HOME/ABOUT  Prayer  SCOTUS  ProLife  BangList  Aliens  StatesRights  ConventionOfStates  WOT  HomosexualAgenda  GlobalWarming  Corruption  Taxes  Congress  Fraud  MediaBias  GovtAbuse  Tyranny  Obama  ObamaCare  Elections  Polls  Debates  Trump  Carson  Cruz  Bush  OPSEC  Benghazi  InfoSec  BigBrother  IRS  Scandals  TalkRadio  TeaParty  FreeperBookClub  HTMLSandbox  FReeperEd  FReepathon  CopyrightList  Copyright/DMCA Notice 

Please keep those donations coming in, folks. Our 1st quarter FReepathon is off to a great start and we have a chance of getting 'er done early! Thank you all very much!!

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $41,915
47%  
Woo hoo!! And the first 47% is in!! Thank you all very much!! God bless.

Keyword: cybersecurity

Brevity: Headers | « Text »
  • Interview with Kevin D. Freeman on Economic Warfare and Terroism

    02/06/2016 7:12:44 AM PST · by Randall_S · 6 replies
    USA Transnational Report ^ | February 6, 2016 | USA Transnational Report
    USA Transnational Report for February 6, 2016 Interview with Kevin D. Freeman begins at 25:30 - Kevin D. Freeman is a NY Times bestselling author and considered one of the world's leading experts on the issues of Economic Warfare and Financial Terrorism. His research has been presented in critical DoD studies and he has been asked to brief or present to the FBI, DIA, ONA, SEC, Naval War College, HASC, Naval Postgraduate School, DARPA, IARPA, and a host of government agencies tasked with protecting America. We discuss economic warfare, cyberattacks, Russia, China, Syrian hackers, market volatility, and yesterday's announcement that...
  • Clinton Calls Cybersecurity 'One of the Most Important Challenges' for the Next President

    02/03/2016 11:48:02 AM PST · by Zakeet · 39 replies
    Washington Free Beacon ^ | February 3, 2016 | Alyssa Canobbio
    At the end of a get out the vote campaign event in New Hampshire on Wednesday, Hillary Clinton was asked about her plans for protecting cyber security. "It is one of the most important challenges the next president is going to face," Clinton said. [Snip] The AP reported that during Clinton's time at the State Department that it was one of the worst agencies in the federal government at protecting its computer networks. The deteriorating situation continued well into when John Kerry took over.
  • House Opens New Investigation Into Hillary Email Server

    01/16/2016 4:40:46 AM PST · by afraidfortherepublic · 39 replies
    Legal Insurrection ^ | 1-15-16 | Kemberlee Kaye
    Talk about a bad week. Poll numbers tanking, polling shows millennial ladies prefer Bernie, her attempts to connect with minority demographics flopping hard, 13 Hours hits theaters, resurrecting the Benghazi story, and now a second Congressional investigation. This latest investigation centers around the security of Hillary's home-brewed email server used during her tenure as Secretary of State. According to Rep. Lamar Smith (R-Texas), House Science, Space and Technology Committee Chairman: Understanding these companies' roles in providing software and services to maintain former Secretary of State Hillary Clinton's private email server is critical to improving government cybersecurity standards. A high profile...
  • Iranian Hackers Infiltrated New York Dam in 2013

    12/21/2015 12:56:09 PM PST · by SeekAndFind · 5 replies
    Wall Street Journal ^ | 12/21/2015 | By DANNY YADRON
    Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran's government against the websites of U.S. banks, and just a few years after American spies had damaged an Iranian nuclear facility with a sophisticated computer worm called Stuxnet. In October 2012, then-Defense Secretary Leon Panetta called out Iran's hacking, prompting fears of cyberwar. The still-classified dam...
  • Gowdy: List of Visa Overstays Should Be Sent to Firearms Dealers

