skip navigation

More signal. Less noise.

Daily briefing.

The next step in ransomware's evolution seems to be a jump over to Android: the criminal Reveton team is preparing a suitable variant of "Police Locker." It's a low-grade evolution, detectable by most standard AV tools and requiring user intervention to install, but Police Locker's creep into Android is a healthy reminder that malware and its masters don't stand still.

The last word on Covert Redirect is out: it won't be patched because it's not a bug. The last advice? Exercise care in granting applications access to your systems.

Now that the CVE-2014-0515 zero day is patched, TrendLabs offers its analysis of how the recently disclosed Adobe Flash vulnerability was exploited in the wild.

Threatpost reports a new iPhone passcode bypass.

Dog-bites-man, but cave cyber-canem: Sophos's itinerant war-biker visits Las Vegas and finds—surprise—that unsecured public Wi-Fi is risky. (And who would have thought Las Vegas risky?)

ComputerWorld runs a warning against "offensive forensics," a kind of cyber reconnaissance-in-force attackers use to prepare subsequent assaults on networks and systems.

The Target CEO's resignation, seen as a move to restore customer (and partner, and investor) trust in the wake of last year's data breach, is also seen as a warning to other CEOs: cyber security problems can be expected to exact a high toll. Some large companies (like IBM) frame security offerings with this in mind.

Remember ham radio? Someone claiming to speak for Anonymous thinks it's a potential source of secure bandwidth.

Interesting reports on Friday's Deshowitz-Hayden-Greenwald-Ohanian surveillance debate.

Notes.

Today's issue includes events affecting Canada, European Union, Iran, United Kingdom, United States..

Cyber Attacks, Threats, and Vulnerabilities

Android "Police Locker" ransomware set to attack (Help Net Security) Android users might soon become victims of "Police Locker" ransomware, if they haven't already, warns the researcher behind the Malware don't need Coffee blog

Evolution of Encrypting Ransomware (Webroot Threat Blog) Recently we've seen a big change in the encrypting ransomware family and we're going to shed light on some of the newest variants and the stages of evolution that have led the high profile malware to where it is today. For those that aren't aware of what encrypting ransomware is, its a cryptovirus that encrypts all your data from local hard drives, network shared drives, removable hard drives and USB. The encryption is done using an RSA -2048 asymmetric public key which makes decryption without the key impossible. Paying the ransom will net you the key which in turn leads to getting your data back

Researchers debunk severity of OAuth "Covert Redirect" bug (Help Net Security) Late last week, a Ph.D. student at the Nanyang Technological University in Singapore made the information security world pause for a moment by claiming that he had found a "serious" OAuth 2.0 and OpenID security flaw that could be attackers to obtain sensitive information from both providers and clients

'Covert Redirect' OAuth flaw more chest-beat than Heartbleed (The Register) Giving a bug a logo doesn't make it more important

Analyzing CVE-2014-0515 — The Recent Flash Zero-Day (TrendLabs Security Intelligence Blog) Last week, Adobe released an advisory disclosing a new zero-day vulnerability in Flash Player. Looking into the exploit code used in attacks targeting this vulnerability, we found several interesting ties to other vulnerabilities — not all of them for Flash Player, either. To explain this, we will discuss the highlights of how this exploit was performed

Passcode Bypass Bug and Email Attachment Encryption Plague iOS 7.1.1 (Threatpost) Another iPhone passcode bypass is making the rounds this week that reportedly allows users to trick Siri into skirting around the device's usual lockscreen to view, edit and call any of the phone's contacts

Dropbox users leak tax returns, mortgage applications and more (Graham Cluley) If you are using file-sharing systems like Dropbox and Box without proper care and attention, there is a risk that you could be unwittingly leaking your most private, personal information to others

Cyber-security expert's experiment shows Wi-Fi users in Las Vegas vulnerable to hacking (Las Vegas Sun) James Lyne calls his road bike "The Beast," and he's brought it to Las Vegas to find out just how vulnerable wireless networks in the city and their users are to hackers

Researchers Reveal Windows Flaw Allowing Employees to Access Corporate Data After Accounts Are Supposedly Revoked (Digital Journal) Logs and Security Incident and Event Management (SIEM) products do not have the proper visibility to contain this type of threat

