HOME/ABOUT  Prayer  SCOTUS  ProLife  BangList  Aliens  StatesRights  ConventionOfStates  WOT  HomosexualAgenda  GlobalWarming  Corruption  Taxes  Congress  Fraud  MediaBias  GovtAbuse  Tyranny  Obama  ObamaCare  Elections  Layoffs  NaturalBornCitizen  FastandFurious  OPSEC  Benghazi  Libya  IRS  Scandals  TalkRadio  TeaParty  FreeperBookClub  HTMLSandbox  FReeperEd  FReepathon  CopyrightList  Copyright/DMCA Notice  Donate

"HEY FREEPERS: Go Monthly and lets END these Freepathons!!!" ~~piytar

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $39,537
44%  
Woo hoo!! And the first 44% is in!! Thank you all very much!!

Keyword: cybersecurity

Brevity: Headers | « Text »
  • The growing trend of healthcare breaches and what’s next

    04/02/2015 1:04:05 PM PDT · by E. Pluribus Unum · 3 replies
    The Hill ^ | 04/02/2015 | Adam K. Levin
    Unless you live in a log cabin on Loon Lake without any contact with the outside world (or you are one of a certain group of unnamed politicians who have offices in Rayburn, Longworth, Cannon, Russell, Dirksen or Hart), you know that breaches have become the third certainty in life. Over one billion records containing some form of personally identifying information have been grabbed by hackers since 2005. But make no mistake, the perfect storm that hit the healthcare sector in the past 90 days is not just more of the same. Hacking healthcare is not the newest flavor of...
  • Where in the world is Hillary Clinton’s server?

    03/20/2015 4:51:58 PM PDT · by afraidfortherepublic · 39 replies
    Hot Air ^ | 3-20-15 | Noah Rothman
    It was less than two weeks ago that former Secretary of State Hillary Clinton assured the nation that her “homebrew” email server was safely secure in her home in Chappaqua, New York. She insisted that the hardware was fortified behind a locked door and had a Secret Service detail mentoring it night and day, as though the greatest security threat that system faced was via a physical attack by a team of cartoonish cat burglars. Nevertheless, Clinton insisted that the safeguards around the email system she constructed out of “convenience” were “effective and secure.” She added that “there were no...
  • FireEye: Breach detection time is dropping, averages 205 days

    02/26/2015 11:34:35 AM PST · by Ernest_at_the_Beach · 11 replies
    tweaktown.com ^ | Posted: 3 hours, 11 mins ago | By: Michael Hatamoto
    FireEye's Mandiant found that the average data breach was discovered in 205 days, dropping from 229 days (2013) and 243 days (2012). Enterprises were only able to self-detect 31 percent of breaches, with third-parties and the government helping identify cybersecurity incidents.    Companies are becoming more vigilant in detecting cybercrime-related activity, such as credit card companies noticing fraudulent behavior.  "Over the last several years, organizations like the Federal Bureau of Investigation (FBI) have gotten increasingly involved in notifying US businesses that they have been identified as being compromised," said Ryan Kazanciyan, technical director at Mandiant, in a statement to eWEEK....
  • Apple Took 89% Of Q4 Smartphone Profits With Android OEMs In A Race To The Bottom

    02/26/2015 7:06:24 AM PST · by aMorePerfectUnion · 46 replies
    TechCrunch ^ | 2/26/15 | Ingrid Lunden
    Google’s Android has gobbled up market share world wide, now accounting for over 80% of all smartphone shipped globally. But when it comes to actually making money, Apple is eating all the profits as it continues its focus on premium devices. Today Strategy Analytics said that Apple in Q4 last year accounted for 89% of all smartphone profits, equating to $18.8 billion, with Android taking only 11%, or $2.4 billion. The blow for Android is softened only slightly less so only by the fact that other platform players like Microsoft, Blackberry and Firefox seemingly made no profit at all.
  • iOS grows to 73% enterprise share in Q4 2014, Android drops to 25%, and Windows Phone stays flat

