Obama Losing Dems on National Security |
07/03/2011
|
|
The Obama administration tried
to find solace in Fridays landmark votes on the Libya operation, holding
up the fact that the House did not actually de-fund the mission as some
semblance of an endorsement.
But the two votes Friday on Libya, coupled with the fierce backlash the
president faced from his own party after announcing his Afghanistan
withdrawal plan Wednesday, underscore the political trouble President
Obama is in when it comes to national security. Though anti-war
Democrats and anti-interventionist Republicans have long locked arms
against U.S. military campaigns abroad, that bipartisan coalition is
swelling -- in size and intensity.
|
Security Results in Market Instability |
07/02/2011
|
|
Uncertainties about the Greek
debt situation and the removal of the security blanket of Fed easing
could combine for another week of volatility, as the second quarter
draws to an end.
There is a busy economic calendar, including important ISM manufacturing
data and three Treasury auctions totaling USD 99 billion in new
securities, which hit the market next week just as the Feds quantitative
easing Treasury purchase program winds down.
|
|
Days after hackers claimed to
compromise more than 1,000 accounts of an FBI affiliate in Connecticut,
authorities have yet to release any details about the extent of damage
to the organization, which counts large businesses and state agencies
among its members.
Web security specialists say the silence is probably calculated to avoid
giving any credit to hackers that thrive on limelight and to reduce the
risk of any further exposure.
|
Citigroup Cites $2.7 Million in Customer Losses |
06/30/2011
|
|
Citigroup Inc. has told
government officials that about 3,400 of the customers whose credit-card
information was hacked have suffered about $2.7 million in losses,
according to people familiar with the matter.
The disclosure is the first acknowledgment by the New York company that
the May security breach resulted in any losses. Citigroup has previously
indicated it would cover any losses, saying customers would not be
liable for unauthorized use of their accounts in connection with the
attack.
|
Lulz Security goes WikiLeaks |
06/29/2011
|
|
Both the hacking supergroup
calling itself Lulz Security and researchers fighting against it have
borrowed tactics from WikiLeaks in recent days, dumping sensitive
information onto the internet for others to comb through.
In the first of a promised series of mass distributions of secret
government material, Lulz late on Thursday published hundreds of
documents from Arizona’s department of public safety.
Lulz said it targeted Arizona because of harsh new laws there aimed at
illegal immigrants. But it is also a bid to build popular support and
attract more hackers to its generally anti-government cause.
|
Stronger Net Security |
06/28/2011
|
|
A small group of Internet
security specialists gathered in Singapore this week to start up a
global system to make e-mail and e-commerce more secure, end the
proliferation of passwords and raise the bar significantly for Internet
scam artists, spies and troublemakers.
|
Guilty in Security Hack |
06/28/2011
|
|
One of the computer hackers
allegedly responsible for gathering email addresses of iPad customers
from the AT&T servers has pleaded guilty and could face up to five
years in prison per charge.
Accused hacker Daniel Spitler pleaded guilty to identity theft and
conspiracy to gain unauthorized access to computers, The Wall Street
Journal reports. Spitler is allegedly part of the Goatse Security
hacking group that orchestrated a security breach of AT&T's servers
shortly after the launch of the original iPad.
|
Bulger is a Security Coup |
06/27/2011
|
|
The return to Boston of fugitive Irish-American gangster James Whitey Bulger after 16 years on the run was met with high security at a courthouse that had not even been built when he fled the city.
Bulger arrived at the tightly guarded federal courthouse in Boston last
night to answer charges that he committed 19 murders. His girlfriend,
who was arrested with him on Wednesday in California, was scheduled to
appear in court on charges of harbouring a fugitive.
|
Dept of Defense Recruiting |
06/26/2011
|
|
The U.S. Department of Defense
and Department of Homeland Security have established a pilot program
with leading private defense contractors and ISPs called DIB Cyber Pilot
in an attempt to strengthen each others knowledge base regarding
growing security threats in cyberspace, a high-ranking DOD official told
a gathering of global security experts this week.
|
Falsified Security |
06/25/2011
|
|
In a colossal failure of 9-11
security measures, an illegal immigrant used the stolen ID of a Bronx
man with an arrest record to get hired as an airline flight attendant,
and flew several trips as a trainee before he was busted yesterday,
authorities said.