Hackers capture dynamic data to prepare for effective, stealthy attacks (ComputerWorld) "Offensive forensics is an attack technique hackers use to capture non-static data that can be useful in performing further attacks," says Joe Sremack, Principal, Berkeley Research Group, LLC, a computer forensics and e-discovery firm

Defending Against Identity Theft In The Military (Dark Reading) Our military troops are twice as likely to be victims of identity theft as the general population. The reason is in the structure of military culture

Affinity Gaming reports payment system was hacked (AP via the Washington Post) A Las Vegas company that owns casinos in four states says its system for processing credit and debit card information has been hacked

University of North Carolina Hacked (eSecurity Planet) An undisclosed number of names, addresses and Social Security numbers may have been accessed

Portland Homeless Charity Acknowledges Insider Breach (eSecurity Planet) A former employee copied clients' information in order to use the data to file fraudulent tax returns

Security Patches, Mitigations, and Software Updates

Google experimenting with hiding URLs in Chrome (ZDNet) In an effort to make phishing attacks more evident to the user, Chrome Canary is taking a tip from iOS Safari, emphasizing the domain and hiding the rest of the URL

And the Web it keeps Changing: Recent security relevant changes to Browsers and HTML/HTTP Standards (Internet Storm Center) As we all know, web standards are only leaving "draft" status once they start becoming irrelevant. It is a constant challenge to keep up with how web browsers interpret standards and how the standards themselves keep changing. We are just going through one of the perpetual updates for our "Defending Web Applications" class, and I got reminded again about some of the changes we had to make over the last year or so

Cyber Trends

White House Big Data Report: 5 Privacy Takeaways (InformationWeek) Big data raises serious privacy concerns that need to be addressed, sooner rather than later, report says

The ABCs of the Internet of Things (ComputerWorld) What it is, how it works and why it may not succeed

Internet Of Things: What's Holding Us Back (InformationWeek) The likes of Union Pacific, GE Power & Water, and ConocoPhillips are turning IoT hype into reality, but they want to do more. Here's what's still getting in the way

3 Key Risk Areas in the Internet of Things (RSA: Speaking of Security) Your office knows to turn on the lights when you arrive and turn them off when you leave. Your copier knows when to order more toner. Your car knows the best path to your next client meeting. Your building management system detects who is where and the optimal environmental controls. These Internet of Things (IoT) devices are all great, until someone hacks them and turns them against you. From cars to buildings to medical devices to the infrastructure that supports all of it—as we become more dependent on technology, we become more exposed to those technologies being turned against us

Cyber Cavalry Rides to the Rescue of Internet of Things (Wall Street Journal) As the "Internet of things" puts more and more products and devices online, cybersecurity risks threaten more than data. But in their eagerness to get technology-enabled devices to market, companies often neglect security, as demonstrated by hackers who have exposed vulnerabilities in cars, medical devices, and other products

Interconnected cars add unique privacy concerns (CSO) Imagine you're driving down a street in your town, and as you pass through an intersection you see a flash out of the corner of your eye just before a car running the red light broadsides you. Now, imagine that your vehicle was in communication with the other vehicle, and your car automatically stopped or took evasive action to avoid the accident. That would be pretty amazing—and that is just the sort of car-to-car communication technology the Department of Transportation wants to make mandatory for all passenger vehicles. However, the technology may also invade your privacy and put you at risk

Convergence of physical and cyber security (Help Net Security) The concept of security convergence, where physical and cyber security issues overlap, has been around for more than a decade. But it has only been in the last few years that the IP-enablement of everyday business functions has forced companies to come to terms with the fact that physical and cyber security must be treated in a unified manner

Enterprises are not monitoring access to sensitive data (ComputerWorld) If you want to make a cybersecurity professional uncomfortable, simply utter these two word: 'Data exfiltration.' Why will this term garner an emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack — think Target, the NY Times, Google Aurora, Titan Rain, etc. Simply stated, 'data exfiltration' is a quasi-military term used to describe the theft of sensitive data like credit card numbers, health care records, manufacturing processes, or classified military plans

RedSocks, An interesting vision on Malware trend in Q1 (Security Affairs) Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in the first quarter of 2014

