The CyberWire Daily Briefing for 11.21.2013
We thought this had already happened, but perhaps we missed a peace treaty: Anonymous "declares war" on the United States government.
Indonesian-Australian cyber-rioting brews up with multiple attacks on Australian sites even as Australia's PM seeks to mollify Indonesian resentment over surveillance.
A backdoor worm "Java.Tomdep," apparently designed to stage denial-of-service attacks, is found infecting machines running Apache Tomcat—attack servers are in Taiwan and Luxembourg.
The Internet Storm Center is following Renesys' warning of a large-scale man-in-the-middle campaign. (The fishy signal? Traffic between Ashburn, Virginia, and Washington, DC, being routed through Russia and Belarus.)
Banks are advised to beware of new financial malware, "i2Ninja," quietly being sold on the Russian blackmarket. One interesting feature: it uses the I2P darknet for command-and-control, thus avoiding the attention Mevade drew to itself by spiking Tor traffic.
Microsoft joins in recommending backup as the best defense against CryptoLocker; their warning also contains some useful insight into the dangerous ransomware.
BitSight rates security by industry: the financial sector is tops, tech scores rather low, and the energy sector has seen a significant drop-off over the past year. EY (the consultancy formerly known as Ernst & Young) says CIOs are taking cyber security more seriously (but other observers still see significant underinvestment).
Trend Micro wonders whether the days of unencrypted HTTP are drawing to an end.
China's newly revamped security apparat uses natural-language-tracking technology for domestic surveillance. Germany increases counterintelligence vigilance against its allies. Calls to sanction China for cyber espionage reappear in the US.
Notes.
Today's issue includes events affecting Australia, Bahrain, China, Czech Republic, Ethiopia, India, Indonesia, Iran, Republic of Korea, Libya, Luxembourg, Morocco, Pakistan, Russia, Syria, Taiwan, United Arab Emirates, United Kingdom, and United States..
Cyber Attacks, Threats, and Vulnerabilities
Anonymous Declares Global Cyber War on U.S. Government against Hammond's Sentence and NSA Spying (Hack Read) The online hacktivist group Anonymous has released a video, according to which the group has declared global cyber war on the government of United States against injustice, NSA's spying and 10 year sentence of a cyber activist Jeremy Hammond…In the message, Anonymous has requested that: 'People who follow Anonymous, do not deface U.S government websites, do not occupy
Pakistani Hackers Hacks All India Radio Allahabad Website, Greets Iranian and Syrian Hackers (Hack Read) The official website of All India Radio Allahabad has been hacked and defaced by Pakistani Hacker going with the handle of BLACK H3ART. Hacker has left a deface page along with a message on All India Radio Allahabad website, talking about a warning and hailing Iranian and Syrian hackers
Hackers target AFP, Reserve Bank sites (The Australian) The websites of the Australian Federal Police and the Reserve Bank of Australia have been the victims of an apparent cyber attack, with Indonesian hackers claiming responsibility
New backdoor worm found attacking websites running Apache Tomcat (Ars Technica) Tomdep harnesses strength of servers to wage powerful denial-of-service attacks. Researchers have identified new self-replicating malware that infects computers running the Apache Tomcat Web server with a backdoor that can be used to attack other machines
Are large scale Man in The Middle attacks underway? (Internet Storm Center) Renesys is reporting two separate incidents where they observed traffic for 1500 IP blocks being diverted for extended periods of time. They observed the traffic redirection for more than 2 months over the last year. Does it seem unusual for internet traffic between Ashburn Virginia (63.218.44.78) and Washington DC (63.234.113.110) to go through Russia to Belarus? That is exactly what they observed. Once traffic flows through your routers there are countless opportunities to capture and modify the traffic with classic MiTM attacks. In my humble opinion we should put very little stock in the safety of SSL traffic as it flows through them. Attacks such as the SSL Crime attack, Oracle Padding attacks, Beast and others have shown SSL to be untrustworthy in circumstances such as this
Banks Should Beware i2Ninja Malware: Trusteer (American Banker) A low-profile strain of malware — recently discovered on a Russian cybercrime forum — could spell big trouble for bank customers and financial services companies alike, says computer security company Trusteer
i2Ninja Financial Malware Lurking on I2P Darknet (Threatpost) The Mevade botnet made news when it was found to be using the Tor anonymity network to communicate with its command and control infrastructure. Running C&C on Tor, however, turned out to be a fatal mistake when Tor usage spiked alerting administrators to the unusual activity
