change through space and time, contains procedures for moving back and forth between trail data (e.g. who was where when) and network data (who is connected to whom, who is connected to where…), and has a variety of geo-spatial network metrics, and change detection techniques. *ORA can handle multi-mode, multi-plex, multi-level networks. It can identify key players, groups and vulnerabilities, model network changes over time, and perform COA analysis. It has been tested with large networks (106 nodes per 5 entity classes).Distance based, algorithmic, and statistical procedures for comparing and contrasting networks are part of this toolkit
How much influence can the UN have over online spying?(Ars Technica) "Brazil has 100 percent inconvenience, 0 percent security, and 0 percent privacy." It's not everyday that the Peace of Westphalia, which ended the Thirty Years War in mid-17th century Europe, is invoked when it comes to Internet policy
US Targeted Indian Diplomats with Sophisticated Bugs: Report(SecurityWeek) The US National Security Agency targeted the Indian embassy in Washington and the Indian UN office in New York with sophisticated surveillance equipment that might have resulted in hard disks being copied, a report said Wednesday
Brazil's President Tells U.N. That NSA Spying Violates Human Rights(US News & World Report) Brazil President Dilma Rousseff made the loudest criticism yet by a world leader against surveillance by the U.S. during her address on Tuesday to the U.N. General Assembly when she called for the multinational organization to regulate the Internet and prevent online abuses
Pakistan takes steps to protect itself from NSA-style cyber attacks(The News) In view of the recent wave of stealing of sensitive official data by US National Security Agency (NSA), the National Telecom & Information Technology Security Board (NTISB) has framed guidelines/ techniques for protecting government business from possible hacking and cyber attacks. "Recent wave of stealing the sensitive official data by US NSA has raised serious concerns warranting the implementation of all policies and guidelines in true letter and spirit," the Cabinet Division noted in a letter to all ministries, departments and divisions
Cancel data sharing deal with US, EU politicians urge(PCWorld) European politicians on Tuesday demanded that a broad data-sharing agreement between the U.S. and the European Union be suspended, following allegations that the U.S. National Security Agency illegally tapped banking data. The Terrorist Finance Tracking Program (TFTP) allows the U.S. Treasury to access some data stored in Europe by Swift, the international banking transfer company. But allegations that the NSA accessed this data without going through legal channels has led some members of the European Parliament (MEPs) to declare the agreement defunct
Tech rivals joining forces on NSA, immigration(Politico) They trash each other in the marketplace and sue each other in courts. But lately, tech companies and their leaders have been holding hands to fight for things they care about in Washington, from immigration reform to National Security Agency damage control
Sen. Patrick Leahy calls for end to NSA bulk phone records program(Washington Post) A senior U.S. senator on Tuesday called for an end to the National Security Agency's phone records collection program, arguing that it treads too heavily on Americans' privacy rights without having proved its value as a counterterrorism tool. In a speech at Georgetown Law's Center on National Security and the Law, Senate Judiciary Committee Chairman Patrick J. Leahy (D-Vt.) said he has introduced bipartisan legislation that would stop the controversial program, which allows the NSA to amass a database of Americans' call logs. He said he is working on a bill to address concerns about a separate program that collects the e-mails and phone calls of foreigners overseas, including their communications with Americans
Japan, U.S. to create cyber panel(Japan News) The Japanese and U.S. governments will create a new consultation framework in which defense officials of the two countries will discuss measures against cyber-attacks, government sources said
California Enacts Poor Man's Right to be Forgotten(InfoSecurity Magazine) While California's tech giants lobby the European Union to weaken the proposed General Data Protection Regulation, especially the 'right to be forgotten,' their home state inaugurates its own admittedly more limited version
The FDA Needs to Regulate "Digital Snake Oil"(Slate) When Apple released the first iPhone in 2007, almost no one saw it as the seed of a medical revolution. But it may have been. Just a few years later, we now see phones that double as cardiac event recorders, blood glucose meters, and remote controls for blood pressure cuffs. Doctors can monitor labor and delivery remotely via smartphone. Quantified Selfers can track their bodies via digestible smart pills or stamplike skin sensors, or their brains via neuro headsets. Worried parents might soon consult mobile devices in the middle of the night or dress their infants in a smart onesie to monitor their breathing and sleep patterns
Quality not a priority in security clearance process, GAO says(Federal News Radio) Concerns over missed red flags in Navy Yard shooter Aaron Alexis's background have thrust the federal government's security clearance program into the spotlight. That intensified last week when it was revealed that the same company, USIS, that performed a background investigation of National Security Agency leaker Edward Snowden had also performed Alexis' check in 2007
Obama's Favorite General Stripped of His Security Clearance(Foreign Policy) The Defense Department has stripped Gen. James "Hoss" Cartwright of his security clearance, depriving the man once known as "Obama's favorite general" access to classified data as the investigation into leaks of national security secrets continues
Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources(Foreign Policy) The National Security Agency says that the telephone metadata it collects on every American is essential for finding terrorists. And that's debatable. But this we know for sure: Metadata is very useful for tracking journalists and discovering their sources. Yesterday, a former FBI agent and bomb technician pleaded guilty to leaking classified information to the Associated Press about a successful CIA operation in Yemen. As it turns out, phone metadata was the key to finding him
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
2013 Cyber Security Summit(New York, New York, USA, September 25, 2013) The 2013 Cyber Security Summit connects executives responsible for protecting their company's critical infrastructure with innovative product, service and solution providers. The one day event, to be...