    12/19/2015 8:38:15 AM PST · by afraidfortherepublic · 51 replies
    CNS News ^ | 12-18-15 | Susan Jones
    Never mind the secret and mysterious government watchlists: The government could and should be sending its list of people who overstay their visas to federally licensed firearms dealers, Rep. Trey Gowdy (R-S.C.) told two Obama administration officials on Thursday. Speaking at a hearing on foreign travelers and national security, Gowdy said three groups of people currently are barred by law from purchasing or possessing a firearms, including people in the country without permission; people who overstay their visas; and even, in most cases, people who are here on a valid visa. "Are those lists made available to federally licensed firearms...
  • Cyber bill to sail in Senate [final vote could be today]

    10/27/2015 6:33:48 AM PDT · by GIdget2004 · 6 replies
    The Hill ^ | 10/27/2015 | Cory Bennett
    The Senate is on the cusp of passing its biggest cybersecurity bill to date, following years of debate and countless revisions to the contentious legislation. The Cybersecurity Information Sharing Act (CISA) would encourage companies to share their data on hackers with the government. With the House having already approved its companion legislation and the White House on board, the Senate’s is the final OK needed for Congress to enact its first major cybersecurity bill in years. “We have been at this for six years,” said Sen. Dianne Feinstein (D-Calif.), a CISA co-sponsor, on the floor last week. “This is the...
  • Senate to consider controversial cyber security bill

    10/20/2015 11:01:02 AM PDT · by GIdget2004 · 4 replies
    Reuters ^ | 10/20/2015 | Reuters
    The U.S. Senate is expected to begin considering as soon as Tuesday a long-delayed bill that would make it easier for corporations to share information about cyber attacks with each other or the government without concern about lawsuits. The House of Representatives passed its version of the Cybersecurity Information Sharing Act (CISA) in April. A few lawmakers and several big tech companies, however, have come out against the measure, arguing that it fails to protect users' privacy and does too little to prevent cyber attacks. The Computer and Communications Industry Association, a trade group representing Facebook, Google and other major...
  • Beyond Clinton: Cybersecurity Failures Are Widespread Under Obama

    10/20/2015 3:42:03 AM PDT · by IBD editorial writer · 2 replies
    Investor's Business Daily ^ | 10/19/2015 | John Merline
    Under continued fire for her use of a private, unsecured email account to conduct official State Department business, Hillary Clinton now faces charges that cybersecurity suffered at the State Department during her time as secretary.
  • Audits found State Department cybersecurity deteriorated under Clinton

    10/19/2015 7:23:08 AM PDT · by MaskedMan · 4 replies
    Foxnews/Associated Press ^ | October 19, 2015 | AP
    WASHINGTON – The State Department was among the worst agencies in the federal government at protecting its computer networks while Hillary Clinton was secretary from 2009 to 2013, a situation that continued to deteriorate as John Kerry took office and Russian hackers breached the department's email system, according to independent audits and interviews...
  • Teen stoner says he hacked CIA director’s AOL account

    10/19/2015 10:23:24 AM PDT · by afraidfortherepublic · 55 replies
    NY Post ^ | 10-18-15 | Philip Messing, Jamie Schram and Bruce Golding
    Hillary Rodham Clinton’s email scandal didn’t stop the head of the CIA from using his own personal AOL account to stash work-related documents, according to a stoner high school student who claims to have hacked into them. CIA Director John Brennan’s private account held sensitive files — including his 47-page application for top-secret security clearance — until he recently learned that it had been infiltrated, the hacker told The Post. Other emails stored in Brennan’s non-government account contained the Social Security numbers and personal information of more than a dozen top American intelligence officials, as well as a government letter...
  • Day After Obama CyberSecurity Deal With China, China Hacked Us

    10/19/2015 9:14:19 AM PDT · by SeekAndFind · 12 replies
    FrontPage Mag ^ | 10/19/2015 | Daniel Greenfield
    Smart power. So much smart power. I don't know if anyone has ever tapped into this much smart power before. Picture a nerd screeching about "smart power" while the school bullies beat him up and you've got a picture of Obama's awesome smart power foreign policy. America's enemies now make a special point of humiliating him after each fake agreement and deal. Iran tests ballistic missiles and convicts a US reporter right after ratifying the nuke deal. And China makes a point of slapping Obama around right after his latest fake agreement with China. It was heralded as the first...
  • Witnesses: (Former presidential advisor)John Wheeler Appeared Disoriented (before death)