Bogus "free Bitcoin generator" offer leads to malware (Help Net Security) The rising popularity of Bitcoin hasn't gone unnoticed by online scammers, and according to ThreatTrack's Chris Boyd, they have started tricking users into completing online surveys with promises
Backup the best defense against (Cri)locked files (Microsoft Malware Protection Center) Crilock - also known as CryptoLocker - is one notorious ransomware that's been making the rounds since early September. Its primary payload is to target and encrypt your files, such as your pictures and Office documents. All of the file types that can be encrypted are listed in our Trojan:Win32/Crilock.A and Trojan:Win32/Crilock.B descriptions
GitHub bans weak passwords after brute-force attack results in compromised accounts (IT World) Some GitHub accounts had their passwords, access tokens and SSH keys reset
Who's The Boss Over Your JBoss Servers? (Dark Reading) If you haven't patched a 2011 vulnerability found in more than 21,000 servers connected online, then the answer could be the person who installed a crimeware webshell
Fake Windows tech support calls continue to plague consumers (ComputerWorld) More than a year after the U.S. Federal Trade Commission (FTC) heralded a major crackdown on fraudsters posing as Microsoft technical support personnel, consumers continue to receive calls from scammers
Is a pop–up ad from optimize–app.com a new type of attack? (ComputerWorld) Yesterday, while reading an article in Pulse on my iPad, I was interrupted by a pop-up ad (below), seemingly from optimize-app.com. The pop-up was modal, blocking all use of Pulse. I turned on airplane mode (just in case), clicked the OK button and the pop-up disappeared without trying to load another web page. A few minutes later, the pop-up re-appeared
iOS Point–of–Sale Devices Pose Security Risk (eSecurity Planet) New research considers security implications of mobile point-of-sale applications on Apple's iPhones and iPads
Address Changes: A Growing e–Commerce Fraud Tactic (Storefront Backtalk) Changes in customers' shipping addresses is one of the key ways that thieves are now getting away with online credit card fraud, financial experts say
Olympics was targeted by state-sponsored cyber attack, says LOCOG CIO (ComputerWorld) Six 'serious cyber incidents' during London 2012 Olympics
Stuxnet creators defined 21st century warfare (CSO) Creators cared more about pushing envelope in the realm of digital warfare, not causing destruction
Stuxnet's Earlier Version Much More Powerful And Dangerous, New Analysis Finds (Dark Reading) ICS/SCADA expert Ralph Langner analyzes how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran's nuclear facility — including the belief that only a nation-state could pull off a similar attack in the future
Dell: Business is Booming for Under–Web Markets (Threatpost) A complete bundle of personal information hackers require to steal identities is available on the underground for as little as $25
Phoenix woes continue after 'major' outage (CRN) Birstall datacentre falls over just ahead of big cloud services launch
Cyber Trends
Dempsey: 'We Are Vulnerable' to Cyber Attacks (Wall Street Journal) Military and private sector cooperation on cyber security is the ideal for General Martin Dempsey, chairman of the Joint Chiefs of Staff. He spoke with WSJ's John Bussey at Wall Street Journal CEO Council in Washington, D.C
How UK banks contain threats from cybercriminals (BBC) The UK's banks are regularly being caught out by cybercriminals, BBC research suggests
A look at security effectiveness by industry (Help Net Security) BitSight analyzed security ratings for over 70 Fortune 200 companies in four industries - energy, finance, retail and technology. The objective was to uncover quantifiable differences in security effectiveness and performance across industries from October 2012 through September 2013
CIOs upping security spending, accepting inevitability of breaches (FierceCIO) CIOs are growing more accepting of the idea that cyberattacks and data breaches will inevitably impact their organizations, and are investing more in IT security as a result
Serious Trust Issues Abound in the McAfee Labs Q3 Threats Report (McAfee Executive Perspectives) For IT security executives and security-responsible business executives, McAfee Labs' Q3 Threats Report poses an interesting set of developments that call into question what industry and non-industry leaders should take note of
Moving from Do Not Track to Can Not Track (Threatpost) The movement in the security and privacy communities to push the Do Not Track standard as an answer to the problem of pervasive online tracking by ad companies and other entities has resulted in the major browser vendors including DNT as an option for users, giving them a method for telling advertisers and Web sites their preferences on tracking. But DNT may well have outlived its usefulness and needs to be replaced by something that's more effective and efficient, security experts say
