The CyberWire Daily Briefing for 4.22.2013
A group calling itself the "Portugal Cyber Army" claims to have accessed and leaked data from both the Hong Kong Police and the Dubai Airports.
CBS News Twitter accounts were hijacked over the weekend by a crank conspiracy theorist who's using them to disseminate suspicious links (as well as crank conspiracy theories).
The Internet Storm Center reports discovering a chargen-based denial-of-service attack, unusual both in that chargen is rarely enabled, and that chargen has seldom been used to execute (as opposed to obscure) an attack.
The Chinese government again denies involvement in cyber espionage. The South China Morning Post hopes for an easing of Sino-American cyber tension (and pressure on Huawei and ZTE business) in a US Government Accountability Office report which the paper takes as minimizing the frequency and severity of cyber attacks on telecommunications networks. But the US Administration continues exploring options for retaliation against Chinese cyber operations, and the US Department of Defense plans to increase spending on offensive cyber capabilities.
Oracle delays planned Java updates to give it more time to address security concerns. A faulty security definition update from Malwarebytes inadvertently disables the systems on which it was installed.
Microsoft disputes an anti-virus testing report that claimed Bing delivered risky search results more often than Google. Sophos offers useful suggestions for handling security incidents.
Last week's vile murder of people innocently attending the Boston Marathon prompts reflections on crowdsourcing criminal investigations, social media reliability, the rise of "digilantism," and CISPA's possible effects on all this.
Notes.
Today's issue includes events affecting Australia, Barbados, China, Denmark, Estonia, Finland, Germany, Israel, NATO, Norway, Portugal, Russia, South Africa, Sweden, Trinidad and Tobago, United Arab Emirates, United Kingdom, United States, and and Zambia..
Cyber Attacks, Threats, and Vulnerabilities
Hong Kong Police Database breached and Leaked on Pastebin by Portugal Cyber Army (SecurityOrb) An interesting article from our partners at HackersNewsOnline.com about the Portugal Cyber Army breaching and leaking the HongKong database
Dubai Airports website 'hit by cyber attack' (ArabianBusiness.com) Dubai Airports' website was hit by an apparent cyber attack that led to the exposure of employees' email addresses and other data. A document posted on the website Pastebin.com by two groups calling themselves The Portugal Cyber Army and HighTech
CBS Twitter Accounts Hacked, Tweeting Suspicious Links (TechCrunch) At least 3 CBS-affiliated news accounts have been hacked, apparently by a rabid conspiracy theorist who wants the world to believe that President Obama is aiding Al-Qaeda. Accounts for @60minutes @48hours, and @CBSDenver have all been hacked, some tweeting suspicious links (don't click on them). Screenshots below. CBS is apparently working with Twitter to get the situation under control
A Chargen-based DDoS? Chargen is still a thing? (Internet Storm Center) In the recent few days there was another denial of service attack launched at financial organizations. (Yeah, I know, DDoS on a bank, that's *totally* never happens). What is newsworthy isn't that it happened, it was the means used to execute the attack. Specifically, the organizations were flooded with UDP port 19 traffic which is the chargen protocol. I am not sure I've ever seen a legitimate use of this protocol or encountered a machine that had it on intentionally before. For review, chargen is basically a character generation protocol that listens on port 19 with TCP or UDP. If you connect to TCP, it continues to stream random characters until you close the connection. With UDP, it will respond with an up to 512 byte response depending on the request. In this particular case, it was another amplification attack using UDP. What makes chargen under UDP so desirable is that you can spoof sources without having to worry about establishing a fake connection and that it responds with packets much larger than the request. In short, if your networks are exposing a service that responds to UDP with packets much larger than the request (DNS in particular is popular these days), take due care that you are doing rate-limiting if those protocols are Internet-accessible. It's not a common attack using chargen and there is some evidence that in a few of the cases in the past few years the attack was used as a smoke screen to hide other attack traffic
New version of Gozi financial malware bundles MBR rootkit (CSO) The malware installs code into the computer's master boot record in order to achieve persistence, Trusteer researchers say
Boston Marathon spam targets Australians: SCAMwatch (CSO) The Australian Competition and Consumer Commission's SCAMwatch is warning people not to click on spam emails claiming to contain links to websites with information about the Boston Marathon explosions