    02/26/2015 11:37:27 AM PST · by Star Traveler · 20 replies
    VentureBeat ^ | Thursday, February 26, 2015 | Emil Protalinski
    Apple still rules the mobile enterprise space and is extending its lead. iOS gained another 4 percentage points, growing to 73 percent of global device activations in Q4 2014. Android device activations, meanwhile, dropped the same amount to 25 percent of total activations last quarter. The latest findings come from Good Technology‘s Mobility Index Report. Windows Phone activations remain consistent with the seven previous quarters: flat at 1 percent. Since BlackBerry devices use BlackBerry Enterprise Server for corporate email access, Good Technology does not have insight into BlackBerry handset activations. In Q3 2014, Apple reversed its trend of declining quarterly...
  • The largest bank robbery ever: up to $900M possibly stolen, and no need for a getaway ca

    02/16/2015 8:43:24 AM PST · by Kartographer · 12 replies
    NGR News via Yahoo ^ | 2/16/15 | Chris Smith
    When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky executive told The New York Times, as the security research discovered a different type of bank cyber heist, one likened to Ocean’s Eleven in terms of planning, but also when it comes to the significant amount of stolen cash. Following a well planned operation, that involved months of spying through the use of sophisticated software, unknown hackers originating from Russia, China and Europe managed to steal at least $300 million from a large number of...
  • Bank Hackers Steal Millions via Malware

    02/14/2015 3:03:20 PM PST · by dynachrome · 14 replies
    New York Times ^ | 2-14-15 | DAVID E. SANGER and NICOLE PERLROTH
    In a report to be published on Monday, and provided in advance to The New York Times, Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery. The Moscow-based firm says that because of nondisclosure agreements with the banks that were hit, it cannot name them. Officials at the White House and the F.B.I. have been briefed on the findings, but say that it will take time to confirm...
  • Obama’s war on the Internet

    02/14/2015 1:48:25 PM PST · by jazusamo · 22 replies
    The Washington Times ^ | February 14, 2015 | Judson Phillips
    The Internet is arguably the greatest invention to come out of America. The Internet has created more millionaires and billionaires in the last 20 years than any other industry. With the Internet, there are almost no barriers to entry and a massive capital infusion is generally not needed to get started. The Internet has also been one of the greatest boons for freedom and liberty since the invention of the printing press. Thanks to the Internet, the media elites no longer control the news and information. In fact, the media elites are now subject to and can be brought down...
  • Obama Calls for New Cooperation to Wrangle the ‘Wild West’ Internet

    02/14/2015 12:28:16 PM PST · by Jim Robinson · 36 replies
    NYT ^ | February 13, 2015 | By NICOLE PERLROTH and DAVID E. SANGER
    PALO ALTO, Calif. — Declaring that the Internet has become the “Wild Wild West” with consumers and industries as top targets, President Obama on Friday called for a new era of cooperation between the government and the private sector to defeat a range of fast-evolving online threats. Mr. Obama signed an executive order urging companies to join information-sharing hubs to exchange data on online threats — and, in some cases, to receive classified information from the government. But the order stopped short of exempting the companies from liability if the data they collected and shared led to legal action. Only...
  • Foreign Cyber (In)Security Takes Another Hit in China

    01/30/2015 6:08:04 AM PST · by Wiz-Nerd · 3 replies
    Wall Street OTC ^ | Jan 30, 2015 | Paul Huntly
    China has requested all of their foreign tech collaborators who have businesses on its territory to alter their products before releasing them on the Chinese market. The Chinese government has imposed new, stricter legislation for the foreign companies which will make them less secure. The official authorities requested that IT infrastructure providers, such as Cisco, should provide access to their hardware in the form of back-doors leading to their products. Softwares will have to follow the same rules, so ATMs which use Microsoft software will also have all their secrets exposed – going as far as revealing its source code....
  • Analysis: Freed former al Qaeda operative was part of intelligence dispute

    01/21/2015 8:59:44 PM PST · by Brad from Tennessee · 13 replies
    Long War Journal ^ | January 21, 2015 | By Thomas Joscelyn
    Last month, Senator Dianne Feinstein and other Democrats on the Senate Select Committee on Intelligence released the executive summary of their final report investigating the CIA's controversial detention and interrogation program. As part of their study, the Democrats compiled twenty case studies, which were intended to address claims made by the CIA regarding the efficacy of its interrogations. One of those case studies focused on the identification and arrest of Ali Saleh Kahlah al Marri, who was freed from a US prison just days ago. Al Marri served as a "sleeper" operative for al Qaeda inside the US in 2001....
  • Millionaire cybersecurity expert missing as Maryland mansion burned to rubble