Data centers play fast and loose with reliability credentials (IT World) The Uptime Institute says some data centers are getting creative with their reliability claims
Marketplace
These Companies Build The Technology Used To Spy On You (Forbes) Privacy International has released a collection of 1,203 documents on the private surveillance sector, detailing mass surveillance technologies capable of covertly collecting millions of emails, text messages, and phone calls on citizens around the world. The documents mention two companies known for selling Internet monitoring technology and unpublished software vulnerabilities to the U.S. National Security Agency
DoD tasks innovation experts with stretching out technology dollars (Federal News Radio) The Pentagon has fewer dollars to invest in technology, but it's trying to make the best of a bad situation, officials say. Among the military's efforts to cope with declining dollars is a greater emphasis on making use of commercial technologies and using the process of innovation to improve the acquisition process itself
Lunarline Added to Inc. 5000 List (Hispanic Business) For the fourth year in a row, Lunarline, Inc. is named to the Inc. 500|5000 list ranking at No. 2393
Profit, Not Just Principle, Has Tech Firms Concerned With NSA (NPR) Along with the privacy advocates and the national security establishment, there is another set of players with strong views on NSA surveillance programs: U.S. tech companies
Worldwide Acquires Interest in Cyber Security Company (MarketWired) Worldwide Internet, Inc. (OTC Pink: WNTR) announced today that it has completed the acquisition of an interest in Encryption Solutions, Inc
Nokia's Finland HQ To Become A Microsoft Site Next Year, After Devices & Services Sale (TechCrunch) The wheel of fortune symbolism is clear: as Apple prepares to break ground on a new UFO-esque HQ, the former kingpin of mobile is quietly preparing to move out of its own headquarters — to make way for Microsoft. Nokia will be moving out of its current headquarters in Espoo, Finland, once the sale of its Devices & Services unit to Microsoft goes through in Q1 next year
Products, Services, and Solutions
Secure Dropbox data using a hardware security token (Help Net Security) Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they leave the device
FireEye Introduces New Cloud-Based Email Threat Prevention (ComputerWorld) FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, has announced the introduction of FireEye® Email Threat Prevention™, a new cloud-based email security platform. With no hardware or software to install, FireEye now offers a flexible deployment option to protect enterprise infrastructure from email-based attacks. FireEye Email Threat Prevention will be generally available in early December 2013
Apriorit Reversing and Research enabled Windows 7 — Android virtual OS runtime switching on a single device (OpenPR) Apriorit and Electronics and Telecommunications Research Institute (Korea) teamed on the ViMo project whose main goal was to satisfy the need for BYOD and provide users with fully isolated business and personal environments in order to protect corporate data and business processes from being compromised
ThreatTrack Security Introduces ThreatAnalyzer 5.0 (Dark Reading) ThreatAnalyzer detonates executable files and URLs in a monitored environment to analyze threats and determines the risks they pose to a network
Injazat and Thales collaborate to bring innovative cybersecurity services to the UAE (Albawaba Business) Injazat Data Systems and Thales are collaborating on an advanced and innovative Cybersecurity offering for UAE companies
Technologies, Techniques, and Standards
Electric industry responds to grid attack (FierceSmartGrid) Cyber and physical threats are constantly evolving and require quick action and flexibility that comes from constant vigilance and collaboration between government and industry. Reviewing the security response to the grid's critical components during a disruptive, coordinated attack on the grid in a simulated exercise helps the industry make the electric system more secure
Co–ops Join Industry Grid Drill (ECT.COOP) An industry-wide drill to simulate a cyber attack on North America's electric grid played out this month and dozens of electric cooperative staffers took part
Are The Days Of Unencrypted HTTP Numbered? (TrendLabs Security Intelligence Blog) Throughout all of 2013, there have been numerous revelations about how the NSA conducts mass surveillance on the Internet. These have sent the Internet Engineering community reeling. Protocols that have been in use for decades and based heavily on intrinsic trust have had that trust violated
How to build a website security programme (ComputerWeekly) The key to improving a web security programme is having a comprehensive metrics programme in place — a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road