Besides getting a job at American Eagle, Jophan Porter, 38, used the
stolen ID to obtain a US passport, a US Department of Transportation ID
card and at least three Florida driver's licenses, law-enforcement
sources told The Post.
Porter was caught after ID-theft victim Anthony Frair of The Bronx was
denied food stamps because government records matched him to the airline
job.
|
|
Computer security firm RSA says
it is only offering to replace about a third of its SecurID tokens, amid
indications it could take months to swap them out for its entire user
base.
The comments clarify steps the firm is taking following a pair of
high-profile hacking incidents that involved the theft of information
related to the SecurIDs and an attack on RSA customer Lockheed Martin
Corp.
|
Tunnels on Security a Risk |
06/24/2011
|
|
Mexican drug cartels to traffic
illicit goods into the country could be used to smuggle terrorists or
weapons of mass destruction.
Sens. Diane Feinstein and Chuck Grassley, the chair and vice-chair of
the Senate Caucus on International Narcotics Control, are stepping up
congressional efforts to combat the growing use of tunnels along the
southwest border.
Eleven tunnels - used to smuggle drugs, money, weapons, and in some
cases people - have been discovered so far this year,
bringing the total number of tunnels found by law enforcement
authorities since 2001 up to 125. The majority of the tunnels have been
found in southern California and Arizona.
|
Hacking Advice |
06/23/2011
|
|
Lulz Security has been all over
the Internet wreaking havoc in the name of a good time. The hackers have
revived Tupac Shakur at the PBS Web site, dropped in to say hello to
the CIA and angered thousands of gamers by interrupting service on EVE
Online, a multiplayer role-playing computer game. They also released
62,000 e-mails and passwords, all in the name of Lulz — Internet
short-speak for laughter.
complete article
|
Cyber Intrusions are Normal |
06/22/2011
|
|
Cyber intrusions are fast
becoming the norm at even the worlds most technologically sophisticated
companies. This surprisingly includes some companies that have cyber
security as their main mission.
|
Growing Need of Cyber Security |
06/21/2011
|
|
There have been a number of shocking events over the past year and a half in the world of cyber security.
Some of the events include: mass breaches of consumer information at
Sony and elsewhere, the Stuxnet worms stealthy attack on the Iranian
nuclear program, the security breach at defense contractor Lockheed
Martin and the Chinese electronic break-in at Google .
|
Benefits of Shopping Online |
06/20/2011
|
|
Why buy online? Why not buy
online? Have you ever considered the pros and cons to shopping at a
retail store vs shopping online? Lets take a look at the advantages and
disadvantages of purchasing online...
Advantages Of Shopping Online...
1. Saves Time
If you already know what you are looking for, shopping online can save
you a significant amount of time. With just a few clicks of the mouse,
you can place your order and move on to other things.
Benefits of Shopping Online
|
|
Citigroups disclosure that the
names, account numbers and e-mail addresses of 200,000 of its credit
card customers were stolen strikes at the core of financial life.
Half of all Americans have a credit card. The Citi attack is a reminder
that the technology protecting their data was built by humans, security
analyst Jacob Jegher notes — and can be breached by humans.
|
NSA Official Pleads Guilty |
06/17/2011
|
|
A former National Security Agency official pleaded guilty on Friday to one misdemeanor count of exceeding the authorized use of a computer.
Thomas Andrews Drake, 54, accused of leaking classified information to a
reporter, entered a plea deal with the Justice Department. They agreed
to drop all 10 more serious charges-- including illegally possessing
classified information, obstructing the investigation into the leaks and
lying to the FBI, the New York Times reports.
|
Nuclear Security Asleep |
06/16/2011
|
|
Their job is to secure the only nuclear power plant in Arkansas, but four security guards were caught sleeping while on duty.