    01/05/2011 6:06:52 AM PST · by Dr. Scarpetta · 223 replies
    Police in Delaware are slowly piecing together the details surrounding the death of former presidential advisor John P. "Jack" Wheeler III. It now seems Wheeler spent at least two days wandering the streets of Wilmington disoriented. Police say Wheeler traveled from Washington, D.C., where he worked, to Wilmington Tuesday on an AMTRAK train. He was last seen alive at 3:30 p.m. Thursday near the Hotel duPont parking garage at 10th and Orange streets. Iman Goldsborough, the parking lot attendant, encountered a man she believes was Wheeler on Wednesday night near the intersection where he was last officially seen Thursday. Goldsborough...
  • China's Silicon Valley power play

    09/23/2015 9:45:32 AM PDT · by RightGeek · 4 replies
    The Hill ^ | 9/23/15 | Cory Bennett and Katie Bo Williams
    Chinese officials have summoned top American tech executives to Seattle for a forum on Wednesday in a show of force that could make the Obama administration’s standing in Silicon Valley appear weak by comparison. Beijing moved up the date of the annual event to coincide with President Xi Jinping’s U.S. visit and reportedly pressured major Silicon Valley players to send their chief executives to what is normally an annual summit for midlevel management, threatening regulatory scrutiny if they didn’t comply. “It’s not really voluntary,” said Atlantic Council Senior Fellow Jason Healey, a former director of cyber infrastructure protection at the...
  • Obama Administration Yawns As Energy Dept. Gets Hacked 159 Times

    09/11/2015 3:26:54 AM PDT · by IBD editorial writer · 12 replies
    Investor's Business Daily ^ | 09/10/2015 | John Merline
    Two reports on Thursday should send alarm bells clanging to beef up the government's cybersecurity. Whether anyone in the Obama administration will hear them is another question.
  • Procedural tactics may delay CISA

    09/07/2015 4:50:17 PM PDT · by OddLane · 3 replies
    Washington Examiner ^ | September 7, 2015 | Charlie Mitchell
    Congress returns this week with cybersecurity as one item on a long list of priorities that may or may not be addressed in the final months of the year. The Cybersecurity Information Sharing Act has been teed up for Senate action this fall, amid strong support from the business community. But there is still no definitive date for floor consideration, and online privacy groups are mounting their own campaign to sink the measure. Other cyber issues — such as better securing the government's own networks, updating criminal law to address cyber challenges, Electronic Communications Privacy Act reform, consumer data-breach notification,...
  • Most California state agencies wide open to hackers, audit finds

    08/27/2015 1:41:07 PM PDT · by MeganC · 2 replies
    The Washington Examiner ^ | 27 AUG 2015 | Rudy Takala
    The overwhelming majority of California's state agencies are ill-prepared to defend against cyberattacks, according to the state auditor, putting Social Security numbers, health records, and income tax information at risk for millions of Californians.
  • IRS reveals hack was worse than thought

    08/17/2015 5:34:21 PM PDT · by markomalley · 19 replies
    Washington Examiner ^ | 8/17/15 | Joseph Lawler
    A breach of taxpayers' information at the Internal Revenue Service was bigger than initially disclosed, the agency said Monday. Hackers gained access to the information of as many as 220,000 more people than the 104,000 accounts that IRS Commissioner John Koskinen said in June may have been compromised. The IRS said it is mailing 220,000 letters notifying people that their information may be compromised. It said that it would also offer free credit protection and Identity Protection PINs to the victims. The revelation Monday is the result of an IRS review of an earlier incident in the spring, when hackers...
  • Hillary Clinton’s Server Was In New Jersey This Whole Time. It’s Blank Now (& Totally Insecure!)