Employee Social Media Posts, iCloud Use, Government Leaks — Your Questions Answered (Cyveillance Blog) We've received some great feedback and questions from our recent webinar on "The Impact of Social Media on Information Security," and wanted to share responses to them with a broader audience. In this webinar, we discussed how social media websites and other user-generated content platforms can easily enable employees to leak sensitive information and data and some advice for security professionals on how they can deal with this
Internet Territories: Introducing IP Infection Maps (Umbrella Security Labs) When it comes to network security research, we usually find ourselves looking at wide IP address sets. Often, we're interested in understanding the distribution of the IP addresses we are looking at in terms of geolocation as well as IP prefixes/ranges
Best practices for businesses to secure their IT infrastructure (Help Net Security) 'Tis the season for reflecting on another year's success, kicking off 2014 planning and preparing for…security attacks
Detect and respond: How organizations are fighting off targeted attacks faster (ComputerWorld) It doesn't matter how high, deep, or long the IT walls are that security pros build around their networks, it seems attackers find ways to fly over, dig under, or drill through. The most recent Verizon Data Breach Investigations Report found that more than 50 percent of all breaches were caused by some form of hacking — and it took months to years for more than two thirds of successful breaches to be detected
Design and Innovation
Twitter Tests Cleaner Web Client Design With More Prominent Logo And Tweet Composer (TechCrunch) Twitter is testing a new website design, which opts for a lighter, flat design that seems at least partly inspired by its shift to similar design trends on mobile. The screens below were sent in by Boris Bošiak, founder of Czech startup Reservio, who is apparently part of a small pool of users being seeded with the new design
Research and Development
Patent Issued for Methods and Apparatus for Information Assurance in a Multiple Level Security (MLS) Combat System (Hispanic Business) A patent by the inventors Hodges, Rother V. (Wakefield, RI); Luvara, Patrick A. (East Greenwich, RI), filed on September 23, 2009, was published online on November 12, 2013, according to news reporting originating from Alexandria, Virginia, by VerticalNews correspondents
Academia
Google encourages teens to contribute to open source projects (Help Net Security) For the fourth year in a row, Google has organized its Code-in contest for pre-university students to contribute to open source projects
Lockheed Martin Sponsors Cool Careers in Cybersecurity for Girls Workshop at University of Maryland (Washington Exec) University of Maryland College Park will welcome more than 350 middle school students at the Cool Careers in Cybersecurity for Girls Workshop sponsored by Lockheed Martin, in partnership with the Maryland Cybersecurity Center and the National CyberWatch Center
Lockheed, LifeJourney strike partnership to bolster Cyber and STEM awareness (Baltimore Business Journal) Lockheed Martin has struck a partnership with a Baltimore-based company that works to foster interest among area high school students in careers in science, technology, engineering and math (STEM)
Legislation, Policy, and Regulation
FSB's Olympic Spying (The Moscow Times) As the date for the Olympic Games in Sochi draws closer, Russia's siloviki are becoming more active in terms of collecting data from Russians and foreigners. Although they can at least partially justify their decision to register every Russian who comes to Sochi during the Olympics with the desire to prevent terrorist attacks, the decree that Prime Minister Dmitry Medvedev signed Nov. 8 has no relationship whatsoever to that goal
Chinese cyber spying may justify sanctions: US panel (AFP via Yahoo! News) A US panel raised the specter of sanctions against China, warning Congress that Beijing has not curbed its rampant spying on American interests, a major national security concern
Spying on President Susilo Bambang Yudhoyono's wife a step too far by ASD (Sydney Morning Herald) As Edward Snowden's trove of secrets from the US National Security Agency seeped out into the media, the revelations about America's and Australia's electronic espionage from Jakarta and their other embassies drew a reflexive response in Indonesian elite circles
Indonesia suspends cooperation on people smuggling as Tony Abbott expresses 'deep and sincere' regret over spy reports (Australian Broadcasting Corporation) Indonesian president Susilo Bambang Yudhoyono says all military and intelligence cooperation with Australia is on hold until he gets a proper explanation as to why Australian spies tried to tap his phone
