Keyword: cybersecurity
-
(Reuters) - The public website of the Central Intelligence Agency went down on Wednesday evening as the hacker group Lulz Security said it had launched an attack. Lulz Security has claimed responsibility for recent attacks on the Senate, Sony Corp, News Corp and the U.S. Public Broadcasting System television network. The CIA site initially could not be accessed from New York to San Francisco, and Bangalore to London. Later in the evening service was sporadic. "We are looking into these reports," a CIA spokeswoman said. ... Security analysts have downplayed the significance of these attacks, saying the hackers are just...
-
Rep. Anthony Weiner, New York Democrat, has been embroiled in a scandal since a close-up photo of a man’s crotch was sent from his Twitter account... [Snip] Mr. Weiner has been careful to point out that his Twitter account is private, but his spokesman did not respond to questions from The Washington Times about whether the congressman was on his government-issued BlackBerry when the photo was sent via Twitter. [Snip] If he was using his work BlackBerry, the normal protocol for a security breach would be to report it immediately to the House Information Resources (HIR) division for an investigation....
-
So the man who would be mayor "can't say with certitude" whether or not the world's most famous Twitter crotch shot is of him? Could Tony Weiner's contempt for the people of New York City be any more, well, certain? Actually, it looks like this wiener is fully cooked. Which is fine, because it's now clear that Rep. Anthony Weiner isn't remotely up to the ethical demands of the office he now holds -- let alone those of the New York City mayoralty. The embattled Brooklyn Democrat wasn't in a deep enough hole yesterday; he had to keep digging --...
-
WASHINGTON — Publicly silent, fellow Democrats privately seethed Thursday over the distraction and furor surrounding the lewd photo sent from Rep. Anthony Weiner’s Twitter account, even as he declared he was finished talking about it and wanted to move on. Weiner’s one-day, pun-laden media blitz a day earlier had only raised more questions about the embarrassing flap when he conceded he wasn’t sure whether the waist-down photo of a man’s bulging underpants was of him or not. His refusal to involve law enforcement because he said as a member of Congress he shouldn’t get special treatment — instead turning the...
-
Does the Anthony Weiner affair mean anything? Some married congressman may or may not have sent a Twitter crouch shot of himself to a college girl on the other side of the country. Snore. So what else is new? We all know that our male politicians – left, right, gay, straight, or whatever – suffer from overdoses of testosterone. It’s almost the sole distinguishing characteristic of a profession that otherwise has no specific qualifications. Weiner himself had the reputation of being quite the playboy before he married the half-Indian, half-Pakistani Huma Abedin in 2008. So what if it hasn’t really...
-
MANHATTAN — Rep. Anthony Weiner continues to insist that it must have been a hacker who sent a lewd crotch shot of a bulge in boxer shorts from the congressman's Twitter account. "Anthony's accounts were obviously hacked," the Queens and Brooklyn congressman's spokesman told the Associated Press. "He doesn't know the person named by the hacker, and we will be consulting on what steps to take next." The photo went viral after being posted on Saturday night by BigGovernment.com, a site run by conservative commentator Andrew Breitbart, which said the image was tweeted to a Seattle woman. The college student...
-
<p>Florida Republican Rep. Cliff Stearns is demanding an investigation into cybersecurity issues raised by #Weinergate, saying it is vital to "ensure our national security."</p>
-
[Snip] By now, you’ve heard about the Tweet picture sent from Weiner’s account to a young lady named Gennette Nicole Cordova. [Snip] ... those on the left trying to paint this as a conspiracy must deal with an array of odd elements that an increasingly tech-savvy public may find suspicious: * Not just the offending picture but most of the congressman’s pictures were removed from the site. * Not only did the young lady’s Facebook and Twitter accounts disappear from the ’Net (she’s apparently since started a new Twitter account, and may go back on Facebook), but also her bylines...