Russian malware mines bitcoins through botnet (CSO) The malware harnesses the computing power of compromised computers to earn bitcoins
China Denies Cyber Spies are Linked to Military Unit (Sacramento Bee) Dr Umbach warns of the increasing cyber attack capabilities of 'rogue states' such as North Korea and Iran, and those of trans-national cyber crime organisations. He warns that the attacks are expected to increase significantly and present highly
LTE: China Hacking into US Computers (Gant Daily) An American computer security firm, Mandiant, completed a study of Unit 61398, and determined most of the attacks on U.S. corporations have emanated from this group. Companies targeted include electric utilities, gas lines and waterworks. The Chinese
Israel contains cyber attack (Oman Tribune) Hackers have launched an assault on Israeli websites, but the damage has been minimal as the Jewish state is prepared to fend off such attacks, one of the country's top cyber experts said on Sunday
Newly Discovered Android Malware Was Downloaded Millions Of Times (TechCrunch) Security firm Lookout has detailed a clever new bit of Android Malware lurking in the Google Play store. The good news: unless you're downloading questionable Russian clone apps, you're probably not affected. The bad news: that hasn't kept it from being downloaded a few million times
Android adware on the rise (GMA News) Bitdefender said its research showed these adware can gather personal data from address book contacts and text messages stored in a mobile phone or tablet, said tech site TechHive, which got a copy of the report. "More and more unknown third parties
Security Patches, Mitigations, and Software Updates
Oracle delays Java 8 release to focus on security (FierceCIO: TechWatch) The original September 2013 target for the release date of Java 8 is no longer achievable, according to Mark Reinhold, chief architect of the Java platform group from Oracle. In a new blog that shed light on Oracle's (NASDAQ: ORCL) efforts to maintain the security of the Java Platform, Reinhold said focusing on security has taken engineers away from working on Java 8. Oracle has been heavily criticized for a string of security flaws discovered in Java recently
Malwarebytes security update disables thousands of computers (FierceCIO: TechWatch) Thousands of computers running anti-malware software from Malwarebytes were inadvertently disabled by a faulty security definitions update early this week
Cyber Trends
Synergistic Challenges Vex Intelligence Community (SIGNAL) When it comes to new geopolitical challenges, the whole is greater than the sum of its parts, and the intelligence community must undertake its own changes to be able to respond to the emerging new world
Southern Africa experiencing increased mobile, Internet banking fraud (CSO) As Internet access costs decline and people flock to the Internet, cybercrime rises
Expert insights 1: Cyber threats and security in the Caribbean 2013 update (ICT Pulse) We revisit our discussion with network/IT security professionals on cyber intrusion and security in the Caribbean, in the hope to gain new insights in 2013. A few weeks ago, the Guardian Newspaper in Trinidad and Tobago published an article, "Caribbean cyberttacks on the rise?", in which it listed 20 cyber crime stories that were reported between April 2012 and March 2013. Unlike previous years, where they might be just a handful of news reports on unauthorised intrusions, at the very least, more of them are finding their way into the public domain, which hopefully is fostering greater awareness of cyber threats and the need for greater vigilance and security
Cyber Criminals Have Small Businesses In Crosshairs, Says Report (Small Business Trends) A false sense of security is one reason small businesses may take less care. An earlier survey by Symantec discovered many small businesses believe they're "immune" to a cyber attack. They believe no one could possibly stand to gain from cyber attacks
Is cyber war the new cold war? (The Nation) NATO's Cooperative Cyber Defence Centre of Excellence (CCDCOE) - a unit based, not by accident, in Estonia, which experienced a massive cyber-attack from Russia in 2007 - distinguishes between "cyber crime,""cyber espionage," and "cyber warfare
Secunia Country Report for Q1 2013: 15% of US Users Had an Unpatched OS (Softpedia) IT security solutions provider Secunia has released Country Reports for Germany, the UK, the US, Denmark, Finland, Norway and Sweden. The studies contain some interesting data on how much vulnerable software is installed on PCs in each country
Marketplace
Military Devotes More Money To Cyber-Attack Capabilities (USA Today) The U.S. military is increasing its budget for cyber-warfare and expanding its offensive capabilities, including the ability to blind an enemy's radar or shut down its command systems in the event of war, according to two defense officials