US NSA chief on India visit today (Times of India) General Keith Alexander, director of US' now infamous National Security Agency (NSA), will be on a quiet trip to India on Thursday, where he will meet national security adviser (NSA) Shivshankar Menon and other senior officials in the national security establishment. Both American and Indian officials are tight-lipped about the visit, so it is not immediately clear the trip's purpose
German intelligence agency to step up counterintelligence —official (Reuters via Chicago Tribune) Germany's domestic intelligence agency is planning to expand its counterintelligence operations to include friendly countries following revelations about the United States' extensive spying program, a senior German security official said
US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data (The Guardian) The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden
Senators want to use Defense bill to force NSA disclosures (The Hill) Three Democratic senators are pushing an amendment to the Defense authorization bill that would require more disclosures about the National Security Agency's surveillance programs
NDAA cloud interoperability language doesn't pertain to intelligence community, says White House (FierceGovIT) The White House says it interprets proposed legislative language regarding Defense Department supervision of cloud computing solutions for intelligence analysis as not "intending to supersede" an ongoing intelligence community unified cloud architecture effort
Reform the NSA to stop future Snowdens (ZDNet) An agency like the NSA can't operate if all its work is going to be exposed to the world. Whatever reforms we make to their practices, the NSA must tighten their internal security first
How Will Fraud Impact U.S. Bitcoin Regulation? (Storefront Backtalk) U.S. regulators this week tackled the tough issue of regulating virtual currencies such as Bitcoin. The Senate Committee on Homeland Security and Government Affairs heard from Justice Department officials, who say they need help regulating digital currencies as well as Bitcoin proponents, who say the government should stay out
Central government cyberspies step up surveillance of ethnic groups with new language–tracking technology (South China Morning Post) Sophisticated new system allows tracking of messages in language of all mainland's ethnic groups
U.S. Army to Track Employees' Web Activity to Thwart Future Snowdens (Mashable) The U.S. Army plans to monitor the online behavior of its employees with tracking software that will be woven into Army Network 2020, an in-house computer network set to launch in seven years
Litigation, Investigation, and Law Enforcement
AFP remain in Indonesia amid cyber–attack (Sydney Morning Herald) Australian Federal Police Commissioner Tony Negus has refused to comment on whether officers serving in Indonesia will be withdrawn amid the country's ongoing diplomatic row with Australia
Brilliant But Evil: Gaming Company Fined $1 Million For Secretly Using Players' Computers To Mine Bitcoin (Forbes) Back in April, an online gamer noticed that his computer seemed to be working harder than it should be given what he had running on it. When he checked his logs, he realized that his computer, much to his surprise, had joined a Bitcoin mining pool in the Czech Republic and was helping someone to mine the cryptocurrency. The activity was being conducted by a client he had downloaded from E-Sports Entertainment Association
[Special report] The truth of Cyber Command's political interference (The Hankyoreh) Cyber Command has claimed that online messages were employees' personal activity, not official operation
Feds Charge Cybercriminals as 21st Century Racketeers (Wired) Until it closed two years ago, Carder.su was an online cybercrime forum used by some 7,900 fraudsters around the world. The site was allegedly headed by a Russian named Roman Zolotarev, and it boasted a slew of high-end vendors and
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
New Resources to Grow Cyber Security Companies in Maryland (Rockville, Maryland, USA, Nov 25, 2013) Learn about new resources available locally to grow your cybersecurity company, including the Maryland Cybersecurity Investment Incentive Tax Credit and the Montgomery County Supplemental Incentive Program for qualified Maryland cybersecurity companies (QMCC). The Maryland Department of Business & Economic Development (DBED) will begin accepting applications from QMCC on December 9 - so now is the time to apply to be eligible for a portion of the $3 million program that offers a refundable tax credit to QMCC that seek and secure investment from in-state or out-of-state investors. Information will also be available regarding the Maryland Employer Security Clearance Cost (ESCC) Tax Credit for security clearance administrative expenses, SCIF costs and first year leasing and get the latest update on the new National Cybersecurity Center of Excellence at NIST.
