The CyberWire Daily Briefing for 3.4.2013
Two more Java 6 and 7 zero-days were being exploited in the wild late last week. Oracle will fix Java 7 soon, but observers consider a patch for Java 6 unlikely.
Evernote has been attacked, and some 50 million passwords were reset after usernames, email addresses, and encrypted passwords were stolen. Cloudflare succumbed briefly this weekend to a distributed denial-of-service attack on one of its customers.
Cyber riots affect sites in New Zealand and the Philippines. The Australian Tax Office is found to store passwords in plain text.
Dell SecureWorks' sinkholes identify more Chinese espionage. The mix, opportunistic or not, of espionage with traditional organized crime causes US authorities to puzzle over the motivation of particular attacks.
Romania thinks it knows which foreign government is behind MiniDuke, but it's playing its findings close to the chest.
Anonymous is active again in various protests, notably against the Federal prosecutor who pursued Aaron Swartz. ZDNet foresees hacktivism becoming easier, more diffuse, and more pervasive—"Anonymous has become the Hello Kitty of hacktivism"—and says that Anonymous' goals have become so broad that anyone can become a target.
US Federal budget sequestration is expected to slow payments to contractors, but also to hasten migration to the cloud as a cost-cutting measure. Cyber Command is not expected to be immune to short-term budget pain. Raytheon joins Lockheed Martin in the US Department of Homeland Security's Enhanced Cybersecurity Services stable. HP plans to lay off another 15,000 workers.
DARPA pushes advanced speech recognition research.
Notes.
Today's issue includes events affecting Australia, China, Iran, Israel, Japan, Malaysia, Morocco, NATO, New Zealand, Oman, Philippines, Romania, Sri Lanka, and United States..
Cyber Attacks, Threats, and Vulnerabilities
Zero-day exploit hits Java 7 and end-of-life Java 6 (CSO) Time to disable Java browser plugins until Oracle releases a patch, but Java 6 users should not hold their breath. Just two weeks after Oracle released its latest critical patch updates, attackers have found a previously unseen flaw in Java 6 and 7 to compromise computers.Researchers at security firms FireEye and CyberESI last week discovered the new Java attack, which successfully exploits flaws in Java 6 Update 41 and Java 7 Update 15 -- the most recent versions of Java that Oracle released on February 19
Zero Day Java Vulnerability Allows McRat Trojan Infections (InformationWeek) Security experts urge users of latest versions of Java 6 and 7 to disable Java in their browsers until Oracle releases a patch. A newly discovered zero-day vulnerability in the most recent versions of Java 6 and Java 7 is being actively exploited by attackers to install malicious software on vulnerable PCs
Evernote hacked - almost 50 million passwords reset after security breach (Naked Security) Evernote, the online note-taking service, has says that it has suffered a serious security breach which saw hackers steal usernames, associated email addresses and encrypted passwords
Evernote shoots itself in foot over 'never click on 'reset password' requests' advice (Naked Security) Have you taken a close look at the email that Evernote has sent out, with the subject line "Evernote Security Notice: Service-wide Password Reset"? It looks like the hacked company has made a blunder
CloudFlare security service goes down after router failure (CNet) The hour-long outage occurred when the Web security service detected a DDoS attack against one of its customers and tried to defend against it. Web security service CloudFlare was offline for about an hour this morning due to a systemwide failure of its edge routers. The outage, which began around 1:47 a.m
Zionist Federation of New Zealand Hacked by Moroccan Ghosts (Softpedia) Hacktivists of the Moroccan Ghosts group have breached and defaced the website of the Zionist Federation of New Zealand (zfnz. org. nz), an organization that aims at facilitating the growth of Zionist activity
Hackers from Malaysia, Philippines go on cyber war! (theborneopost) The conflict in Lahad Datu between the followers of Sultan of Sulu and Malaysian forces has spilled over to the web. Several websites of Philippine local governments have been hacked by the so-called Anonymous Malaysia with the message: Well, its time for us to PEACE and stop attacking each other. To end up this way, this is our last defacement and from now on none of us will step or touch ur (sic) country site and none of you are able to touch our country site
The taxpayer-funded plain text password store (ZDNet) There are so many sites that store passwords in the clear that normally when I come across one, I make a mental note to never trust it with anything too important, or to find a similar service that actually does care about security. However, as Alex North has recently discovered, when it's your own government's taxation office and it somehow believes that it's following best practice, a seething ball of rage slowly worked its way up from my spleen. The Australian Taxation Office (ATO) has been storing passwords in plain text