Marketplace

Venture capitalists hearing the cybersecurity gospel from NPPD (FierceHomelandSecurity) Venture capitalists and merger and acquisition lawyers have been the object lately of cybersecurity outreach from the National Protection and Programs Directorate

FireEye Earnings Surprise in T-Minus 35 Hours (Wall Street Daily) With the recent pullback in the tech sector, this is your opportunity to scoop up strong industry leaders at insane bargains

Target CEO resigns, latest executive fallout from card breach (Naked Security) Target CEO Gregg Steinhafel managed to hold onto his job for nearly six months after the disclosure that more than 110 million records had been stolen by hackers in December 2013

Did Target's CEO Need to Go? (BankInfoSecurity) Resignation a sign of change in cybersecurity perspectives

Target CEO resignation highlights cost of security blunders (CSO) Chief Executive Gregg Steinhafel's fall will heighten the attention CEOs in retail give to C-level security pros

Do you really think the CEOs resignation from Target was due to security? (CSO) Celebrating the resignation of Target's CEO as a win for security is wrong and harmful for our industry. Instead, consider the entire situation and take these actions to start the right conversations in your company

The NSA sent a mysterious coded tweet. Here's the decrypted message. (Washington Post) The Internet was abuzz this morning over a cryptic tweet sent by the National Security Agency's careers account, which looked like (1) a particularly bad pocket tweet, (2) the latest from Rakesh Agrawal, or (3) a coded message containing national secrets/spy instructions/something else out of the FX drama "The Americans"

Dress Like A Gnome: 6 Security Training Essentials (Dark Reading) Offer home security clinics, make security messages fit for Twitter, and don't be afraid to dress up, say Infosecurity Europe presenters

SE Solutions Hires Leading Expert to serve as Technical Director for Data Analytics (Broadway World) Strategic Enterprise Solutions, Inc. (SE Solutions) announced today its expansion in homeland security strategic and mission-specific services with the addition of Mr. Eric Hagopian as Technical Director for Data Analytics

Products, Services, and Solutions

IBM launches new cybersecurity services (Daily Journal) IBM on Monday announced comprehensive new security software products and services for large enterprises

CEOs May Look Twice At IBM's New Security Suite, Services As Target's Head Rolls (CIO) New security products and services from Big Blue are aimed at preventing nightmare data theft scenarios

Symantec Unveils New Advanced Threat Protection (Dark Reading) Integrated approach and roadmap of organic innovation produce unparalleled defenses and more value

iSIGHT Partners Automates Integration With HP ArcSight Platform (MarketWatch) ThreatScape® API enables interoperability between leading cyber threat intelligence solution and HP ArcSight, the premiere security information and event management solution

EFF invites users to test online tracking blocker (Help Net Security) The Electronic Frontier Foundation is on a mission: give users a tool that will help them disallow/block trackers contained within the Web pages they visit

How Should Enterprises Score Security? (eSecurity Planet) Qualys CTO Wolfgang Kandek discusses his firm's Web application firewall and security scoring efforts and hints at future security technologies to come

Mobile phone security transformed with 4 new encryption apps (Help Net Security) Following the high profile breaches of mobile phone security that have hit the headlines in recent years, a British company has launched a new range of mobile phone apps that provide the last word in encryption security for incoming and outgoing voice and data calls

Technologies, Techniques, and Standards

Anonymous develops secure data over ham radio scheme (The Register) Trading bandwidth for freedom on a pirate channel. Anonymous — or, at least, entities claiming Anonymous affiliation — has put together a secure communications project using the open source ham-radio Fldigi modem controller

NIST updates Transport Layer Security (TLS) guidelines (Help Net Security) The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information traveling across their networks

How a security expert handles identity-theft protection (Reuters) You won't find security expert Michael Chertoff doing silly everyday things like using public WiFi, logging in with the same password on every site he uses, clicking on dubious links or falling for a phishing scam

Privacy groups look to 'reset Net' to blunt NSA spying (ComputerWorld) Privacy groups call on Web users to deploy security and encryption tools

Booz Allen Helps Utilities Update Cybersecurity Standards and Strengthen Performance (Wall Street Journal) When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and comply with version 5 of the Critical Infrastructure Protection (CIP) cybersecurity standards

Research and Development

US Navy Sees Bitcoin As An 'Evolving Threat' (ValueWalk) A general solicitation is looking for better ways to monitor the flow of digital currencies