Cyber Education Symposium (Arlington, Virginia, USA, Nov 19 - 20, 2013) Both the public and the private sectors suffer from a lack of highly trained and effective cyber security leaders. In response, the government, businesses, and academic institutions are all exploring ways to retrain the existing workforce and develop a new pool of cybersecurity professionals capable of meeting the needs of tomorrow. The Cyber Education Symposium offers a rare opportunity for the brightest minds in government (.gov), the private sector (.com), and the educational community (.edu) to convene and discuss trends and challenges in cybersecurity education. The Symposium will provide a forum to identify new ways of thinking about the problem, exchange best practices, and forge a pathway forward that leverages the full resources of our nation's leadership.
APPSEC USA (New York, New York, USA, Nov 18 - 21, 2013) Welcome to Appsec USA 2013, New York - a world class software security conference for developers, auditors, risk managers, and entrepreneurs, bringing you the world's top speakers, the most relevant security topics and an unbeatable atmosphere. Hosted by OWASP.
Oil and Gas Cyber Security 2013 (London, England, UK, Nov 25 - 26, 2013) It has been stated that by 2018 the oil and gas industry will be spending up to $1.87 billion on cyber security. The hugely increased demand to protect a multi-billion dollar global industry is being spurred on by the ever growing cyber threat across the globe. It is against this backdrop that SMi are launching their 3rd annual Oil and Gas Cyber Security 2013 conference.
IT Forum Expo/Black Hat Regional Summit (, Jan 1, 1970) Black Hat Regional Summit will introduce a mix of local in-region experts and researchers from around the globe, discussing the latest trends in information security with an audience of peers. The sessions will provide candid insight and education for IT security professionals.
DefCamp 2013 (Bucharest, Romania, Nov 29 - 30, 2013) DefCamp is one of the most important conferences on hacking & information security in South-East Europe, bringing hands-on talks about latest research and practices from the INFOSEC field, gathering under the same roof security specialists, entrepreneurs, academic, private and public representatives in the high energy atmosphere of Bucharest, Romania.
2nd Annual East Africa IT and Cyber Security Convention 2013 (Nairobi, Kenya, Nov 28 - 29, 2013) The 2nd Annual East Africa IT and Cyber Security Convention 2013 will bring together leading Cyber and IT Security experts who will provide key insights into critical cybersecurity issues surrounding cyber networks, mobile, and IT infrastructures. Enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure is a challenge that must be met, attend the East Africa Cyber Security and IT Security Convention 2013 that will equip you with a comprehensive range of clarifications and solutions.
Operationalize Threat Intelligence (Webinar, Dec 4, 2013) Security teams are overloaded with threat feeds. It doesn't end with third party providers. It includes alerts, logs, and tips from their own security and IT solutions. We need help transforming this data into knowledge so we can act. Attendees will learn concepts and best practices that enable organizations to reduce, prioritize and operationalize threat intelligence.
Cloud Security Alliance Congress 2013 (Orlando, Florida, USA, Dec 4 - 5, 2013) The CSA Congress is the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.
SINET Showcase: THE SINET 16 (Washington, DC, USA, Dec 4 - 5, 2013) The SINET Showcase is supported by the Department of Homeland Security, Science & Technology Directorate and provides a significant opportunity for industry's most innovative global entrepreneurs to present in front of 350 sophisticated investors, buyers and researchers from the commercial and government markets. If a company is selected as one of the SINET 16, it will not only be recognized at the event, but receive access to prospective investors and customers as well. Please note that the deadline to apply for the SINET 16 is August 15th.
The 8th International Conference for Internet Technology and Secured Transactions (London, England, UK, Dec 9 - 12, 2013) The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution.
World Congress on Internet Security (London, England, UK, Dec 9 - 12, 2013) The WorldCIS-2013 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
ACSAC 2013 (New Orleans, Louisiana, USA, Dec 9 - 13, 2013) The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences.
2013 ASE International Conference on Cyber Security (Orlando, Florida, USA, Dec 10 - 15, 2013) The annual ASE Cyber Security Conference is a leading international forum for cyber security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cyber security. The First ASE International Conference on Cyber Security provides a key forum for researchers and industry practitioners to exchange information regarding advancements in the state of art and practice of cyber security.
Cyber Defense Initiative 2013 (Washington, DC, USA, Dec 12 - 19, 2013) NetWars Tournament runs over an intense two- to three-day period, at a conference or hosted onsite. Many enterprises, government agencies, and military bases are using NetWars OnSites to help identify skilled personnel and as part of extensive hands-on training.