Scammers use Google glasses as lure (Help Net Security) The great interest that the upcoming release of Google glasses has generated in the public is being actively exploited by cyber scammers, warns Trend Micro. Counting on the fact that users will be googling for information about them and ways to procure them, they have poisoned the search results for "free Google glasses" with links that take to survey scams
Argentina's Ministry of Education for the La Rioja Province Hacked (Softpedia) An Anonymous hacker using the online moniker Libero has breached and defaced the website of Argentinas Ministry of Education for the La Rioja province (educacionlarioja. gov. ar), E Hacking News informs. In addition, he has defaced the main site and several subdomains of the Municipality of Puerto Madryn (madryn
Anatomy of a 'feature' - what happens if a website grabs all your disk space? (Naked Security) HTML5 allows websites to save data on your hard disk for the next time you visit. Much like cookies, only different. The cookie system in HTTP has two big disadvantages compared to what's generally referred to in HTML5 as Web Storage
Sinkholes reveal more Chinese-hacked biz - and piggybacking crims (The Register) Researchers have identified yet more high-profile organisations attacked by spying Chinese hackers after seizing hold of the miscreants' command-and-control servers. Dell SecureWorks Counter Threat Unit (CTU) said that its tactic of "sinkholing" spyware-controlled systems is great for identifying custom malware and warning victims. It typically involves taking over the criminals' domain names to trick their armies of malware-infected computers - known as botnets - into communicating with the researchers' servers
As Hacking Against U.S. Rises, Experts Try To Pin Down Motive (New York Times) American intelligence officials believe that the greater danger to the nations infrastructure may not even be China, but Iran, because of its avowal to retaliate for the Stuxnet virus created by the United States and Israel and unleashed on one of its nuclear sites. But for now, these officials say, that threat is limited by gaps in Iranian technical skills
Asia on the Front Line of China's Cybersecurity Threat (RFA) An American computer security firm that has traced a series of cyberattacks across the globe to the Chinese military says Asia may be more vulnerable than previously thought to Beijing's economic espionage operations, even as experts see the region beefing up its cybercapabilities. Mandiant Corp. last week published the extraordinary details of hacking attacks it believes were masterminded by a unit of the People's Liberation Army to steal commercial secrets from at least 141 entities worldwide, but mostly inside the U.S., over the last seven years
Unmasked, but Unfazed—Chinese Hacking Group Is Still Active (Technology Review) The computer hacking group accused last week of being part of a specific unit of the Chinese military is apparently unfazed by the public attention triggered by a detailed report on its activities published by the security firm Mandiant. Another
Romania believes rival nation behind 'MiniDuke' cyber attack (Yahoo News) Romania believes another state was behind the "MiniDuke" cyber attack that hit its national security institutions as well as NATO and other European countries, its SRI secret service said on Friday. It did not say which foreign power it suspected
OpAngel: Anonymous to Protest in Boston, Demands the Resignation of Carmen Ortiz (Softpedia) The hacking part of OpAngel, the campaign initiated after the death of Reddit co-founder Aaron Swartz, has become OpLastResort. However, OpAngel continues with live protests. Anonymous calls on its supporters to protest against the treatment of Aaron Swartz by the US Department of Justice during his prosecution, on March 4, at 3PM ET, in front of Bostons Federal Courthouse
Hackers use corporate attacks as staging grounds for other cyber assaults (CSO) "There may be law enforcement watching it," said Charles Shugg, retired Brigadier General of the Air Force who once headed the U.S. Air Force Cyber Command, and spoke yesterday on a panel at the RSA Conference on the topic of how far IT managers can go to "hackback" against network attackers they happen to detect. But you might be stepping into something bigger than you know, because "an undercover agent may witness crimes taking place and not stop them in hopes of getting them," said Shugg
Security Patches, Mitigations, and Software Updates
Apple bans outdated Adobe Flash plugins from Safari (Naked Security) Last week, Apple showed that it is getting more serious about security by getting strict about the version of Flash you're allowed to use in Safari. Paul Ducklin explains the what and the why
Cyber Trends
The sequester will hurt tech nationally (IT World) Federal IT spending will fall, but cutbacks may accelerate shift to cloud