DoD Request Would Redirect $7.5 Billion (Defense News) The Pentagon is preparing to ask Congress for permission to shift billions of dollars within its already reduced fiscal 2013 budget primarily to pay for increased war costs, but is still looking for ways to fill a $15 billion operating shortfall
Major Furloughs Spur Uncertainty At U.S. Agencies (Washington Post) Employees at agencies including Defense, Labor and the EPA recently have had their furlough days reduced, though uncertainty remains for some
Maryland: It's our turn to get a federal agency (Washington Examiner) The state already hosts the U.S. Cyber Command at Fort Meade, the National Security Agency and the Defense Information Systems Agency, he noted. But if the decision to move the FBI is made for reasons other than the need for "equity" in the region
Homeland Security Acts on Cyber Workforce Recommendations (Nextgov) The Homeland Security Department is working to implement 11 recommendations from an advisory council to better develop, recruit and retain sophisticated cybersecurity talent. In a webinar on Thursday sponsored by Government Executive and Northrop Grumman, Dr. Doug Maughan, director of the cybersecurity division at DHS, said the department is moving forward on 11 recommendations released in October by the Homeland Security Advisory Council's Task Force on Cyber Skills to effectively recruit, retain and train mission-critical cybersecurity professionals
IRS Will Close To Public For Five Days Due to Furloughs (Bloomberg) The Internal Revenue Service will close all of its public operations on five days from now through August because of employee furloughs, acting commissioner Steve Miller told employees in a memo today. The tax agency will be closed and almost all employees will be furloughed on May 24, June 14, July 5, July 22 and Aug. 30, Miller wrote. The closing will affect operations such as the IRS toll-free lines and taxpayer assistance centers
As federal dollars shrink, Lockheed fishes for new revenue streams (Washington Post) Bethesda-based Lockheed Martin is known as the largest defense contractor in the world, building military aircraft, satellites and ships. Now it wants to be a power company. As government contractors see pressure on government spending, they're taking another look at the technology and capabilities they have and finding ways to redirect those skills
Q&A: Lockheed Martin exec lauds Springs workforce (Colorado Springs Gazette) Cybersecurity is part of virtually everything Lockheed Martin Corp. does in Colorado Springs, said Robert Smith, vice president of space and cyber for the defense giant's Information Systems and Global Solutions-Defense operations. Those operations
Huawei, ZTE may benefit from US security report (South China Morning Post) Based on an 11-month probe conducted by the House Intelligence Committee, the October study urged US companies to stop doing business with both Huawei and ZTE for fear of possible spying and cyberattacks by China. ... Both the Federal Communications
DISA Awards $404M Small Business Enterprise IT IDIQ (GovConWire) The Defense Information Systems Agency has awarded four small businesses positions on a potential $404 million contract to help the agency run its enterprise information technology environment. DISA awarded the Information Technology Enterprise Support Services vehicle as a 100-percent set-aside for Small Business
Intel Buys Mashery For API Management Expansion (InformationWeek) Mashery manages APIs for Aetna, Best Buy and The New York Times
Report: Peter Klein to Step Down as Microsoft CFO in June (GovConWire) Peter Klein will leave Microsoft (NASDAQ: MSFT) at the end of June after nearly three years of service as chief financial officer. Klein spent 11 years at Microsoft and the software giant is expected to promote his successor within the coming weeks, Reuters reported Thursday. Before becoming the company's CFO, Klein served as corporate vice
Blackstone Group Cancels Dell Takeover Bid (GovConWire) Blackstone Management Partners LLC has withdrawn its bid to acquire Dell (NASDAQ: DELL) following its due diligence process. Dell's special committee received the notice through Boulder Acquisition Corp., a partner in the Blackstone-led group that submitted a takeover offer in late March, Dell said Friday. Blackstone and its partners offered to buy the computer manufacturer for
What's Riskier Than Bitcoins? Bitcoin Companies (Wired Business) Angel investors and venture capitalists are putting money into the only thing riskier than Bitcoin: Bitcoin companies
The Bitcoin Bubble and a Bad Hypothesis (The National Interest) The sudden drop in the value of Bitcoins, the hot new Internet currency, has added urgency to the question of whether Bitcoin is the way of the future, or just another bubble. Not to keep readers in suspense, the answer is a bubble, but a particularly interesting example of one. In particular, Bitcoin represents what ought to be the final refutation of the efficient-markets hypothesis, which still guides most regulation of financial markets