MC2 Researchers Awarded MURI for Work on Hardware Security (Maryland Cybersecurity Center) Researchers at the University of Connecticut, the University of Maryland, and Rice University have been awarded a five-year, $7.5 million grant via an Air Force Office of Scientific Research (AFOSR) MURI to address the topic of "Security Theory for Nano-Scale Devices." Ten researchers in multiple disciplines across the three institutions will collaborate to analyze and develop new security protections for nano-scale computer hardware

Academia

Local students learning cyber security (KSDK) Malicious hackers can wreak havoc, making security breaches extremely costly to companies and government agencies, so people who know how to protect computer systems against hackers and viruses are in high demand

Legislation, Policy, and Regulation

A reporter, a reddit founder, a lawyer, and an ex-NSA chief walk into a debate (Ars Technica) Four major surveillance thinkers argue the merits of our post-Snowden world in Toronto

Is state surveillance a legitimate defense of our freedoms? (Nextgov) Is state surveillance a legitimate defense of our freedoms? The question was put to Michael Hayden, former director of the NSA and the CIA, during a debate Friday evening in Toronto. Alan Dershowitz joined him to argue the affirmative. Glenn Greenwald and Reddit co-founder Alexis Ohanian argued against the resolution

No One Opposes All Surveillance: False Equivalence on the NSA (The Atlantic) But contra Alan Dershowitz, history shows how dangerous uncritical support for surveillance can be

House Judiciary to move on NSA reform bill (The Hill) The House Judiciary Committee this week will mark up a stalled bill to rein in the National Security Agency (NSA) and other intelligence operations. The move announced on Monday amounts to a major step forward for reform at the embattled spy agency, after months of scrutiny from Capitol Hill and international outrage over its surveillance programs

Will new amendment to USA Freedom Act bar bulk data seizures? (Volokh Conspiracy in the Washington Post) The National Journal reports: "House to Advance Bill to End Mass NSA Surveillance"

How federal bill C-13 could give CSIS agents — or even Rob Ford — access to your personal online data (National Post) A wide-ranging new federal bill that will allow Internet and cellphone providers to hand over your personal data without a warrant has privacy advocates concerned about just how many officials will have access to that information, a list that could range from CSIS agents to Toronto Mayor Rob Ford

Policies should focus on 'managing,' not 'solving' cybersecurity problems, says NRC (FierceGovernmentIT) Public policy can help address U.S. cybersecurity, but it should not be viewed as an issue that can be solved through legislation or regulation. Rather, public policy can help improve cybersecurity management, says a new report from the National Research Council

Policy debate looms on U.S. role in market for 'zero-day' cyber threats (Inside Cybersecurity) In a bid to address questions about the federal government's willingness to conceal and exploit cybersecurity vulnerabilities for intelligence purposes, the White House last week issued a statement on how it decides whether to reveal such a flaw, noting a key factor is protecting critical infrastructure. But there remains a looming policy debate about how to control the proliferation of zero-day exploits and whether the United States is in some ways contributing to the problem

Heartbleed: What it told us about US stockpiling of potential cyber-weapons (Christian Science Monitor via the Alaska Dispatch) Heartbleed, the recently divulged cyber-vulnerability that exposed websites to a gaping hole in computer security across half the Internet, exposed something else: a shift in US policy over when to keep such vulnerabilities secret — to be exploited by government spies only — and when to disclose and fix them

Litigation, Investigation, and Law Enforcement

Can we trust anyone with our personal info? (Naked Security) In the last few weeks, two very different criminal cases have concluded on opposite sides of the Atlantic, each of them showing how vulnerable our personal information is to those eager to exploit it

Cuffing darknet-dwelling cyberscum is tricky. We'll 'disrupt' crims instead, warns top cop (The Register) Hackers. If you can't beat 'em, join 'em? Europe's top cyber-cop has called for a shift in focus from the prosecution of online crims to the disruption of their activities

Cops get serious about cybercrime, and not before time (Naked Security) The world's police forces are, it seems, starting to appreciate the scale and significance of the cybercrime problem. The director of the FBI, James Comey, told journalists last week that cyber threats were a major priority for his agency