Firms see smartphones as weak link in cybersecurity (Eur Activ) The explosion in smartphone use is leaving businesses vulnerable to cyberattacks since almost half of their employees' mobile phones can become a target, according to new research. The 2012 Cyber Security Risk Report published by Hewlett-Packard at the recent RSA security conference in San Francisco found that mobile phone vulnerabilities rose significantly (68%) from 2011 to 2012, mirroring the growth of mobile applications and the use of smartphones. Of the mobile applications tested by HP, 48% of them were found to be vulnerable to unauthorised access
Beware! Anonymous has become the Hello Kitty of hacktivism (ZDNet) If you think hacktivists are a problem now, just wait. The tools are becoming increasingly easy to use, and the hacktivists increasingly stupid making everyone a target. Apparently, last week's hack of an Australian Broadcasting Corporation (ABC) website wasn't an "official" operation by Anonymous inasmuch as anything about that un-organisation can be said to be official but just a lone hacktivist jumping on the bandwagon
Forrester: Majority of 'private clouds' aren't clouds (FierceCIO: TechWatch) A new report by Forrester Research highlighted how up to 70 percent of what are being touted as private clouds are actually not so private. Indeed, for users who have ever wondered about this, a highly virtualized environment where business users can gain access to virtual machines should not be considered a private cloud
Licensing, management of mobile devices present huge challenge to enterprises (FierceMobileIT) Only 60 percent of enterprises track who is accessing their network remotely and how long they spend on the network, according to a survey from earlier this year of 250 IT asset managers who are members of the International Association of IT Asset Managers
Marketplace
Pentagon Cuts Hit Accounts That Pay Lockheed To Raytheon (Bloomberg) The Pentagon has offered little guidance to contractors that may be hurt by $46 billion in defense spending cutbacks over the next seven months, even as a budget document showed the effect on procurement accounts that pay companies from Lockheed Martin Corp to Raytheon Co
Rhetoric Cools On Near-Term Pain Of Cuts (Wall Street Journal) After warning that across-the-board spending cuts would have catastrophic effects, White House officials are trying to play down fears that people will suffer hardships right away, instead preparing them for a fight that won't be quickly resolved
Parties Seek To Avoid Shutdown (Washington Post) It would provide funding through the end of the fiscal year on Sept. 30, allowing new flexibility to the Pentagon to manage the $40 billion hit the military took Friday but otherwise locking in the sequester's lower spending levels
Sequestration Positions Cyber Command for a Fall (Nextgov) Mandatory, across-the-board decreases in funding will spare the salaries of uniformed Cyber Command members, but many of those personnel will be focused on sequester planning rather than operations. Meanwhile, their civilian peers face furloughs
Asia Pacific banks step up risk IT spending (Finextra) Nearly two thirds of Asia Pacific banks expect to see their risk management technology budgets grow this year, according to research from IDC Financial Insights. Of 40 chief risk officers and their deputies, from banks in 11 countries, 62% say that their IT budget will rise this year, with more than a third projecting growth of at least seven per cent. Another third say their budgets will be flat, with just 2
Oman summit to focus on cyber strategies (Trade Arabia) The two-day Cyber Defence Summit-Mena set to begin in Oman tomorrow, will discuss…providers like F-Secure, BAE Systems Detica, Cassidian and Commendo
Raytheon collaborates with DHS to bolster cyber resiliency for nation's most critical infrastructure (MarketWatch) Raytheon RTN +0.18% is collaborating with the Department of Homeland Security (DHS) to operate as a commercial service provider under the recently expanded Enhanced Cybersecurity Services (ECS) program outlined in President Obama's Executive Order on Improving Critical Infrastructure Cybersecurity. ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation or data exfiltration
Lockheed and DHS to Collaborate on Infrastructure Cyber Protection (GovConWire) Lockheed Martin (NYSE: LMT) will soon have access to furnished information from the Department of Homeland Security to support the Bethesda, Md.-based contractor's efforts to protect U.S. infrastructure from cybersecurity attacks
Booz Allen Wins Two Contracts Under an $11B DHS IDIQ (GovConWire) Booz Allen Hamilton [NYSE: BAH] has won two, five-year contracts to provide acquisition life cycle services to the Department of Homeland Security, according to a company statement. The contracts, awarded on November 30, 2012 and February 15, 2013, are part of DHS' $11 billion technical, acquisition and business support services contract vehicle
Procera Networks Named Gold Winner in Info Security Products Guide's Global Excellence Awards (MarketWatch) Procera Networks, Inc. (NASDAQ:PKT) , the global intelligent policy enforcement company, today announced that Info Security Products Guide, the industry's