Products, Services, and Solutions
Siri still a privacy worry despite Apple spelling out policy (CSO) Apple came clean that it keeps anonymous Siri data for two years, but that has not quelled fears about corporate data privacy
Get your privacy ducks in a row with DuckDuckGo (CSO) If you haven't tried the excellent DuckDuckGo yet, now's the time to take this privacy-conscious search engine for a spin
Microsoft Contests Malware Tests, Says Bing Does Not Infect Users (Softpedia) A malware analysis rolled out by AV-TEST a few days ago has revealed that Microsoft's Bing search delivers five times more malware-hosting links than Google
New VDI malware analysis tool aids virtual desktop security (TechTarget) Most VDI shops don't bother with malware threat analysis because virtual desktops are generally considered secure. But malware attacks can happen during the
EC-Council Launches its Latest Innovation, a State-of-the-Art, Fully Automated Cyber Attack Range as Part of the Certified Ethical Hacker Version 8 Training Program (Virtual Strategy) The world's first completely hands-on ethical hacking program with a fully integrated state-of-the-art cyber-attack range will be available in 450 locations in 97 countries around the world on the 20th of May
What you should know before enabling Microsoft's two-factor verification (FierceCIO: TechWatch) Earlier this week, Microsoft announced that two-factor verification would be made available on the 700 million user accounts on its various online services. The new release will apply to entire accounts and include all Microsoft (NASDAQ: MSFT) apps and services--even those designed for competing platforms, such as iOS and Android devices. It will be rolled out over a number of days
VMware Adds Interoperability With Ubuntu OpenStack Cloud (InformationWekk) The next Ubuntu release, coming soon, will include VMware plug-ins for the Quantum networking platform in OpenStack
Technologies, Techniques, and Standards
INET Denver considers Internet life without IPv4 addresses (Ars Technica) After Asia and Europe, North America is next in line to run out of IP addresses
Anatomy of a phish - how to spot a Man-in-the-Middle attack, and other security tips (Naked Security) Even if you are used to phishing scams, it still pays to take the occasional look at a scam campaign, just to remind yourself not to let your guard down
8 tips for a security incident handling plan (Naked Security) Most of us know that there is no such thing as 100% security, and that - unfortunately - it's only a matter of time until a security incident occurs. Despite this, it's rare to see a good incident response process and plan in place
Data, Cloud, Government: The Dangers Of Data Sovereignty (IDG Connect) When Obama signed an extension to the Patriot Act, something interesting happened. People became worried the US would be able to access their data, no matter which country they resided in, because it was kept on the Cloud. When questioned, Microsoft couldn't promise that people's data was secure on their Office 365 Cloud service, because though you may be working from the EU, Microsoft is a US company and has to comply with the rules, and doesn't necessarily have to tell you about it. These rules apply to Gmail, Amazon and a host of others, despite various EU laws preventing this kind of thing, because they are all US companies
Design and Innovation
Blunt Talk For Would Be Entrepreneurs from Demo Panelists (IEEE Spectrum) For the past 50 years, Silicon Valley has long been confused about what it takes to start a company. So says Steve Blank, cofounder of E.piphany and other companies and currently a teacher of entrepreneurship at Stanford and other universities. The culture, he explains, demanded that would-be company founders write a business plan, with five-year projections about their proposed company's growth
As Innovation Competitions Grow, Prize Money Shrinks (InformationWeek) Latest crowdsourced contests aim to attract data scientists with $100,000 prizes -- not yesterday's millions
Research and Development
Machine Learning Susses Out Social-Network Fraud (Dark Reading) Machine learning techniques can be used to detect fraud and spies on social networks based on certain features, such as the number of followers and the number of devices used to access the network. Certain characteristics of social-network accounts have a high correlation with fraud and can be used to differentiate between real and fake accounts, a researcher presenting at the SOURCE Boston Conference said this week
Academia