    01/20/2015 8:29:37 PM PST · by Tolerance Sucks Rocks · 101 replies
    The Washington Times ^ | January 19, 2015 | Phillip Swarts
    An executive at ScienceLogic, a company used to monitor the online networks of the FBI and the Department of Defense, among others, were missing Monday after a four-alarm fire destroyed his 16,000-square-foot Annapolis home. Don Pyle, the chief operating officer at the Reston-based technology provider, and his wife Sandy, couldn’t be located, authorities said Monday. It took 85 firefighters nearly three-and-a-half hours to get the blaze under control and firefighters had yet to set foot inside the building, uncertain about its integrity, Monday afternoon. Neighbors told The Washington Times the Pyles’ grandchildren may have been staying with them for the...
  • A skeptic on cyber-security hacking

    01/13/2015 3:55:05 PM PST · by impactplayer · 4 replies
    Self
    Call me a skeptic, but when I heard a report that the hack into "gov" web pages had come out of Maryland . . next to DC . . . next to the home of the CIA . . . well, that is just a little interesting. Especially if the administration uses this as a ruse to begin controlling security on the internet. As Glen Beck would say, "I'm just sayin."
  • Obama to push for new cybersecurity legislation

    01/13/2015 1:41:33 AM PST · by Citizen Zed · 9 replies
    President Barack Obama will propose new legislation Tuesday aimed at fostering increased sharing between government agencies and the private sector to help improve cybersecurity. The legislation would encourage the private sector to share cyber threat information with the Department of Homeland Security's National Cybersecurity and Communications Integration Center, according to a White House fact sheet. Companies would qualify for targeted liability protection, but would have to comply with certain privacy restrictions.
  • New evidence Sony hack was ‘inside’ job, not North Korea

    12/31/2014 3:22:50 AM PST · by Las Vegas Dave · 25 replies
    nypost.com ^ | 12/30/2014 | Post Staff Report
    US cybersecurity experts say they have solid evidence that a former employee helped hack Sony Pictures Entertainment’s computer system — and that it was not masterminded by North Korean cyberterrorists. One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people — including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports. The investigation of the Sony hacking by the private companies stands in stark contrast to the finding of the FBI, which said Dec. 19 its probe traced the hacking...
  • How your heartbeat will make passwords obsolete

    12/11/2014 7:55:24 AM PST · by SeekAndFind · 16 replies
    CNN ^ | 12/11/2014 | By Tracey Hobbs and Monique Todd,
    Thought your fingerprint was secure? Think again. The unique pattern on the tip of your fingers can easily be copied and used to access your most personal information. As PIN numbers and passwords prove redundant in protecting data, tech companies are looking to convert bodily features into secure identity authenticators. Bionym, the Toronto-based biometrics technology company, have introduced The Nymi -- a wristband that measures heartbeats to authenticate identity. Its embedded sensor reads the electrical pulses produced by your heartbeat, which is unique to each of us. "You leave your fingerprints everywhere - you actually leave this impression which can...
  • Another Black Republican Made History on Tuesday, and You’ve Probably Never Heard of Him

    11/06/2014 9:06:02 PM PST · by Impala64ssa · 35 replies
    TPNN ^ | 10/6/14 | Jennifer Burke
    Will Hurd Tuesday night was an historic night for the Republican Party in a lot of ways. Mia Love became the first black Republican woman elected to Congress. Joni Ernst became the first woman elected to represent Iowa in U.S. Senate history. Elise Stefanik, at the age of 30, is the youngest woman ever elected to Congress, representing New York’s 21st congressional district. It appears that Carl DeMaio, who ran for Congress in California, will be the first openly gay Republican ever elected to Congress. And, Tim Scott became the first black Senator elected in the South since Reconstruction. But,...
  • EU holds largest-ever cyber security exercise