Why Procera Networks Shares Dropped 30 percent (Motley Fool) Although we don't believe in timing the market or panicking over market movements, we do like to keep an eye on big changes -- just in case they're material to our investing thesis. What: Shares of Procera Networks (NASDAQ: PKT ) dropped today by as
Cisco's Internet Of Everything Plan: 4 Facts (InformationWeek) Cisco CEO John Chambers says the Internet of Everything will change the world. Is he right, or is this just more Silicon Valley hype
SAIC to name technology business Leidos (Washington Post) John Jumper, SAIC's current chief executive, is to head the business. Tony Moraco, who heads SAIC's intelligence, surveillance and reconnaissance group
Yahoo Flap: Should IT Leaders Ban Work At Home? (InformationWeek) Yahoo CEO Marissa Mayer just banned working at home. But she's a CEO of a company in need of turnaround, not an IT leader
The KEYW Holding Corporation - Shareholder/Analyst Call (Seeking Alpha) Leonard E. Moodispaw - Founder, Chairman of The Board of Directors, Chief Executive Officer, President and Chairman of Ethics Committee. Good. All right. We're starting out with the usual disclaimer, and those who heard me do this before -- is Jonathan here? Our SEC counsel is around someplace. He always faints when I do this. But as I admit, I'm a lawyer, so my line is, you shouldn't believe anything I say anyhow, therefore, I don't have to read the disclaimer to you. If anybody objects to that, I can read the disclaimer to you
HP halfway through restructuring, 15K layoffs to go (IT World) HP has reached the halfway point in its restructuring, with 15,000 employees left to cut to meet its layoff target by the end of next year, according to CEO Meg Whitman
Products, Services, and Solutions
Japanese govt: Use operator-run app stores, not Google Play (The Register) Google's security credentials have taken another hit after the Japanese government warned local Android users to download their apps from third party operator-run stores, and not Google's own Play, following the discovery of a prolific info-stealing app on the official site. The Tokyo-based Information Technology Promotion Agency (IPA) alerted domestic Android users last Friday that a rogue app named sexy porn model wallpaper had already been downloaded 500,000 times from Google Play before being spotted and removed
FireEye announces new platform to deal with modern threats (SC Magazine UK) According to the company, the FireEye platform creates a cross-enterprise ... vectors and enable rapid detection, validation and response to cyber attacks
Bitdefender seeks beta testers to try out antivirus software (Telecompaper) Antivirus services provider Bitdefender is seeking beta testers worldwide to try out the latest generation of its antivirus software and win protection for a year for productive feedback. The New Bitdefender blends technologies and new concepts such as
Thales Datacryptor Recognized as Best Encryption Solution in Info Security Products Guide 2013 Global Excellence Awards (IT News Online) Thales, leader in information systems and communications security, announces that Info Security Products Guide, the industry's leading information security research and advisory guide, has named the Thales Datacryptor line of network encryption solutions Gold Winner of the 2013 Global Excellence Awards in the Best Encryption category. The prestigious global excellence awards recognize Thales as a global leader in the security industry with advanced, ground-breaking products and solutions
F-Secure launches one-stop, multi-device security (Help Net Security) A one-stop-shop for multi-device security is here, answering to the growing need for converged security across multiple devices. F-Secure's Safe Avenue allows consumers to easily manage the security
Fortinet adds cloud-based sandboxing and IP reputation services (Help Net Security) At RSA Conference 2013 in San Francisco, Fortinet announced that the company's FortiGuard Labs has launched new cloud-based sandboxing and IP reputation services that are designed to help protect against
Portable USB 3.0 SSD With Suite B hardware encryption (Help Net Security) At RSA Conference 2013 in San Francisco, Spyrus announced PocketVault 3X, a portable USB 3.0 Encrypting SSD featuring the same high-assurance hardware encrypting security designed into their Windows
Firewall management now concentrated on secure application connectivity (Help Net Security) Tufin Technologies announced the results of its annual Firewall Management Survey at RSA Conference 2013 in San Francisco. 200 network security professionals reported that 93.6 percent of all firewall
Dell releases privileged access suite for Unix (Help Net Security) At RSA Conference 2013 in San Francisco, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies with a single
Radware launches cloud-based DDoS attack mitigation system (Help Net Security) At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to saturate a customer's Internal