4th Annual Billington Cybersecurity Summit(Washington, DC, USA, September 25, 2013) GEN Keith Alexander, Commander of U.S. Cyber Command, Director of the NSA/Chief, Central Security Service and Dr. Pat Gallagher, Director, NIST are among the distinguished speakers confirmed to keynote...
Information Security Conference(Charleston, West Virginia, USA, October 2, 2013) On October 2, the WVOT Office of Information Security and Controls, will be sponsoring a no-charge information and cyber security awareness event at the Charleston Civic Center. The agenda will offer...
The Monktoberfest(Portland, Maine, USA, October 4, 2013) Our speakers will explore how social trends can change the way we build and use technology, and how technology in turn can change the way we socialize.
Suits and Spooks NYC 2013(New York, New York, October 5, 2013) Since the landscape is foggy, the threat actors numerous and hard to identify, and the attacks proliferating on a daily basis, the focus of the next Suits and Spooks conference will be to identify non-state...
Forensics and Incident Response Summit EU(Prague, Czech Republic, October 6 - 13, 2013) The Summit will focus on high quality and extremely relevant content as well as panel discussions in Digital Forensics and Incident Response. In addition, we encourage you to take every opportunity to...
CyberMaryland 2013(Baltimore, Maryland, USA, October 8 - 9, 2013) Join cybersecurity leaders, luminaries and rising stars at CyberMaryland 2013. This two-day event at the epicenter of the nation's cybersecurity innovation and education, will create opportunities for...
2013 Maryland Cyber Challenge(Baltimore, Maryland, USA, October 8 - 9, 2013) Held in conjunction with Cyber Maryland and intended to let students and young professionals showcase their cybersecurity skills, Maryland Cyber Challenge offers competition in three divisions: high school,...
AFCEA Hill AFB Technology & Cyber Security Expo(Ogden, Utah, USA, October 9, 2013) The purpose of this first-time event is to allow base personnel the opportunity to learn about the latest computer security trends, network with peers, share remediation strategies and to view and demo...
VizSec 2013(Atlanta, Georgia, USA, October 14, 2013) VizSec brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.
Hack-in-the-Box Security Conference 2013(Kuala Lumpur, Malaysia, October 14 - 17, 2013) The 11th annual HITB Security Conference (16th/17th October) will be a triple track offering featuring keynotes by Andy Ellis, Chief Security Officer at Akamai and Joe Sullivan, Chief Security Officer...
USDA Cyber Security Symposium and Expo 2013(Washington, DC, USA, October 15, 2013) The Cybersecurity Expo, running in conjunction with the Summit, will allow exhibitors the opportunity to provide live demos and share information with government personnel and industry partners. Summit...
SNW Fall 2013(Long Beach, California, USA, October 15 - 17, 2013) SNW is the world's largest independently produced conference series focused on the evolution of architecture for a new world of mobility, Big Data and business agility. Produced by Computerworld -- and...
Hexis Exchange(Athens, Greece, October 16 - 17, 2013) Attendees will have the opportunity to participate in a knowledge exchange of the latest enterprise security topics through expert led business and technology forums, hands-on sessions, and training. Such...
Cybersecurity Symposium: "Protect. Defend. Educate."(Linthicum, Maryland, USA, October 16 - 17, 2013) The Cybersecurity Symposium being held October 16-17, 2013, will deliver first-class training for government and industry security professionals while simultaneously offering high-level keynote speakers,...
Nuclear Regulatory Commission Cyber Security Conference & Expo(Rockville, Maryland, USA, October 17, 2013) This one-day conference will consist of cyber sessions in the NRC Auditorium given by government and industry speakers. Exhibit tables will be set-up just outside the Auditorium and companies will have...
Securing the Internet of Things Summit(San Francisco, California, USA, October 21, 2013) The Internet of Things is still in its infancy and the security community has a chance to build in new approaches to security if we get started now. More secure embedded operating systems and applications,...
13th Industrial Control Systems Cyber Security Conference(Atlanta, Georgia, USA, October 21 - 22, 2013) Industrial Control Systems (ICS) operate the infrastructures of electric power, water, chemicals, manufacturing, transportation, defense, etc. and link the digital and physical worlds. Their cyber security...
Cloud Connect(Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...
Cyber Security Seminar and IT Expo at Peterson AFB(Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest...
Joint Federal Cyber Summit 2013(Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...
2013 ACT–IAC Executive Leadership Conference(Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...
SAP NS2: National Security Solutions Summit(Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.
Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...
NSA Hawaii — Cyber Security, Intelligence & IT Day(Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.