U.S. Air Force cadets win cyber war game with NSA hackers (Reuters) A U.S. Air Force Academy team on Friday beat out rivals from other elite military colleges after a three-day simulated cyber "war" against hackers from the National Security Agency that is meant to teach future officers the importance of cybersecurity
Legislation, Policy, and Regulation
U.S. Eyes Pushback On China Hacking (Wall Street Journal) The Obama administration is considering a raft of options to more aggressively confront China over cyberspying, officials say, a potentially rapid escalation of a conflict the White House has only recently acknowledged
Plugging Cyberdefenses (Washington Post) Congress must authorize the sharing of security data with the private sector
Cybersecurity Fight Moves to Senate (US Banker) The House on Thursday passed the Cyber Intelligence Sharing and Protection Act, or CISPA, by a vote of 288 to 127, which would authorize the National Security Agency and other intelligence agencies to share information about digital threats with owners
House passes cyber security bill despite veto threat (Chicago Tribune) Despite concerns about protections for private information, the House of Representatives on Thursday passed the the Cyber Intelligence Sharing and Protection Act, legislation on Thursday designed to help companies and the government share information
Would CISPA Have Slowed The Boston Bomber Investigation? (Nibletz) In short form CISPA ""authorizes federal agencies to conduct warrantless searches of information they obtain from e-mail and Internet providers," an easy to understand definition from CNET's Declan McCullough. Government agencies and big business are strongly advocating for the bill to pass into law. CISPA was approved on Thursday right during the fury of the Boston Bomber investigation, an investigation that many, like Business Insider, suggest would have been slowed, stalled or thwarted with CISPA in place
Anonymous Calls for Internet Blackout Monday to Protest CISPA (PC Magazine) In the wake of this week's passage of the controversial Cyber Intelligence Sharing and Protection Act (CISPA) by the U.S. House of Representatives, representatives from the hacktivist group Anonymous - if they truly have "representatives" per se - are calling
Litigation, Investigation, and Law Enforcement
This Is the Modern Manhunt: The FBI, the Hive Mind and the Boston Bombers (Wired Danger Room) Boston shows a new model manhunt emerging: one reliant on the FBI embracing crowd-submitted data and rapid feedback
Dawn Of The Digilante (TechCrunch) It's hard to say with any conviction where we are in the process of, shall we say, crowd-sourcing justice. Like most things, it is a process, not something achieved, and while some question its utility, it's no good to question its existence. Some see the events of this week as a turning point, and in a way, they were, but there are dark days ahead for digilantes
Social nets could hold wealth of info on Boston bombers (CSO) As manhunt is on for surviving suspect, their social nets could hold critical clues
Hosting company Hostgator hacked, suspect arrested after being "rooted with his own rootkit" (Naked Security) A former system administrator from hosting company Hostgator has been arrested for hacking into his former employer's network. There's some poetic justice in how he was identified and connected with the crime...Paul Ducklin takes a look, and can't help smiling
Securities regulators turn gaze to cyber-threat (Financial News) Imagine you are a European futures trader sitting at your desk on a quiet trading day when your phone rings. At the other end of the line someone claims to be from the IT department and requires permission to access your PC remotely to urgently fix a bug. You oblige and pop to the coffee machine in the interim. When you return to your trading terminal a hugely oversized sell order has been sent to the exchange, which subsequently sparks a catastrophic selling frenzy, destabilising the market…"This is not science fiction," said Larry Ponemon, founder of information security think tank the Ponemon Institute. "A cyber-war is happening today
Procera Networks Inc : Faruqi & Faruqi, LLP Launches an Investigation against Procera Networks, Inc. (PKT) for Potential Breaches of Fiduciary Duties by Its Board of Directors (4-Traders) Faruqi & Faruqi, LLP, a leading national securities firm headquartered in New York City, is investigating the Board of Directors of Procera Networks, Inc. ("Procera" or the "Company") (NASDAQ: PKT) for potential breaches of fiduciary duties in connection with their conduct in seeking shareholders' approval for an amendment to the Company's 2007 Incentive Plan
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
cybergamut Technical Tuesday: Secure VoIP & Messaging for Mobile Platforms (Laurel, Maryland, USA, Apr 23, 2013) Phil Zimmermann of Silent Circle will show you how to communicate securely without relying on PKI. cybergamut Technical Tuesday is for cyber professionals to exchange ideas and discuss technical issues of mutual interest.