Iran's Tech Bloggers Caught In the Political Crossfire (Aljazeera America) Five bloggers who activists say were 'apolitical' have been imprisoned for 150 days

Ridenhour Prize for Truth-Telling awarded to pair who detail their fears and concerns (ValueWalk) NSA whistleblower Edward Snowden and journalist Laura Poitras were awarded The Ridenhour Prize for Truth-Telling at a ceremony in Washington, DC

Cartels, Terrorists, and Prisoners: Why Do Criminals "Like" Social Media? (Cyveillance) Funny cat videos. Beautiful vacation scenes. Food photos. High school buddies. Your niece just scored 1,000 points on Candy Crush. When you think of social media, those are just some of the things that may spring to mind. Cartels, prisoners, and gangs probably aren't the first thought, at least for most people. However, just as social media is being used by millions of companies around the world to engage with and better serve customers, organized criminal groups are using it to recruit members and to plan attacks. The following examples demonstrate just a few reasons why criminals like social media, too

Shareholder ends lawsuit against IBM over China risks, NSA scandal (Reuters via the Chicago Tribune) An IBM Corp shareholder has voluntarily ended a lawsuit accusing the company of concealing how its cooperation with a National Security Agency spying program cost it business in China and led to a nearly $13 billion plunge in the company's market value

2 men charged in Tulsa with hacking Navy, other government, education and business sites (AP via the Pendleton Times-Post) Federal prosecutors in Tulsa say two men are charged with conspiring to hack into computer systems of the Navy and more than 30 other government, business and university sites

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Fraud Summit (Chicago, Illinois, USA, May 14, 2014) From account takeover to payment card fraud and the emerging mobile threatscape, the ISMG Fraud Summit series is where thought-leaders meet to exchange insights on today's top schemes and the technology...

3 Day Startup (San Antonio, Texas, USA, May 23 - 25, 2014) The nation faces tremendous challenges to our online security. Turn innovative ideas into startups that protect our information and our livelihood. 3 Day Startup is an entrepreneurship program designed...

NRC Cyber Security Seminar/ISSO Security Workshop (Bethesda, Maryland, USA, June 16, 2014) NRC will be hosting its second NRC Semi-Annual All-Hands ISSO Workshop. This workshop will consist of computer security policy, standards, cybersecurity, guidance, FISMA compliance, and training updates.

Resilience Week (Denver, Colorado, USA, August 19 - 21, 2014) Symposia dedicated to promising research in resilient systems that will protect critical cyber-physical infrastructures from unexpected and malicious threats—securing our way of life.

Defense Intelligence Agency (DIA)/National Intelligence University (NIU) Open House (Washington, DC, USA, September 17, 2014) On September 17, 2014, the National Intelligence University (NIU) will hold a Tech Expo as part of its annual "NIU OUTREACH DAY" in the Tighe Lobby of DIA Headquarters on Joint Base Bolling-Anacostia.

Ft. Meade Technology Expo (Fort Meade, Maryland, USA, September 18, 2014) The Ft. Meade Technology Expo is a one-day event held at the Officers' Club (Club Meade) on base. Industry vendors will have the unique opportunity to showcase their products and services to personnel...

STEM Café (Geneva, Illinois, USA, May 6, 2014) At the next STEM Café, Raimund Ege, associate professor in NIU's Department of Computer Science, will lead a lively discussion on how computer crime affects our everyday lives and what we can do to protect...

cybergamut Technical Tuesday: Malware Reverse Engineering (Columbia, Maryland, USA, May 6, 2014) An introduction to the tools, workflows, and tricks of the trade to attack sophisticated malware by Dale Robson of CyberPoint. Industry standard cyber security products do a good job in blocking and defending...

Kirtland AFB — Cyber Security Seminar & Information Technology Expo (Albuquerque, New Mexico, USA, May 7, 2014) Join FBC and the Armed Forces Communications & Electronics Association (AFCEA)-Albuquerque Chapter for the Cyber Security Seminar & Information Technology Expo set to take place at Kirtland Air Force Base.

US Secret Service Cybersecurity Awareness Day (Washington, DC, May 8, 2014) This Cybersecurity event will be the first of its kind at the USSS. There will be 2-3 opportunities for participating companies to present a 1/2 hour presentation on a Cybersecurity topic of concern to...