Why the upcoming release of Windows Blue matters (FierceCIO: TechWatch) We reported last week about rumors surrounding Microsoft's next version of the Windows operating system, which will be known as "Blue." At least one source claims it will be free, and with a release date pegged to later this year. This appears to corroborate reports from last year that Microsoft (NASDAQ: MSFT) is working on annual updates for Windows
Silver Peak Cuts Amazon Cloud Data Movement Costs (InformationWeek) Virtual appliance compresses cloud data, eliminates duplicate copies to make moving data out of AWS faster, less expensive
Technologies, Techniques, and Standards
A Vulnerability Disclosure Game Changer (Dark Reading) Two new ISO standards will push third-party developers, online service providers and even hardware vendors to stop ignoring vulnerability disclosures
Sharpening Endpoint Security (Dark Reading) Some tips on how to protect the most vulnerable parts of your IT infrastructure: the endpoints and the unpredictable users who control them
RSA: Do You Need Mobile Anti-Virus? (eSecurity Planet) Top hackers debate mobile security at the RSA 2013 security conference. Mobile security is a top concern for many in the modern era of smartphone pervasiveness. Yet according to a panel of mobile security experts at the RSA conference this week, a lot of the
One woman's escape from a hacked email account (Daily Herald) Kelly Brown, owner of Four Seasons Redesign in Sleepy Hollow, awoke Monday to find her Yahoo account for her business had been hacked. Her contact list was gone and so was much of her mail from that day. The culprit then masqueraded as "Kelly Brown," used a couple of fake email addresses and dressed them up with her company logo
Design and Innovation
Security Tools Show Many Dots, Few Patterns (InformationWeek) Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations. "What do you want to know?" Great question, right? Then why do few security products -- or rather, the developers, product managers, and vendors who build them -- ask that question of their customers? Instead, your firewall, intrusion detection system, antivirus management console, LAN manager, or other security tool report tells you about its day: The quantity of events it's detected, whether antivirus is activated, which country seems to be lobbing the most attacks your way
Research and Development
Darpa Wants You to Transcribe, and Instantly Recall, All of Your Conversations (Wired Danger Room) The Pentagon's blue-sky researchers are funding a project that uses crowdsourcing to improve how machines analyze our speech — and let you easily record, transcribe and recall all the conversations you ever have
The top 10 unsolved ciphertexts (Naked Security) For over 12 centuries an intense battle has been fought between the code-makers and the code-breakers. But despite decades of cryptanalysis, there are many ciphertexts which have gone unsolved, leaving us in mystery. Here's our top ten list, can you solve them?
Legislation, Policy, and Regulation
Australia joins convention on cybercrime treaty (ZDNet) Australia has now officially joined 38 other nations as part of an international cybercrime treaty designed to assist international collaboration against online crimes. Last year, Australia passed the Cybercrime Legislation Amendment Bill 2011 as part of the prerequisites to become a party to the Council of Europe Convention on Cybercrime. While extending the scope of Commonwealth-related computer offences, it also, controversially, required internet service providers (ISPs) to store customer data on persons deemed under suspicion by law-enforcement agencies
ITA launches the first Regional Cyber Security Center (AME info) The Information Technology Authority (ITA), represented by the Oman Computer Emergency Readiness Team (OCERT), launched the Regional Cyber Security Center yesterday at ITA's headquarters located at KOM3 in the Knowledge Oasis Muscat. OCERT has been designated to host the Center, as per an agreement signed in December 2012, between ITA and the International Telecommunication Union (ITU) and the Organization of IMPACT to be the first ITU Regional Cyber Security Center. The launch ceremony was held under the auspices of H.E. Dr. Ali bin Masoud Al Sunaidy, Minister of Commerce & Industry and Chairman of the Information Technology Authority, along with the presence of some ITA Board Members, Dr. Salim Sultan Al Ruzaiqi, CEO of ITA, Mr. Houlin Zhao, Deputy Secretary-General of the International Telecommunication Union (ITU), and Datuk Mohammed Noor Amin, Chairman of IMPACT Organization
Cyber war crucial to edge in regional arms race (AFR) Australia risks losing a regional arms race unless closer links can be forged between the government and the defence industry on countering cyber attacks, the Australian Industry Group Defence Council warns. The councils submission to the federal governments 2013 defence white paper warns Australia will struggle to win a regional arms race unless the Gillard government pursues policies to align defence and industry. Given the more rapid acquisition of advanced military capabilities in our region of primary strategic concern, maintaining a capability edge is going to become much more demanding, it says