Mobile Device Security for Defense and Government (Alexandria, Virginia, USA, Apr 23 - 24, 2013) This Defense Strategies Institute conference addresses the challenges of operating mobile devices in networks whose security is mission critical. The symposium's overall theme will focus on DOD's plan to maximize the potential uses of mobile devices. Within specific key areas: wireless infrastructure, mobile devices and mobile applications. The thought leadership and community goal of this event is to advance flexible and secure mobile devices to benefit the warfighter and keep pace with changing technology.
Infosecurity Europe (London, England, UK, Apr 23 - 25, 2013) Europe's number one Information Security event. Featuring over 350 exhibitors, the most diverse range of new products and services, an unrivalled education programme and over 12,000 visitors from every segment of the industry, it's the most important date in the calendar for Information Security professionals across Europe.
23rd Annual Government Procurement Conference (Washington, DC, USA, Apr 25, 2013) This unique one-day event attracts more than 3,000 participants representing government agencies, prime contractors and small businesses from around the country. Participating companies are able to network with procurement officials from federal, state and local government agencies under one roof.
cybergamut CompTIA Security+Certification Boot Camp Training Program (Baltimore, Maryland, USA, Apr 29 - May 2, 2013) Security+ certification training delivers a foundational proficiency in the network security arena. Security+ Certified Professionals are better able and positioned to support small and medium-sized organizations that are at increased risk of cyber crime and other forms of security-related threats. Security+ certified professionals may now apply the CompTIA Security+ certification towards the Microsoft MCSA and MCSE Security certifications.
TechExpo Cyber Security Hiring Event (Columbia, Maryland, USA, Apr 30, 2013) A hiring event for experienced cyber security professionals, with many leading companies in attendance and interviewing on-the-spot. Learn from the distinguished speakers' panel, details of which will be forthcoming on the event site. All job-seekers should be US citizens with cyber security or IT experience. A security clearance is not required, but preferred.
INSA Leadership Dinner Featuring Betty Sapp, Director, NRO (Reston, Virginia, USA, Apr 25, 2013) - This leadership dinner will feature a keynote address from Betty Sapp, Director of the National Reconnaissance Office highlighting her focus on innovation at the NRO and for the Intelligence Community. Registration will open on Thursday, March 14 and will close Thursday, April 18.
Symposium on Cybersecurity & Information Assurance (Teaneck, New Jersey, USA, May 1, 2013) Fairleigh Dickinson University's Center for Cybersecurity and Information Assurance is pleased to announce its inaugural Symposium on Cybersecurity and Information Assurance to be held on May 1, 2013 in the Wilson Auditorium of the Metropolitan campus. This forum will gather top security professionals from government, industry, and academia to present the current state of cybersecurity affecting our daily lives. The symposium will raise the awareness of attendees about the cyber threats and some of the remedial measures. Among the various facets of this evolving area, focus will be on topics such as Survivability in Cyberspace, Security Pattern Usage in Software Development Lifecycle (SDLC), Network Security Service Implementation issues, and Thinking with a Security Mindset.
Critical Security Controls International Summit (London, England, UK, May 1 - 2, 2013) The SANS Institute will be hosting the Critical Security Controls International Summit in London from May 1st to May 2nd at the London Hilton on Park Lane hotel. The Summit focuses on the Critical Security Controls that the British government's Center for the Protection of National Infrastructure describes as the "baseline of high-priority information security measures and controls that can be applied across an organization in order to improve its cyber defense.
INSA Leadership Dinner with NGA Director Letitia Long (McLean, Virginia, USA, May 2, 2013) NGA At the Crossroads - Visualizing the Future. Join INSA and NGA Director Letitia Long as she shares her vision for transforming NGA and GeoInt in innovative ways that more effectively put the power of data and visual knowledge in the hands of users.
Interop Las Vegas (Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest technology.
CyberSecurity UAE Summit 2013 (Dubai, UAE, May 13 - 14, 2013) Review developments, strategies and best practice in global cyber security. Assess the nature of the latest threats being faced and the impact of these upon your organisation. Discuss the most promising cyber security technologies in the marketplace. Assess the trends to watch in global cyber security. International Case Studies: Discover the best practice in protecting your organisation from cyber-attack.
cybergamut Technical Tuesday: Identifying TLS/SSL Encrypted Network Exploitation Activity Using Traffic Externals (Columbia, Maryland, USA, May 14, 2013) Jeff Kuhn of CACI describes recently completed CACI research using adaptive data analytics to distinguish encrypted exploitation activity from legitimate network traffic based on traffic externals in a real world environment.