    08/13/2015 12:29:07 PM PDT · by Crystal Palace East · 41 replies
    Democratic presidential candidate Hillary Clinton’s mysterious email server has been in a private data center in New Jersey since 2013, that is, until the IT company the former secretary of state hired to maintain the hardware handed the “blank” device over to the FBI Wednesday. Clinton’s attorney, David Kendall, informed the Department of State in a letter Wednesday that the company hired to manage and maintain the server, Denver-based Platte River Networks, was turning it over to the Department of Justice. Kendall also told State he handed over three thumb drives that contained Clinton’s emails. The Washington Post reported the...
  • A Congressman Goes to DEF CON

    08/13/2015 4:10:02 PM PDT · by DUMBGRUNT · 4 replies
    defenseone.com ^ | 13 aug 2015 | PATRICK TUCKER
    What is Will Hurd, Republican Congressman from Texas, doing here? “The best way to defend digital networks is to have an attacker’s mentality,” Hurd told Defense One. Hurd, who spent nearly a decade as an undercover CIA operative in places like Afghanistan, doesn’t freak out easily. ... For one thing, he ran a cybersecurity firm for four years. Naturally, he’s made cybersecurity a cornerstone of his legislative efforts.
  • Military Eases Thumb Drive, Flash Media Bans

    02/19/2010 4:53:22 PM PST · by SandRat · 7 replies · 257+ views
    WASHINGTON, Feb. 19, 2010 – New guidelines from U.S. Strategic Command officials allow servicemembers to use “thumb drives” and other flash media to store computer data under specific circumstances. Strategic Command officials banned use of thumb drives and flash media in November 2008, after the use of the media infected a number of Defense Department computer systems. Computers users had to turn to alternative means to transfer data from one machine to another. Now, the command has lifted the ban on the devices under carefully controlled circumstances, said Navy Vice Adm. Carl V. Mauney, Stratcom’s deputy commander. The command issued...
  • Cyber Insecurity…How the Government is Failing to Protect Money Owed to Our Seniors and Veterans

    08/05/2015 6:27:13 PM PDT · by homelandnsecurities · 3 replies
    Medium.com ^ | 8/5/2015 | Homeland Insecurities
    Year after year the American people have been constantly warned of the impending doom that are their Social Security benefits due to fact that there are now more people collecting Social Security than paying into it. While the controversy over the future of Social Security is well known, what has not received much attention is that right now Americans are in danger of having their benefits delayed, and not just their Social Security checks. Veterans who fought for this country, and who are dependent on financial support from the Veterans Administration (VA) to purchase medicine or treatment could also see...
  • Cybersecurity bill could 'sweep away' internet users' privacy, agency warns

    08/05/2015 7:13:13 AM PDT · by Jan_Sobieski · 13 replies
    The Guardian ^ | 8/3/2015 | Sam Thielman
    The Department of Homeland Security (DHS) on Monday said a controversial new surveillance bill could sweep away “important privacy protections”, a move that bodes ill for the measure’s return to the floor of the Senate this week. The latest in a series of failed attempts to reform cybersecurity, the Cybersecurity Information Sharing Act (Cisa) grants broad latitude to tech companies, data brokers and anyone with a web-based data collection to mine user information and then share it with “appropriate Federal entities”, which themselves then have permission to share it throughout the government. Minnesota senator Al Franken queried the DHS in...
  • If you installed Windows 10 and like privacy, you checked the defaults, right? Oh dear

    08/04/2015 7:33:57 AM PDT · by snarkpup · 33 replies
    The Register ^ | 3 Aug 2015 at 19:52 | Chris Williams
    Here's a quick FYI: if you installed Windows 10, and in a rush to try out Microsoft's new operating system, you clicked through the default settings without looking, you may want to look again. ... There's a handy guide here to the settings you need to look out for during the install and afterwards.
  • Almost everything can be hacked, including sniper rifles

    07/30/2015 3:33:05 PM PDT · by BenLurkin · 40 replies
    WaPo ^ | July 30 at 4:08 PM | Thomas Gibbons-Neff
    In a recent WIRED article, security researchers Runa Sandvik and Michael Auger tackled just that issue. The wife and husband duo purchased two $13,000 TrackingPoint rifles and spent the last year reverse engineering and hacking the rifles’ computers. The two plan to present their research at the Black Hat hacker conference in two weeks, according to the article. TrackingPoint bills itself as a company comprised of “lifetime NRA members and engineers.” The products sold on its website seem standard enough when it comes to a gun company: bolt-action rifles, semi-automatic carbines, etc. The “5.56mm semi-auto,” basically a M16-type rifle, costs...
  • FBI says hackers shake down big banks, threaten to shut sites if they don’t pay up