IDF forms new force to combat cyber warfare (IDF forms new force to combat cyber warfare) The Israel Defense Forces has defined cyber warfare as the fifth realm of warfare, alongsideland, sea, air and space. The IDF has established a command dedicated to cyber warfare that brings together personnel from the Intelligence Branch and the Teleprocessing Branch to ward off cyber attacks
US retaliation strategy against hackers (SecurityAffairs) The year started very difficult for the U.S. government, his networks have been constantly hit by hackers that for different reasons have tried to steal sensitive information and intelligence secrets. The principal menaces against US come from state-sponsored hackers and hacktivists, in the last months we have read of many cyber attacks, mainly for cyber espionage purpose, that involved also US infrastructures and offices. The US governments is facing with one of the most aggressive cyber campaign against its cyber resources, and exactly as any other countries is working to definition of a series of countermeasure to mitigate the risks related cyber threats
A series of seminars to protect the websites from a cyber attack (SLBC) The Sri Lanka Computer Emergency Responses Forum is preparing to conduct a series of seminars to educate computer users on how to protect the websites from a possible Cyber attack. The Seminars are to be conducted in the initial stage on State
Litigation, Investigation, and Law Enforcement
Newspapers go all-in for copyright fight against clipping service (Ars Technica) Is Meltwater News a search engine or a copycat news service? A copyright battle between The Associated Press and an online news-clipping service is reaching a climax, and the case could have significant implications for fair use. AP sued Meltwater Group last year, arguing the "reputation management" company had a "parasitic business model" that violated copyright. Meltwater is defending the case, arguing that it is merely a search engine
Verizon turns in Baltimore church deacon for storing child porn in cloud (Ars Technica) A deacon at St. Joseph's Church in Fullerton, Maryland, a suburb of Baltimore, was arrested last week for possession of child pornography after Verizon detected images and videos of children performing sexual acts
Kim Dotcom's Megaupload saga takes another turn - FBI wins appeal in extradition case (Naked Security) The Kim Dotcom saga took yet another turn today when the New Zealand Court of Appeal knocked back one of the big fella's earlier minivictories again US law enforcers. Paul Ducklin takes you through the timeline of the story so far, and tries to guess what happens next
Nearly Every NYC Crime Involves Cyber, Says Manhattan DA (The Epoch Times) Think twice next time you need money from a curbside ATM machine, or decide to pay for a meal with a credit card. Prosecutions for cybercrime and identity theft in Manhattan have increased by 50 percent in the last five years, and criminals are rigging ATM machines and scanning your credit cards when youre not looking. Cybercrime is the fastest growing crime trend in New York, and around the country, said Manhattan district attorney Cyrus Vance, during a cybercrime symposium at Pace University on Feb. 28
Public schoolboy hacker who masterminded 15m fraud is put in jail's IT class…and hacks the prison's computer system (Daily Mail) One of Britains most notorious cyber criminals hacked into a prison computer system from inside jail after he was allowed to join an IT class. Nicholas Webber, 21, jailed for five years in 2011 for masterminding a multi-million-pound internet crime site, triggered the security scare during a lesson. It is understood his actions caused major panic but it is not clear what, if anything, he managed to access
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
TechMentor Orlando 2013 (Orland, Florida, USA, Mar 4 - 8, 2013) Celebrating 15 years of educational events for the IT community, TechMentor is returning to Orlando, Florida, March 4-8, for 5 days of information-packed sessions and workshops. Surrounded by your fellow IT professionals, you will receive immediately usable education that will keep you relevant in the workforce. TechMentor track topics include:Windows PowerShell and AutomationCisco and Networking Infrastructure Windows Server Management Windows Client Management Cloud and Virtualization Identity, Access Management and Security Performance Tuning and Troubleshooting Mobility and BYOD Messaging and Collaboration.
IHS CERAWeek 2013 (Houston, Texas, USA, Mar 4 - 8, 2013) IHS CERAWeek 2013 will offer new insight on the energy future -- and on the strategic and investment responses by producers, consumers and policy-makers. What are the changes ahead in the competitive landscape for oil, natural gas, coal, renewables, and nuclear power? How will the global unconventional oil and gas revolution change the game for all energy participants? What will be the fuel and technology choices of the future. Michael Hayden will deliver the keynote. While primarily concerned with the energy sector, the conference may also be of interest to the cyber security industry.