SANS Security West (, January 1, 1970) SANS Security West will arm information security professionals with the necessary insight to prepare their organization for today and the future. Attendees will have the opportunity to advance their information...

HackMiami 2014 (Miami Beach, Florida, USA, May 9 - 11, 2014) The HackMiami 2014 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools,...

Eurocrypt 2014 (, January 1, 1970) Eurocrypt 2014 is the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. It is devoted to all aspects of cryptology.

ISPEC 2014 (Fujian, China, May 12 - 14, 2014) The ISPEC conference series is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and...

CyberWest (Phoenix, Arizona, USA, May 13 - 14, 2014) Cyber threats affect all industry sectors and impact individuals, businesses and governments. From hacktivists to advanced persistent threats, conducting business on-line exposes individuals, corporations...

GovSec 2014 (Washington, DC, USA, May 13 - 14, 2014) GovSec is the nation's premier event for Government, Homeland Security, and Law Enforcement professionals looking for proven strategies and cost effective technology so they can achieve their mission of...

Cyber Security for National Defense Symposium (, January 1, 1970) DSI's Cyber Security for National Defense Symposium is designed as an educational and training "Town Hall" forum, where thought leaders and key policy-makers across military and civilian organizations...

FOSE Conference (Washington, DC, USA, May 13 - 15, 2014) Spend 1 day or 3 days at the FOSE conference and leave with actionable information, covering a broad spectrum of trending topics including: Cybersecurity, Cloud and Virtualization, Mobile Government,...

INFILTRATE (, January 1, 1970) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot...

Security BSides Denver 2014 (Denver, Colorado, USA, May 16, 2014) Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of...

Security Start-up Speed Lunch NYC (New York, New York, USA, May 19, 2014) Our goal for this inaugural event is to connect the most promising security startups in the world with decision-makers at aerospace, asset-management, banking, communications, defense, energy, healthcare,...

CEIC 2014 (Las Vegas, Nevada, USA, May 19 - 22, 2014) It's no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for practical skills development. From sessions...

The Device Developers' Conference: Bristol (Bristol, England, UK, May 20, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...

Mobile Network Security in Europe (London, England, UK, May 21, 2014) Following on from two successful events in the United States, this first Light Reading conference on Mobile Network Security in Europe will again focus on the key role of the network in safeguarding the...

Positive Hack Days (, January 1, 1970) Positive Hack Days is the international venue for the unification of progressive forces of the IT industry. It is about innovators interested in information security problems; it is fresh blood and bright...

Georgetown Law: Cybersecurity Law Institute (, January 1, 1970) A day does not go by where cybersecurity is not in the news. In fact, according to a recent national survey conducted by FTI Consulting, cybersecurity is the number one issue on the minds of general counsels...

NSA Mobile Technology Forum (MTF) 2014 (, January 1, 1970) The Mobile Technologies Forum is an annual event that attracts SIGINT, Information Assurance, HUMINT, Federal Law Enforcement, Counterintelligence and Government personnel from the United States, Australia,...

CyberMontgomery Forum: Center of Gravity (Rockville, Maryland, USA, May 22, 2014) Cybersecurity will be a major growth engine in the region for many years to come. With solid federal government, industry and academic assets already in place in the region, there is still a need to bring...

Cyber Risk Summit (Washington, DC, USA, May 22, 2014) This one-day leadership conference will provide a discussion forum for business executives, insurance companies and policymakers on more effective private and public responses to cyber risk management.

The Device Developers' Conference: Cambridge (Cambridge, England, UK, May 22, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...

Fort Meade Technology Expo (, January 1, 1970) The Ft. Meade Technology Expo is a one-day event held at the Officers' Club (Club Meade) on base. Industry vendors will have the unique opportunity to showcase their products and services to personnel...

CANSEC (, January 1, 1970) CANSEC is Canada's foremost defence tradeshow. A two-day event, CANSEC will feature 120,000 square feet of indoor exhibits by Canada's leading edge defence companies, as well as an outdoor static display.

Hack in The Box Security Conference (HITBSecConf) Amsterdam (, January 1, 1970) HITBSecConf Amsterdam is a gathering of network security professionals and enthusiasts who come from all corners of the globe to discuss the next generation of attacks and defense techniques. This is not...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.