    07/30/2015 3:44:28 PM PDT · by Oldeconomybuyer · 11 replies
    Market Watch ^ | July 30, 2015 | By Priya Anand
    Financial companies are facing extortion threats from hackers who threaten to knock their websites offline unless firms pay tens of thousands of dollars, an FBI agent told MarketWatch Thursday. More than 100 companies, including targets from big banks to brokerages in the financial sector, have received distributed denial of service threats since about April, says Richard Jacobs, assistant special agency in charge of the cyber branch at the FBI’s New York office. With these types of attacks, known as DDoS, criminals jam websites by flooding them with useless traffic. The ransom requests typically run in the tens of thousands of...
  • CISA: the dirty deal between Google and the NSA that no one is talking about

    07/29/2015 10:43:18 PM PDT · by Brad from Tennessee · 4 replies
    The Hill ^ | July 29, 2015 | By Evan Greer and Donny Shaw
    One of the things that civil liberties activists like to lament about is that the general public seems to care more about Google and Facebook using their personal data to target advertising than the government using it to target drone strikes. The reality is that both types of abuse are dangerous, and they work hand in hand. It’s hard to find a more perfect example of this collusion than in a bill that’s headed for a vote soon in the U.S. Senate: the Cybersecurity Information Sharing Act, or CISA. CISA is an out and out surveillance bill masquerading as a...
  • Valerie Plame on the 'Scary' State of Cybersecurity [and Scott Walker]

    07/24/2015 5:47:59 AM PDT · by Cincinatus' Wife · 22 replies
    Inc. ^ | July 23, 2015 | By Maria Aspan Senior editor, Inc.
    Cyber warfare has gone nuclear. So says Valerie Plame, the former covert CIA agent who spent her intelligence career working against the spread of weapons of mass destruction. Now she’s taking on a new task: helping government agencies and companies stem the relentless flood of hacker attacks. “There’s a huge impact on national security and intelligence,” says Plame, who this spring became an adviser to cybersecurity startup Global Data Sentinel. “The new normal is going to be more and more of these hacks, whether it’s Target or Home Depot or the Office of Personnel Management or Jennifer Lawrence’s nude photos.”...
  • EXCLUSIVE: Entire US national security system possibly compromised by year-long cyber-assault

    07/23/2015 9:33:20 AM PDT · by SeekAndFind · 68 replies
    Fox News ^ | 07/23/2015 | By George Russell
    The prolonged hacking into the White House Office of Personnel Management, which put the personal information of at least some 21.5 million past and current federal employees in jeopardy, is only the beginning of the security threat to the Obama Administration and its successors, a number of top-level experts in cybersecurity have told Fox News. The attack has been frequently sourced as coming from China. The experts warned that the entire U.S. national security clearance system could be compromised, that future senior government leaders and advisors could be targeted even before taking office, and hundreds, perhaps thousands, of government officials...
  • Car Control

    07/23/2015 7:25:29 AM PDT · by Kaslin · 29 replies
    Townhall.com ^ | July 23, 2015 | Jackie Gingrich Cushman
    Over the past three weeks, my family and I spent more than 22 hours driving more than 1,400 miles for our vacation. The trip involved enduring construction traffic, heavy rainstorms and unbelievably frightening, dense and fast traffic along interstates merely two lanes wide. We made it through safely, partly because I pulled over to let my husband drive through the rain (I hate driving in rain) and partly because he has learned to endure my uncontrollable need to provide commentary about his driving skills from the passenger seat -- even though his driving record is better than mine. It defies...
  • Adultery site Ashley Madison hacked, user data leaked (Schadenfreude)

    07/20/2015 7:04:35 AM PDT · by BradtotheBone · 36 replies
    CNBC.Com ^ | July 20, 2015 | Arjun Kharpal
    Hackers have stolen and leaked the personal details of users of Ashley Madison – a site that hooks up people who want to have affairs. A group or individual known as The Impact Team claimed to be behind the attack and that it had data on all of Ashley Madison's 37 million users and its partner sites, Cougar Life and Established Men, all owned by Canada's Avid Life Media (ALM). The Impact Team claims to have access to the company's user database and is threatening to release all of the information unless the site is taken down. So far the...
  • Just Like OPM, Healthcare.gov Is Blowing Off Cyber Security Warnings