-
Florida Republican Rep. Cliff Stearns is demanding an investigation into cybersecurity issues raised by #Weinergate, saying it is vital to "ensure our national security." Though New York Democratic Rep. Anthony Weiner remains silent on whether or not he'll be seeking an investigation into his claims that his Twitter and Facebook accounts were hacked, leading to his Twitter account's posting of a picture of a man's erect penis underneath gray boxer-briefs, Stearns told The Daily Caller that the imbroglio raises troubling questions that should be looked into by Congress. Read more: http://nation.foxnews.com/politics/2011/05/31/congressman-wants-weiner-probe#ixzz1Nyk3nlwH
-
The White House on Thursday is expected to unveil its proposal to enhance the nation's cybersecurity, laying out plans to require industry to better protect systems that run critical infrastructure like the electrical grid, financial systems and nuclear power plants. The Obama administration also is insisting that companies tell consumers when their personal information has been compromised. According to cybersecurity experts familiar with the plan, the administration's proposed legislation also would instruct federal agencies to more closely monitor their computer networks. Several House and Senate committees have been working on cybersecurity legislation for the past two years, while waiting for...
-
Under a White House plan, the Homeland Security Department will have far-reaching oversight over all civilian agency computer networks. The proposal would codify much of the administration's memo from July 2010 expanding DHS's cyber responsibilities for civilian networks. The White House, however, is taking those responsibilities further, according to a source familiar with the document. The administration drafted a legislative proposal to give DHS many, if not all, of the same authorities for the .gov networks that the Defense Department has for the .mil networks. ... DHS oversees all civilian cybersecurity. Google provision around data centers?
-
STANFORD, Calif.--President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today. It's "the absolute perfect spot in the U.S. government" to centralize efforts toward creating an "identity ecosystem" for the Internet, White House Cybersecurity Coordinator Howard Schmidt said. That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil-liberties...
-
STANFORD, Calif. - President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today. It's "the absolute perfect spot in the U.S. government" to centralize efforts toward creating an "identity ecosystem" for the Internet, White House Cybersecurity Coordinator Howard Schmidt said. That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates including the National Security Agency and the Department of Homeland Security.
-
WASHINGTON – A malicious computer attack that appears to target Iran's nuclear plants can be modified to wreak havoc on industrial control systems around the world, and represents the most dire cyberthreat known to industry, government officials and experts said Wednesday.
-
Chances are you don't leave your front door unlocked. And you shouldn't leave your Wi-Fi network unsecured either. Many of you may have heard this before, but many still seem to not be doing anything about it. You should. Here's why. With a $50 wireless antenna and the right software a criminal hacker located outside your building as far as a mile away can capture passwords, e-mail messages, and any other data being transmitted over your network, and even decrypt data that is supposedly protected.
-
WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil. Related * Times Topic: Computer Security (Cybersecurity) The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency. Under the new rules, the president would approve the use of the military’s expertise...
-
In this seventh article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry. Cyberterror Impact, Defense Under Scrutiny The DHS Daily Open Source Infrastructure Report for Aug. 4, 2004 included the following item summarizing work by Jon Swartz of USA TODAY: A coordinated cyberattack against the U.S. could topple parts of the Internet, silence communications and commerce, and paralyze federal agencies and businesses, government officials and security...
-
<p>The outage was due to "technical problems," said Chase spokesman Tom Kelly, who added that the problem was "not related to hackers or fraud."</p>
<p>Kelly said the company was "working to fix the problem as soon as possible."</p>
<p>"Rather then give a prediction about when it will be fixed, we're just going to tell people when it goes back up," Kelly said about 6:00pm ET. "But we are talking hours not days."</p>
-
For years after 9/11, the U.S. did little to fight cyber-attacks by Islamic terrorists and others. For eight years, George “Faux-Counterterrorism” Bush and for nearly two years of Obama, we went through useless, incompetent cyber-terrorism officials who did nothing. For most of the last nine years after the attacks, the FBI didn’t even have e-mail, despite a bloated budget for computers and other cyber-activity. And, as I told you in March, a TSA employee was allowed to remain at his computer–and inserted a virus–after he knew his TSA employment was terminated. We simply do not take cyber-security seriously. Last week,...
-
A foreign spy agency pulled off the most serious breach of Pentagon computer networks ever by inserting a flash drive into a U.S. military laptop, a top defense official said Wednesday.
|
|
|