    10/30/2014 9:24:39 AM PDT · by Olog-hai · 1 replies
    Associated Press ^ | Oct 30, 2014 11:27 AM EDT
    A European Union cyber-security agency was in Athens to conduct the largest exercise ever held on the continent to prevent attacks on Europe’s public utilities and communications networks. The director of the European Network and Information Security Agency, Udo Helmbrecht, told The Associated Press that Thursday’s one-day exercise involving 29 countries and 200 agencies dealt with attack scenarios against “critical infrastructure.” …
  • Obama worried about the identities of millions being wiped out but still teeing up

    10/13/2014 10:49:27 AM PDT · by Sean_Anthony · 1 replies
    Canada Free Press ^ | 10/13/14 | Judi McLeod
    Al Gore lays claim to having created the Internet but Barack Obama always knew best how to actually game it Not much ruffles the peacock feathers of B. Hussein Obama, but pals attending his most recent fundraiser say he has huge worries about cyber security on his mind. When it comes to the only-weeks-away Midterms in which the Dems could be wiped right off the electoral map, it’s “What, me worry?” more accurately put as “I’m not on the ballot this fall.” Nor in his very own words is the unruffled Obama much worried about little ole’ ISIS and Ebola....
  • How the Russia-China Axis puts America at ‘as great or greater risk than we were in the Cold War’

    10/03/2014 7:02:57 AM PDT · by fredericbastiat1 · 2 replies
    TheBlaze Books ^ | 2014-10-03 | Benjamin Weingarten
    "[The U.S. is] reducing our [nuclear] arsenal. We are investing less. All the while our enemies are exponentially increasing their expenditures, making more sophisticated weapons, flouting arms control agreements, and…Vladimir Putin announced a couple of weeks ago that he was taking titular control personally of the Russian arms control agency. So we have a crisis here, and one that’s both been unacknowledged and un-discussed.”
  • 18 absolutely critical quotes on the most dangerous foreign policy threat the U.S. is ignoring

    10/02/2014 9:54:04 AM PDT · by fredericbastiat1 · 3 replies
    TheBlaze Books ^ | 2014-10-02 | Benjamin Weingarten
    “In short, there is a new Cold War in progress, with our old adversaries back in the game, more powerful than they have been for decades, and with America more confused and tentative than it has been since the Carter years.”
  • Former HHS Cyber Security Director Convicted For Child Porn

    08/26/2014 10:48:11 PM PDT · by afraidfortherepublic · 12 replies
    The Daily Caller ^ | 8-26-14 | Tristyn Bloom
    Former acting director of cyber security for the Department of Health and Human Services Timothy DeFoggi was convicted for a myriad of gruesome child pornography charges Tuesday, the Department of Justice announced. DeFoggi, who had top security clearance in his capacity as cyber security director, first joined the child pornography website PedoBook in March 2012. The Omaha World-Herald reported that he was arrested in April of last year, when law enforcement officials serving a search warrant found him downloading child pornography in his home. In addition to viewing and soliciting child pornography, reportedly asking another member of the site whether...
  • Disgraced HHS Cyber Security Director Convicted on Child Pornography

    08/26/2014 4:23:29 PM PDT · by dignitasnews · 25 replies
    Dignitas News Service ^ | August 26, 2014 | Dignitas News Service Team
    Justice Department officials today announced that Timothy DeFoggi, former director of the US Department of Health and Human Services (HHS) Cyber Security division was convicted for his role in a child pornography ring. DeFoggi, 56, was convicted of engaging in a child exploitation enterprise, conspiracy to advertise and distribute child pornography, and accessing a computer with intent to view child pornography in connection with his membership in a child pornography website by a federal jury in Nebraska\, according to an official statement by officials with the FBI's Omaha Division. DeFoggi is the sixth individual associated with the child porn ring...
  • John McAfee Predicts Massive Credit Card Hack in 2014 [Varney]

    06/09/2014 8:39:14 AM PDT · by SES1066 · 28 replies
    Fox Business Channel / Stuart Varney Show at 11:30a | 06/09/14 | John McAfee
    On what was a basic discussion of personal privacy between the host of Varney & Co, Stuart Varney, and the founder of McAfee Antivirus (no longer associated), John McAfee, a startling prediction was made by the latter. Mr McAfee stated that the prior credit card breaches at Target and NM were beta tests and that in this year he predicts that there will be a much larger breach of such customer information.
  • eBay Hacked, Urges All Members to Change Passwords Immediately