Business Insurance Risk Management Summit (New York City, New York, USA, Mar 5 - 6, 2013) The annual Risk Management Summit, now in it its fourth year, provides attendees with focused insight via specific, timely general sessions and strategic, thought-provoking discussions with peers and industry leaders.
CanSecWest 2013 (Vancouver, British Columbia, Canada, Mar 6 - 8, 2013) CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field. We give preference to new and innovative material, highlighting important, emergent technologies, techniques, or best industry practices. It will feature a bigger, enhanced Pwn2own.
e-Crime Congress 2013 (London, England, Mar 12 - 13, 2013) The e-Crime Congress is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security and risk management strategy, safeguarding digital assets and sensitive information, protecting customers, defending against internal or external threats and responding to incidents.
CTIN Digital Forensics Conference (Seattle, Washington, USA, Mar 13 - 15, 2013) Speakers include experts and published authors in the field of digital forensics and cybersecurity. Topics include; Mobile Device Forensics, Internet Forensics, Physical Memory Analysis, Open Source Tools, Data Carving, Registry Forensics, Placing the Suspect Behind the Keyboard, Triage and Live Forensics CDs, and more.
Google and University of Maryland Cybersecurity Seminar (College Park, Maryland, USA, Mar 14, 2013) Dr. Ari Juels, Chief Scientist of RSA, The Security Division of EMC, and Director of RSA Laboratories, will discuss "Aggregation and Distribution in Cloud Security." His talk will feature information on cloud computing and virtualization, a key supporting technology. Cloud computing offers flexibility and agility in the placement of resources. Certain risks, however, arise from cloud services' tendency to aggregate sensitive data and workloads. He will discuss side-channel attacks resulting from the co-location of disparate tenants' virtual machines (VMs) on hosts and the vulnerabilities posed by databases aggregating the authentication secrets, e.g., password hashes, of numerous users. Conversely, cloud computing offers new opportunities to distribute data. Dr. Juels will also describe a new, research-driven RSA product that splits sensitive data across systems or organizations, removing the single points of compromise that otherwise naturally arise in cloud services.
Department of Homeland Security 6th Annual Industry Day (Washington, DC, USA, Mar 18, 2013) The Department of Homeland Security (DHS) will be hosting its 6th Annual Industry Day to provide advanced acquisition planning information to industry. DHS Industry Day will consist of two sessions, the morning session will be procurement-centric with an emphasis on procurement issues, policies and programs. The afternoon session will be Chief Information Officer (CIO) IT-centric. Both sessions will provide acquisition information concerning specific program areas.
IT Security Entrepreneurs' Forum (ITSEF 2013) (Palo Alto, California, USA, Mar 19 - 20, 2013) Supported by the U.S. Department of Homeland Security, Office of Science and Technology, ITSEF 2013 aims to connect the ecosystem of the entrepreneur: industry, government, and academia. The conference will advance innovation, lead change and build trusted global collaboration models between the public and private sectors to defeat Cybersecurity threats.
The Future of Cyber Security 2013 (London, England, UK, Mar 21, 2013) Cyber Security and the Citizen 2013 is a one-day conference and exhibition for senior decision-makers of central and local government organisations, NGOs and major private sector enterprises.
SANS Cyber Threat Intelligence Summit (Washington, DC, USA, Mar 22, 2013) Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusio…Network defense techniques which leverage knowledge about these adversaries - known as cyber threat intelligence - can enable defenders to establish a state of information superiority which decreases the adversary's likelihood of success with each subsequent intrusion attempt…The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.
AFCEA Belvoir Industry Days 2013 (National Harbor, Maryland, USA, Apr 2 - 3, 2013) The purpose of this event is to inform the IT community about the recent successes and the forward-thinking opportunities that the Department of Defense and the Department of the Army have developed.
CSO40 (Braselton, Georgia, USA, Apr 2 - 3, 2013) The CSO40 Security Confab + Awards will honor and share the critical viewpoints of today's leading CSOs, CISOs and security executives at the nation's leading CSO thought leadership conference.
Cloud Connect Silicon Valley (Santa Clara, California, USA, Apr 2 - 5, 2013) Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry experts.
An Evening in Cyberspace: Supporting Tomorrow's Cybersecurity Leaders (National Harbor, Maryland, USA, Apr 6, 2013) UMUC is pleased to present An Evening in Cyberspace: Supporting Tomorrow's Cybersecurity Leaders. Join us for this special black-tie event to support the next generation of cybersecurity students. The evening will feature a reception, dinner, keynote and entertainment.