    07/13/2015 7:15:24 AM PDT · by IBD editorial writer · 8 replies
    Investor's Business Daily ^ | 07/10/2015 | John Merline
    Could a data breach on the scale suffered by the Office of Personnel Management happen to Healthcare.gov?
  • Security Experts Oppose Government Access to Encrypted Communication (excerpt)

    07/08/2015 8:57:30 AM PDT · by Eric Pode of Croydon · 5 replies
    NY Times ^ | 7 July 2015 | Nicole Perlroth
    SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has...
  • FBI Admits 11 Attacks Against Internet, Power Grid Lines In California This Year

    07/04/2015 5:43:57 AM PDT · by Former Proud Canadian · 51 replies
    Zerohedge ^ | July 3, 2015 | Tyler Durden
    On Tuesday, someone broke into an underground vault in Sacramento, and cut several high-capacity internet cables. Nobody knows who this person is or why they did it, but since that time the FBI has revealed that it was not an isolated incident. They’ve been investigating 10 other recent attacks on the internet infrastructure of California, and they seem to be deeply troubled by the vulnerability of these cables. ........................ The article goes on to compare these incidents to similar attacks that happened in Arizona last year, as well as California in 2009. However, they may be missing the bigger picture....
  • Vandals sever another Internet backbone cable in California

    07/01/2015 3:46:29 PM PDT · by BenLurkin · 58 replies
    pcworld.com ^ | July 1, 2015 | janes Niccolai
    Someone hacked through yet another fiber optic cable in the San Francisco Bay area early Tuesday morning, continuing a rash of incidents that have disrupted Internet traffic and vexed law enforcement officials. The latest attack occurred at around 4.30 am Pacific Time near the town of Livermore, about 50 miles east of San Francisco. Someone climbed down a manhole cover there and cut through several fiber optic cables, according to several reports. The FBI is investigating. The cables are operated by backbone providers such as Level 3 Communications, which sell capacity to other cable and Internet providers. The cables carry...
  • OPM yanks background check system offline [eQIP down...back to SF86's?]

    06/29/2015 6:32:25 PM PDT · by markomalley · 9 replies
    FCW ^ | 6/29/15 | Zach Noble
    Nearly a month after news broke of a massive breach at the Office of Personnel Management -- and three weeks after first denying, then admitting, that security clearance information was stolen -- OPM has shut down its electronic background check system. The agency said the move is a proactive step, not a reaction to another hack. In a June 29 alert posted on OPM's website, the agency says, "The [Electronic Questionnaires for Investigations Processing] e-QIP system will be down for an extended period of time for security enhancements." There was no word on how background checks would be handled with...
  • Federal workers' union sues US over hack, says OPM had ample warning

    06/29/2015 7:59:26 PM PDT · by Kid Shelleen · 15 replies
    AP via Stars and Stripes ^ | 06/26/2015 | KEN DILANIAN
    The largest federal employee union filed a class action lawsuit Monday against the federal personnel office, its leaders and one of its contractors, arguing that negligence contributed to what government officials are calling one of the most damaging cyberthefts in U.S. history. The suit by the American Federation of Government Employees names the Office of Personnel Management, its director, Katherine Archuleta, and its chief information officer, Donna Seymour. It also names Keypoint Government Solutions, an OPM contractor
  • Office of Personnel Management IT Was Running Out of… China

    06/18/2015 6:57:52 PM PDT · by Rockitz · 45 replies
    Ars Technica via Breitbart.com ^ | 18 Jun 2015 | John Hayward
    <p>The House Oversight Committee’s hearings on the massive OPM data breach have been absolutely astounding. The rank incompetence on display at this agency was mind-boggling...</p>
  • Gov’t OUTSOURCED management to IT workers with TOTAL ACCESS to database… in CHINA

