Tag: Computer network security

Obama to encourage companies to share cyber threat data

U.S. President Obama delivers a statement on legislation sent to Congress to authorize the use of military force against the Islamic State at the White House in Washington

(Reuters) – President Barack Obama is set to sign an executive order on Friday aimed at encouraging companies to share more information about cybersecurity threats with the government and each other, a response to attacks like that on Sony Entertainment.

Reforming the Intelligence Machine in an Era of Asymmetric Warfare

John O. Brennan

There’s no doubt that we are now well into a time when wars are won and lost on intelligence efforts. In an era of budgetary constraints, low appetite for overt foreign intervention, and highly asymmetric insurgency — the likes of

How Obama Endangered Us All With Stuxnet

obama

A few months after President Obama took office in 2009, he announced that securing the nation’s critical infrastructure — its power generators, its dams, its airports, and its trading floors — was a top priority for his administration. Intruders had

German intelligence to monitor overseas social networks

germany-intelligence-monitor-networks.si

Germany’s foreign intelligence agency plans to spend hundreds of millions of euros on surveillance technology designed to monitor foreign social networks, local media reported, citing a confidential document. The Federal Intelligence Service (BND) will spend €28 million, in 2015 alone,

Hackers breach some White House computers

WhiteHouse

Hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks, sources said, resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion. White House officials, speaking

France gets serious over ‘Snowden syndrome’ and cybersecurity

snowden.jpg w=948&h=710

Brittany in northwest France is best known for its crepes and apple cider. This weekend, it also became the site of the biggest cyberattack in French history. The assault – a state-orchestrated simulation at the country’s top military academy in

Germany can’t crack ‘CIA double agent’ laptop

41zw0p9563l.-ss400-

Der Spiegel reports that Attorney General Harald Range gave the German Parliament’s NSA investigation committee the bad news last week. Security experts from the Criminal Police (BKA) and secret services are trying to find out whether the intelligence officer at the

White House Cybersecurity Coordinator Doesn’t Know Much About Tech, Says That’s a Good Thing

daniel

Even when you’re not quite qualified for a job, you can usually bluff your way through the interview if you can positively present the skills you do have. But when the job is White House Cybersecurity Coordinator, you really shouldn’t

British spy agency scanned for vulnerable systems in 32 countries

donut.gif

British intelligence agency GCHQ used port scanning as part of the “Hacienda” program to find vulnerable systems it and other agencies could compromise across at least 27 countries, German news site Heise Online has revealed. The use of so-called port

Here’s how the NSA decides to tell you about a zero day – or not

Lock background

The White House has provided some detail on how the NSA and other US government agencies make decisions around whether to publicise tech security flaws they have discovered — or whether to keep them under wraps for intelligence purposes. The

NSA critic Bruce Schneier joins new firm

bruceschneieratcops2013-img9174-200x200-200x200

Bruce Schneier has revealed his latest post after leaving BT — the role of chief technology officer at security firm Co3 Systems. The well-known security expert and vocal critic of the National Security Agency (NSA) revealed in a blog post

Sentences for cyber crime and snooping to be tougher across EU

Source: http://234next.com/csp/cms/sites/Next/Home/5715627-146/imf_cyber_attack_boosts_calls_for.csp

(Reuters) – EU lawmakers agreed on Thursday to toughen criminal penalties across the European Union for cyber attacks, especially those that include harming critical national infrastructure and hijacking computers to steal sensitive data. The 28 EU member states currently have

Taiwan proposes China-style block on overseas Internet services that infringe copyright

shutterstock_92162893-645x250

China is famous for its unique Internet censorship policy — known as the Great Firewall — which restricts content, and in particular sites and services from overseas, preventing its 500 million-plus Internet users from having free reign online. Now that

Hackers attack European governments using ‘MiniDuke’ malware

European Hackers Attack P6.jpg

Kaspersky Lab identifies attempt to steal intelligence from countries including Ireland and Romania using Adobe PDF bug. Cyber criminals have targeted government officials in more than 20 countries, including Ireland and Romania, in a complex online assault seen rarely since

Obama signs cybersecurity executive order

obamasotu_610x346

  President Obama today signed an executive order to improve the nation's cybersecurity, by enabling the government to share more information with private industry partners and developing a new framework of practices to reduce cybersecurity risks. Cyberthreats, including cyber-espionage, are

REVIEW: Internet Cryptography

9780201924800

by Richard E. Smith, Publisher: Addison-Wesley Professional, Copyright 1997 _______________________________________________________________ According to the preface, this book is aimed at non-specialists who need to know just enough about cryptography to make informed technical decisions. As an example, Smith suggests systems administrators