    05/21/2014 4:43:38 PM PDT · by kingattax · 32 replies
    Yahoo ^ | May 21, 2014 | Jason O. Gilbert
    The online auction and sales giant eBay posted a message Wednesday morning saying that it had been hacked, urging all of its members to change their passwords. The company said in a statement that a database containing encrypted passwords had been breached, but that financial data, including credit card information, was stored separately and was still safe. Hackers were able to gain access to eBay employee log-ins, eBay said, which in turn gave them access to the encoded passwords. eBay says that no unauthorized transactions have yet been made with the information. But if you’re an eBay user, you still...
  • U.S. utility's control system was hacked, says Homeland Security

    05/20/2014 4:01:13 PM PDT · by Oldeconomybuyer · 14 replies
    Reuters ^ | May 20, 2014 | BY JIM FINKLE
    A sophisticated hacking group recently attacked a U.S. public utility and compromised its control system network, but there was no evidence that the utility's operations were affected, according to the Department of Homeland Security. DHS did not identify the utility in a report that was issued this week by the agency's Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT. ICS-CERT said in the report posted on its website that investigators had determined the utility had likely been the victim of previous intrusions. It did not elaborate.
  • Google Knew About Heartbleed and Didn’t Tell the Government

    04/16/2014 12:55:45 PM PDT · by george76 · 11 replies
    National Journal ^ | April 14, 2014 | Brendan Sasso
    Federal systems remained vulnerable to hackers even after researchers identified the bug. Google knew about a critical flaw in Internet security, but it didn't alert anyone in the government. Neel Mehta, a Google engineer, first discovered "Heartbleed"—a bug that undermines the widely used encryption technology OpenSSL—some time in March. A team at the Finnish security firm Codenomicon discovered the flaw around the same time. Google was able to patch most of its services—such as email, search, and YouTube—before the companies publicized the bug on April 7. The researchers also notified a handful of other companies about the bug before going...
  • Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say [heartbleed bug]

    04/12/2014 11:52:42 PM PDT · by Jim Robinson · 3 replies
    NYT ^ | April 12, 2014 | By David E. Sanger
    WASHINGTON — Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday. But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to...
  • Back to the Future? Obama, the Internet and America’s Return to Panama

    03/17/2014 5:13:51 PM PDT · by Clintons-B-Gone · 12 replies
    Clash Daily ^ | March 17, 2014 | R.G. Yoho
    There are probably only a small handful of you who actually remember the debate about the Panama Canal Treaty of 1977, which ceded control of the Panama Canal back to Panama. I opposed it at the time; I still oppose it. In fact, my father and I continue to despise the Senators, such as the late Robert C. Byrd (D.-WV), who deliberately ignored the cries of their constituents and chose to ratify it anyway.
  • China’s president heads cybersecurity body

    02/27/2014 7:37:31 PM PST · by Olog-hai · 4 replies
    Associated Press ^ | Feb 27, 2014 10:20 PM EST
    Chinese President Xi Jinping has put himself in charge of a new body to coordinate cybersecurity, in a sign of Beijing’s concern over its vulnerability to online attacks and desire to control the Internet. […] Xi also is quoted as saying online opinion must be properly guided. China has 618 million Internet users, the most of any country. …
  • ObamaCare's Potemkin Village Website Written In Belarus?