    06/18/2015 4:43:56 PM PDT · by Whenifhow · 36 replies
    <p>The technical details are a little difficult here so let’s put it this way – idiotic and utterly incompetent government officials outsourced IT management of highly sensitive information to companies that had some workers in China, and gave them complete and total access to that database.</p>
  • Reacting to Chinese hack, the government may not have followed its own cybersecurity rules

    06/18/2015 10:34:05 AM PDT · by SeekAndFind · 8 replies
    Washington Post ^ | 06/18/2015 | Lisa Rein
    In responding to China’s massive hack of federal personnel data, the government may have run afoul of computer security again. Over the last nine days, the the Office of Personnel Management has sent e-mail notices to hundreds of thousands of federal employees to notify them of the breach and recommend that they click on a link to a private contractor’s Web site to sign up for credit monitoring and other protections. But those e-mails have been met with increasing alarm by employees — along with retirees and former employees with personal data at risk — who worry that the communications...
  • Major anti-virus company hacked

    06/16/2015 3:18:15 PM PDT · by TurboZamboni · 21 replies
    Kommando.com ^ | 6-11-15 | Kim Kommando
    Cybersecurity firm Kaspersky Lab announced that it has detected an intrusion into its own systems, and you'll never believe who the company thinks is behind it. CEO Eugene Kaspersky claims a nation-state hacked into his company's network in order to steal information about its technologies. The unidentified hackers exploited security flaws in Microsoft Software Installer files to infect Kaspersky's network with malware. Kaspersky is referring to the malware as "Duqu 2.0", because it appears to be tied to the same cybercriminals that used Duqu malware to attack Iran, India, France and Ukraine a few years ago. Back then, the hackers...
  • Wow – The Federal Cyber Breach Was Not Discovered By U.S. Govt., Was Discovered By Private Company

    06/11/2015 6:25:34 PM PDT · by sheikdetailfeather · 16 replies
    The Conservative Treehouse ^ | 6-11-15 | sundance
    WASHINGTON DC – As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on June 4, they claimed the breach had been found during a government effort to correct problems with OPM’s security. An OPM statement on the attack said that the agency discovered the breach as it had “undertaken an aggressive effort to update its cybersecurity posture.” And a DHS spokesperson told Ars that “interagency partners” were helping the OPM...
  • Obama's 'Cybersecurity Czar' Is MIA As Hackers Run Wild

    06/08/2015 4:12:36 AM PDT · by IBD editorial writer · 11 replies
    Investor's Business Daily ^ | 06/5/2015 | Staff
    Privacy: In two weeks, we've learned that offshore hackers managed to steal 100,000 tax filings and personnel data on millions of federal workers. Who, exactly, is in charge of cybersecurity in this administration?
  • Hacker told F.B.I. he made plane fly sideways after cracking entertainment system

    05/16/2015 5:05:33 PM PDT · by Jim Robinson · 83 replies
    APTN National News ^ | May 15, 2015 | by Jorge Barrera
    A well-known U.S. hacker told F.B.I. agents he took momentary control of an airplane’s engines mid-flight by hacking into its inflight entertainment system, according to a document filed in U.S. federal court and obtained by APTN National News. Roberts, who has been interviewed at least three times by the F.B.I. this year, is under investigation for allegedly hacking into the electronic entertainment systems of airplanes, according to an application for a search warrant to probe seized electronic equipment. The document shows F.B.I. agents investigating Roberts believe he has the ability to do what he claims: take over flight control systems...
  • The growing trend of healthcare breaches and what’s next

    04/02/2015 1:04:05 PM PDT · by E. Pluribus Unum · 3 replies
    The Hill ^ | 04/02/2015 | Adam K. Levin
    Unless you live in a log cabin on Loon Lake without any contact with the outside world (or you are one of a certain group of unnamed politicians who have offices in Rayburn, Longworth, Cannon, Russell, Dirksen or Hart), you know that breaches have become the third certainty in life. Over one billion records containing some form of personally identifying information have been grabbed by hackers since 2005. But make no mistake, the perfect storm that hit the healthcare sector in the past 90 days is not just more of the same. Hacking healthcare is not the newest flavor of...
  • Where in the world is Hillary Clinton’s server?