Cyber 1.3 (, Jan 1, 1970) Maj. Gen. Suzanne Vautrinot, USAF, commander, 24th Air Force, and commander, Air Force Network Operations, will discuss the global strategic implications that relate to the cyber domain at the Space Foundation national conference Cyber 1.3, to be held Monday, April 8th, at The Broadmoor Hotel in Colorado Springs, Colorado. Cyber 1.3 is a full-day conference that takes place immediately before the official opening of the 29th National Space Symposium. The conference includes a networking breakfast, a luncheon and concludes with a networking reception, co-sponsored by General Dynamics Advanced Information Systems. Government Executive Media Group is a Cyber 1.3 media co-sponsor.
HITBSecConf2013 (Amsterdam, the Netherlands, Apr 8 - 11, 2013) HITB2013AMS will feature cutting edge attack and defense research including the a presentation on the inner workings of the iOS 6.1 Evasi0n jailbreak presented by members of the world famous Evad3rs Team, a brand new kernel level exploit affecting _all versions_ of Microsoft Windows up till Windows 8 and even a presentation on remotely hacking airplanes.
INFILTRATE 2013 (Miami, Florida, USA, Apr 11 - 12, 2013) INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere.
Information Tech Expo Series - Hawaii (Oahu, Hawaii, USA, Apr 12 - 19, 2013) This 6-series showcase will feature stops at 5 DoD locations and 1 Intel Center on the island of Oahu. Celebrating 20 years of these expos is a true testament to the government and military's readiness to learn from and work with industry partners. .
InfoSec World Conference & Expo 2013 (Orlando, Florida, USA, Apr 15 - 17, 2013) With the primary objective of providing top-notch education to all levels of information security and IT auditing professionals, InfoSec World delivers practical sessions that give you the tools to strengthen your security without restricting your business.
Infosec Southwest 2013 (Austin, Texas, USA, Apr 19 - 21, 2013) InfoSec Southwest is intended to be a general security and hacking conference with no specific industry or topical focus. As such, nearly all topics (other than vendor pitches) are fair game and the attending audience is expected to span all demographics.
23rd Annual Government Procurement Conference (Washington, DC, USA, Apr 25, 2013) This unique one-day event attracts more than 3,000 participants representing government agencies, prime contractors and small businesses from around the country. Participating companies are able to network with procurement officials from federal, state and local government agencies under one roof.
Interop Las Vegas (Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest technology.
Maryland/DC Celebration of International Trade (Linthicum, Maryland, USA, May 21, 2013) Join Maryland exporters and international business experts as they celebrate International Trade Week. Hosted by the Maryland/DC District Export Council this event is a content rich celebration of international trade. Participate in expert discussions lead by manufacturers, legal, financial, transportation and industry experts as well as government leaders in eight vertical tracks for a total of 24 highly interactive 90 minute sessions.
Consumerization of IT in the Enterprise Conference and Expo (San Francisco, California, USA, Jun 2 - 4, 2013) From smartphones to mobile apps, social software and 4G networks, the wave of innovation in the consumer space is transforming the way companies do business, both inside and outside of the enterprise. Over two and a half action packed days, CITE 2013 will bring together IT and business executives, venture capitalists and other practitioners to showcase leading efforts and teach others how to make the most of this transformation.
25th Annual FIRST Conference (Bangkok, Thailand, Jun 16 - 21, 2013) The annual FIRST conference provides a setting for conference participants to attend a wide range of presentations delivered by leading experts in both the CSIRT field and from the global security community.
SECRYPT 2013 (Reykjavik, Iceland, Jul 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network security, including applications within the scope of knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises. It will bring together researchers, mathematicians, engineers and practitioners interested in security aspects related to information and communication.
TechCrunch Disrupt San Francisco (San Francisco, California, Sep 7 - 11, 2013) For the fourth year in a row, TechCrunch Disrupt will take over the San Francisco Design Center Concourse, and we're bringing the hottest startups and best minds in the industry with us. Block off September 7-11 on your calendar, because you're not going to want to miss Disrupt SF 2013. The Hackathon kicks everything off, followed by our main event, which starts every morning with panels of special speakers and guests, one-on-one chats featuring TechCrunch writers and editors, special guest speakers and judges, leading venture capitalists and fascinating entrepreneurs addressing the most important topics facing today's tech landscape. In the afternoons, the Startup Battlefield presentations begin, with the final presentations held on the last day of Disrupt.