    02/05/2014 10:12:16 AM PST · by raptor22 · 21 replies
    Incestor's Business Daily ^ | February 5, 2014 | IBD EDITORIALS
    Debacle: U.S. intelligence agencies report that developers linked to the Belarus government helped create the Healthcare.gov website and may have inserted malicious code making it vulnerable to cyberattacks and hacking. The disastrous rollout of Healthcare.gov was bad enough. But as if Americans need another reason to avoid Healthcare.gov, we now hear that the Obama administration, through the Department of Health and Human Services, has indirectly contracted with developers in the worker's paradise of Belarus, a former Soviet republic still closely tied to Russia, to write some of the software code used for the website. The Washington Free Beacon's Bill Gertz...
  • Hacking expert David Kennedy says he cracked HealthCare.gov in 4 minutes

    01/19/2014 12:12:59 PM PST · by jazusamo · 34 replies
    The Washington Times ^ | Jamuary 19, 2014 | Jessica Chasmar
    The man who appeared before Congress last week to explain the security pitfalls of HealthCare.gov took to Fox News on Sunday to explain just how easy it was to penetrate the website. Hacking expert David Kennedy told Fox’s Chris Wallace that gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes and required nothing more than a standard browser, the Daily Caller reported. “And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know, I’m sure it’s hundreds of thousands, if...
  • A First Look at the Target Intrusion, Malware

    01/16/2014 8:40:12 AM PST · by BlueMondaySkipper · 72 replies
    Krebs On Security ^ | 1/12/2014 | Krebs
    Last weekend, Target finally disclosed at least one cause of the massive data breach that exposed personal and financial information on more than 110 million customers: Malicious software that infected point-of-sale systems at Target checkout counters. Today’s post includes new information about the malware apparently used in the attack, according to two sources with knowledge of the matter.
  • Rockefeller Introducing Cybersecurity Bill

    11/21/2013 6:58:20 AM PST · by AT7Saluki · 8 replies
    Multichannel News ^ | 11/20/13 | John Eggerton
    Sen. Jay Rockefeller (D-W.Va.) Thursday (Nov. 21) will introduce the Cybersecurity Act of 2013. The act passed out of the Senate Commerce Committee unanimously in July and will now be attached as an amendment to the must-pass National Defense Authorization Act--the Defense Department's budget bill--with the blessing of Senate Majority Leader Harry Reid (D-Nev.). The bill is supported by a number of industry groups, including the National Cable & Telecommunications Association, CTIA, and US Telecom. When the bill was introduced, NCTA praised that fact that while putting the National Institute of Standards and Technology's in charge of developing cybersecurity standards...
  • Right wing cyber attacks on Healthcare.gov website confirmed

    11/17/2013 5:55:46 AM PST · by Beave Meister · 95 replies
    Examiner.com ^ | 11/14/2013 | David Phillips
    Yesterday, the House Homeland Security Committee published a video on their Youtube page highlighting a portion of the committee questioning Roberta Stempfley, acting assistant secretary of the Department of Homeland Security’s Office of Cyber-security and Communications, who confirmed at least 16 attacks on the Affordable Care Act’s portal Healthcare.gov website in 2013. Roberta Stempfley highlighted one successful attack that is designed to deny access to the website called a Distributed Denial of Service (DDoS) attack. A DDoS attack is designed to make a network unavailable to intended users, generally through a concerted effort to disrupt service such as repeatedly accessing...
  • 'Stuxnet has infected Russian nuclear plant and International Space Station'

    11/12/2013 6:24:23 AM PST · by tamarijp · 28 replies
    The Jerusalem Post ^ | 11/12/2013 | Sara Miller
    An internet security specialist says that Stuxnet, the computer malware that targeted Iran's nuclear facilities in 2010 and widely attributed to Israel and the US, has spiraled out of control and attacked a Russian nuclear plant and the International Space Station.
  • ALEC Makes Cybersecurity a Year-Long Priority

    10/29/2013 12:09:15 PM PDT · by ThethoughtsofGreg
    American Legislator ^ | 8-28-13 | Alex Rued
    October is National Cybersecurity Awareness Month, a month-long initiative dedicated to encouraging all Internet users to be cognizant of their online surroundings. In a 21st century environment, it is important that all Internet stakeholders—from teens on mobile devices to employees at the Department of Homeland Security—are involved in the fight against cyberthreats. The goal of the October 2013 reminder is to teach Americans about the evolving nature of cybersecurity, how to prevent cybercrime and, should these preventative measures fail, how to mitigate the damage. The educational program stresses that regardless of how or why individuals, government entities, or businesses access...
  • Obamacare Website asks for Bank Routing and Account Numbers (Thieves Dream!)