    03/20/2015 4:51:58 PM PDT · by afraidfortherepublic · 39 replies
    Hot Air ^ | 3-20-15 | Noah Rothman
    It was less than two weeks ago that former Secretary of State Hillary Clinton assured the nation that her “homebrew” email server was safely secure in her home in Chappaqua, New York. She insisted that the hardware was fortified behind a locked door and had a Secret Service detail mentoring it night and day, as though the greatest security threat that system faced was via a physical attack by a team of cartoonish cat burglars. Nevertheless, Clinton insisted that the safeguards around the email system she constructed out of “convenience” were “effective and secure.” She added that “there were no...
  • FireEye: Breach detection time is dropping, averages 205 days

    02/26/2015 11:34:35 AM PST · by Ernest_at_the_Beach · 11 replies
    tweaktown.com ^ | Posted: 3 hours, 11 mins ago | By: Michael Hatamoto
    FireEye's Mandiant found that the average data breach was discovered in 205 days, dropping from 229 days (2013) and 243 days (2012). Enterprises were only able to self-detect 31 percent of breaches, with third-parties and the government helping identify cybersecurity incidents.    Companies are becoming more vigilant in detecting cybercrime-related activity, such as credit card companies noticing fraudulent behavior.  "Over the last several years, organizations like the Federal Bureau of Investigation (FBI) have gotten increasingly involved in notifying US businesses that they have been identified as being compromised," said Ryan Kazanciyan, technical director at Mandiant, in a statement to eWEEK....
  • Apple Took 89% Of Q4 Smartphone Profits With Android OEMs In A Race To The Bottom

    02/26/2015 7:06:24 AM PST · by aMorePerfectUnion · 46 replies
    TechCrunch ^ | 2/26/15 | Ingrid Lunden
    Google’s Android has gobbled up market share world wide, now accounting for over 80% of all smartphone shipped globally. But when it comes to actually making money, Apple is eating all the profits as it continues its focus on premium devices. Today Strategy Analytics said that Apple in Q4 last year accounted for 89% of all smartphone profits, equating to $18.8 billion, with Android taking only 11%, or $2.4 billion. The blow for Android is softened only slightly less so only by the fact that other platform players like Microsoft, Blackberry and Firefox seemingly made no profit at all.
  • iOS grows to 73% enterprise share in Q4 2014, Android drops to 25%, and Windows Phone stays flat

    02/26/2015 11:37:27 AM PST · by Star Traveler · 20 replies
    VentureBeat ^ | Thursday, February 26, 2015 | Emil Protalinski
    Apple still rules the mobile enterprise space and is extending its lead. iOS gained another 4 percentage points, growing to 73 percent of global device activations in Q4 2014. Android device activations, meanwhile, dropped the same amount to 25 percent of total activations last quarter. The latest findings come from Good Technology‘s Mobility Index Report. Windows Phone activations remain consistent with the seven previous quarters: flat at 1 percent. Since BlackBerry devices use BlackBerry Enterprise Server for corporate email access, Good Technology does not have insight into BlackBerry handset activations. In Q3 2014, Apple reversed its trend of declining quarterly...
  • The largest bank robbery ever: up to $900M possibly stolen, and no need for a getaway ca

    02/16/2015 8:43:24 AM PST · by Kartographer · 12 replies
    NGR News via Yahoo ^ | 2/16/15 | Chris Smith
    When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky executive told The New York Times, as the security research discovered a different type of bank cyber heist, one likened to Ocean’s Eleven in terms of planning, but also when it comes to the significant amount of stolen cash. Following a well planned operation, that involved months of spying through the use of sophisticated software, unknown hackers originating from Russia, China and Europe managed to steal at least $300 million from a large number of...
  • Bank Hackers Steal Millions via Malware

    02/14/2015 3:03:20 PM PST · by dynachrome · 14 replies
    New York Times ^ | 2-14-15 | DAVID E. SANGER and NICOLE PERLROTH
    In a report to be published on Monday, and provided in advance to The New York Times, Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery. The Moscow-based firm says that because of nondisclosure agreements with the banks that were hit, it cannot name them. Officials at the White House and the F.B.I. have been briefed on the findings, but say that it will take time to confirm...