Thriving in the Post-Sequestration GovCon Era (McLean, Virginia, USA, May 14, 2013) The Potomac Officers Club is hosting a summit for GovCon executives and government leaders to collaborate and share ideas on how to navigate a new era involving sequestration. At least five speakers, each experts in the intersection between the public and private sector, will discuss what is to come after the automatic budget cuts known as sequestration dissipate. Confirmed speakers include: Frank Kendall (Defense Undersecretary for Acquisition, Technology and logistics), Robert Hale (Defense Department Comptroller), Jim McAleese (founder of McAleese & Associates), Pierre Chao (managing partner and co-founder of Renaissance Strategic Advisors), and Stephen Fuller (George Mason University professor and director at the Center for Regional Analysis).
FOSE (Washington, DC, May 14 - 16, 2013) FOSE is the premier event for government technology professionals interested in innovative, effective tools and solutions allowing you and your agency or organization to advance your mission. From IT managers and buyers to CIOs and other technology management professionals, FOSE has the right products, people and solutions for you in one very accessible location.
7th Annual INSA IC Industry Day (Springfield, Virginia, USA, May 15, 2013) This annual event is held at the TS/SCI level in cooperation with ODNI as a comprehensive forum for IC leaders to relate their budget priorities to industry. The theme of this year's IC industry day is Intelligence Program Priorities in a Budget Constrained Environment and will feature keynote addresses from DNI James Clapper, Dr. Roger Mason, ODNI, and Letitia Long, Director, NGA. Registration opens Wednesday, March 27.
CEIC 2013 (Orlando, Florida, USA, May 19 - 22, 2013) The largest digital-investigations conference of its kind and the only one to offer hands-on lab sessions for practical skills development. CEIC offers relevant and practical information from expert speakers. It will be of interest to anyone interested in cyber forensics and e-discovery. Former Director of Central Intelligence Michael Hayden will deliver the keynote.
Maryland/DC Celebration of International Trade (Linthicum, Maryland, USA, May 21, 2013) Join Maryland exporters and international business experts as they celebrate International Trade Week. Hosted by the Maryland/DC District Export Council this event is a content rich celebration of international trade. Participate in expert discussions lead by manufacturers, legal, financial, transportation and industry experts as well as government leaders in eight vertical tracks for a total of 24 highly interactive 90 minute sessions.
IEEE-Cyber 2013 (Nanjing, China, May 26 - 29, 2013) This conference will cover cyber physical systems, cyber control and automation, cyber robotics, and the Internet of things.
Cyber Security @ CeBIT (Sydney, New South Wales, Australia, May 28 - 30, 2013) The Cyber Security Conference will serve as a platform where all those involved in securing and governing ICT within an organisation can discuss the newest challenges and strategies. The event is a must-attend for CIOs, CSOs, CISOs, Chief Risk Officers, Heads of Governance and Compliance and IT Directors. It is predicted that security service spending in Asia-Pacific will reach $7 billion in 2015, so ensure that you are investing in the best technologies for your business by joining us at the Cyber Security Conference on 28 May 2013 and hearing from leading financial institutions, retailers, airlines, telecoms companies and government.
Private Sector Crossovers: Protecting People, Property and Information (, Jan 1, 1970) With its annual cyber conference on May 29, the Howard County Chamber of Commerce and its GovConnects initiative will offer expert speakers on cyber security and efforts to protect government agencies and private industry. There will be opportunities for informal networking and formal, targeted match-ups for businesses interested in making connections with government contractors and agencies.
Cyber Security for the Chemical Industry (Franfurt, Hessen, Germany, May 29 - 30, 2013) It is becoming increasingly more important than ever to be aware of the latest cyber threats, and equipped to protect your company from them. In addition to physical security, these industries are faced with the ever-increasing risk of cyber attacks to their DCS and SCADA infrastructure networks as well as their R&D networks. These attacks can have a costly affect not only on profits, but also corporate reputation.
DGI Cyber Security Conference & Expo (Washington, DC, 2013, May 30, 2013) Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies - from mobile devices and social media to virtualization and cloud computing - will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place significant focus on securing the nation's cyber infrastructure.