    10/14/2013 2:39:47 PM PDT · by sr4402 · 51 replies
    Vanity | 10/14/2013 | Self
    A airman, leaving the air-force, attempted to signup for Obamacare. They asked for his Social Security Number and Birthdate (an ID Thieves Dream) on the website. But then it also asked for the complete bank Routing and Account number like at the bottom of a check (a real thieves dream). Luckily, he stopped just in time when he realized how vulnerable he would have been.
  • Data, credit card numbers for 2.9 million Adobe users stolen

    10/03/2013 7:39:00 PM PDT · by Theoria · 19 replies
    LA Times ^ | 03 Oct 2013 | Salvador Rodriguez
    Adobe announced Thursday that it was the victim of a hack and that personal data for 2.9 million users were stolen. The software company, known for Photoshop and other programs, said cyber attackers were able to access user information, including account IDs, encrypted passwords as well as credit and debit card numbers. The hackers were able to erase data of some Adobe users. The hackers also illegally accessed source codes for numerous Adobe products. That's like stealing the secret formula for Coca-Cola. The company did not specify which users of its various software programs were hit. "We deeply regret that...
  • John McAfee on Obamacare: ‘This is a hacker’s wet dream’ [VIDEO]

    10/03/2013 8:36:16 PM PDT · by servo1969 · 14 replies
    The Daily Caller ^ | 10-3-2013 | Jeff Poor
    On Fox Business Network’s “Cavuto” on Wednesday, computer programmer and founder of McAfee, Inc. John McAfee said the online component of Obamacare “is a hacker’s wet dream” that will cause “the loss of income for the millions of Americans who are going to lose their identities.” For starters, McAfee said the way it is set up makes it possible for fake websites be set up to fool people to think they’re signing up for Obamacare. “It’s seriously bad,” McAfee said. “Somebody made a grave error, not in designing the program but in simply implementing the web aspect of it. I...
  • 'Syrian Electronic Army' Hacks Marines Website

    09/03/2013 11:17:21 AM PDT · by lbryce · 12 replies
    New York Post ^ | September 3, 2013 | Staff
    Pro-Assad computer hackers today broke into the Marine Corps recruiting website, redirecting visitors to a screed that called President Barack Obama "a traitor who wants to put your lives in danger to rescue al- Qaida insurgents." A Marine Corps spokesman confirmed that the site, marines.com, was tampered with and redirected temporarily, but no information was put at risk.
  • Beware This Vulnerability in Cyber Pickpocketing

    08/14/2013 7:16:12 AM PDT · by William Tell 2 · 7 replies
    MainStreet.com ^ | 8-14-13 | Michael P. Tremoglie
    NEW YORK (MainStreet)—It used to be the stuff of science fiction and Dick Tracy comic strips. But fiction became fact and Mobile Personal Communication Devices (MPCDs) are commonplace. Now they are used for more than mere conversation. Mobile financial transactions are routine. They are even beginning to replace wallets. But as wallets go high tech, so do criminals. The advent of mobile wallets is creating ... http://www.mainstreet.com/article/smart-spending/technology/beware-vulnerability-cyber-pickpocketing
  • Hacker Forces Colin Powell To Deny Affair

    08/01/2013 9:24:15 AM PDT · by keat · 60 replies
    The Smoking Gun ^ | August 1, 2013
    AUGUST 1--As a notorious hacker seeks to distribute “very personal” e-mails sent to Colin Powell by a female Romanian diplomat, the retired general is denying that he engaged in an extramarital affair with the woman while he served as Secretary of State, though he recently advised her to delete all their online exchanges, The Smoking Gun has learned. In a statement addressing his relationship with Corina Cretu, a member of the European Parliament who previously held a series of senior posts in the Romanian government, Powell, 76, wrote that he has known Cretu for about 10 years, having first met...
  • Michael Hastings’ Chilling Final Story

    06/19/2013 9:07:56 PM PDT · by Olog-hai · 30 replies
    PJ Tatler ^ | June 19, 2013 - 9:46 am | Bryan Preston
    Journalist Michael Hastings was killed early Tuesday morning in a bizarre car incident in Los Angeles. Hastings, 33, was best known for writing the Rolling Stone story that ended in Gen. Stanley McChrystal’s resignation as head of U.S. forces in Afghanistan. Hastings’ final story, “Why Democrats Love to Spy on Americans,” was a searing take on the NSA snooping scandal, which Hastings described as “North Korea-esque.” Hastings pulled no punches as he linked the NSA scandal to the Department of Justice’s spying on reporters and the IRS abuse scandal. Hastings built a case that the same Democrats who turned Bush-era...
  • CBS REPORTER SHARYL ATTKISSON: I THINK I KNOW WHO HACKED MY COMPUTER

    06/18/2013 7:43:50 AM PDT · by SaveOurRepublicFromTyranny · 29 replies
    TPNN - TEA PARTY NEWS NETWORK ^ | June 18, 2013 | Matthew Burke
    CBS News reporter, Sharyl Attkisson, one of the very few real reporters left in the mainstream media, appeared on Monday’s O’Reilly Factor, telling Bill O’Reilly that she thinks she knew who hacked her computer (scroll down for video). In the interview, Attkisson begins by explaining that both her personal computer, as well as her CBS work computer would mysteriously turn on in the middle of the night, even though she’d shut them down...
  • The Real Story: A Major Breach of National Security on Obama's Watch

    06/12/2013 12:51:42 PM PDT · by Kaslin · 44 replies
    Townhall.com ^ | June 12, 2013 | Donald Lambro
    WASHINGTON - Several key elements in the bombshell story about the government's secret surveillance programs have been either underreported or left out of the narrative altogether. The first is the degree to which all three branches of the government -- executive, legislative and judicial -- oversee these programs. The second is how did a little-known, low-level, 29-year-old, high school drop out with no academic or work credentials to speak of gain access to America's most critical national security secrets. The first element, often completely missing from network nightly news stories, is that surveillance programs such as these are being closely...
  • How to protect your PC from PRISM surveillance

    06/11/2013 11:48:04 AM PDT · by Nachum · 58 replies
    PC World ^ | June 7, 2013 | Mark Hachman, PC World
    PC World - Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and other electronic communications used by Americans for the last several years, via a program known as PRISM. [ALSO: Prism leaker steps forward] According to the reports, the Web's largest names--AOL, Apple, Facebook,A Google, Microsoft, Skype, PalTalk, Yahoo, and YouTube--participated, perhaps unwittingly. (Dropbox will reportedly be added as well.) The report claims that the National Security Agency had "direct access" to servers owned by those companies. Most, if not all, of those companies have denied participating...
  • What If China Hacks the NSA's Massive Data Trove?

    06/09/2013 8:03:45 PM PDT · by SeekAndFind · 31 replies
    The Atlantic ^ | 06/09/2013 | CONOR FRIEDERSDORF
    Bradley Manning proved that massive amounts of the government's most secret data was vulnerable to being dumped on the open Internet. A single individual achieved that unprecedented leak. According to the Washington Post, "An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances." And this week, we learned that the FBI, CIA and NSA were unable to protect some of their most closely held secrets from Glenn Greenwald, Richard Engel, Robert Windrem, Barton Gellman, and Laura Poitras. Those journalists, talented as they are, possess somewhat fewer resources than foreign governments! So...
  • Obama orders US to draw up overseas target list for cyber-attacks

    06/07/2013 5:02:11 PM PDT · by Calamari · 25 replies
    The Guardian ^ | Friday 7 June 2013 15.06 EDT | Glenn Greenwald and Ewen MacAskill
    Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging". It says the government will "identify potential targets of...
  • Remember All Those Passwords? No Need

    06/06/2013 12:51:37 PM PDT · by nickcarraway · 35 replies
    New York Times ^ | June 5, 2013 | David Pogue
    “If you want to avoid having your identity stolen, use long passwords that contain digits, punctuation and no recognizable words. Make up a different password for every Web site. And change all of your passwords every 30 days.” Have these security pundits ever listened to themselves? That advice is clearly unfollowable. I currently have account names and passwords for 87 Web sites (banks, airlines, blogs, shopping, e-mail, Facebook, Twitter). How is anyone — even a security professional — supposed to memorize 87 long, complex password strings, let alone remember which goes with which Web site? So most people use the...