Four security guards at Arkansas Nuclear One, in Russellville, are accused of sleeping on the job.
|
New RSA Security Chief |
06/15/2011
|
|
RSA, the Security Division of
EMC, has named as its new security chief Edward Schwartz, who takes the
position amid heated criticism over a SecureID data breach that left
many of RSAs high profile customers vulnerable to cyber attacks.
|
Anonymouse Hackers Arrested |
06/14/2011
|
|
Spanish authorities say they
have arrested three members of the international group of computer
hackers who call themselves Anonymous.
All three are Spanish, and between the ages of 30 and 32, said Manuel
Vazquez, chief of the police department's high-tech crime unit. They
were were arrested in the coastal city of Barcelona, in the region of
Valencia and in the southern city of Almeria. Their names were not
immediately made public.
Reuters reported that the three were involved in Aprils crippling attack
on Sonys PlayStation network. But Sony had no immediate comment, and
the information could not be confirmed by ABC News.
|
Insecurity about the Cloud |
06/13/2011
|
|
Most enterprises face
apprehension over adopting cloud computing, and with good reason: Nearly
half of enterprise IT decision makers reported a security lapse or
issue with their cloud provider within the last 12 months, according to a
recent global cloud security survey conducted by Trend Micro.
The global survey of 1200 U.S., UK, Germany, India, Canada and Japan IT
decision makers uncovers the insecurities and concerns surrounding their
journey to the cloud. It confirmed that, on the whole, enterprises are
moving toward the cloud at a brisk pace and are initiating a giant
multiplicative wave of new deployments. Although slightly over 10
percent of the respondents currently have cloud computing projects in
production, close to half are either implementing or piloting new cloud
applications.
|
Ban Ki-moon Wants Second Term with UN Security Council |
06/12/2011
|
|
Ban Ki-moon formally asked the
U.N. Security Council to support his candidacy for a second five-year
term as U.N. secretary-general, according to a letter obtained by
Reuters on Monday.
Ban, a former South Korean foreign minister, already had received
assurances of support from the United States and other key members of
the U.N. Security Council, diplomats said in March, making his
re-election all but certain.
Ban's first term ends on December 31. He is unopposed so far.
|
Hackers Hack Security Site |
06/11/2011
|
|
A group of shadowy hackers
responsible for a string of recent high-profile cyberattacks has claimed
to have stolen email addresses and passwords from associates of an
FBI-affiliated security program.
The hackers who call themselves Lulz Security, or LulzSec, said
they had attacked the website of the Atlanta chapter of InfraGard in
retaliation for US efforts to classify hacking as an act of war.
Lulz Security published a list online of around 180 email addresses and
passwords which the group said were obtained from the InfraGard website.
We also took complete control over the site and defaced it, Lulz Security said in a statement at their website, Lulzsecurity.com.
|
Citadel to Teach Homeland Security |
06/10/2011
|
|
The Citadel Graduate College has
opened enrollment to a new graduate certificate in homeland security.
The new program will introduce students to basic homeland security
concepts, applicable management principles, policy analysis as well as
skills necessary to successfully address security challenges within the
United States and abroad. Classes are scheduled to begin in the fall.
|
Hackers exploiting Flash Player XSS vulnerability |
06/09/2011
|
|
Adobe has released another Flash
Player update to fix a serious security vulnerability that could expose
Windows, Mac OS X, Linux and Solaris users to cross-site scripting
attacks.
This universal cross-site scripting vulnerability could be used to
take actions on a users behalf on any website or webmail provider, if
the user visits a malicious website, Adobe warned in an advisory.
|
Facebook Security Settings |
06/08/2011
|
|
Facebook is an amazing website
that allows you to catch up with family and friends all over the world.
But losing control of your Facebook account can dangerous; especially
given the amount of information Facebook has on you.
With that in mind, here are three account settings you should consider
changing to make your account more secure passwords, login approvals,
and browsing Facebook securely.
|
China Denies Hacking |
06/07/2011
|
|
Chinas defense minister on
Sunday reiterated the nations denial in having any involvement in a
series of cyber attacks on U.S. security systems.
The Chinese government attaches importance on cyber security and
stands firmly against all kinds of cyber crimes, Liang Guanglie noted
during an Asia-Pacific security forum in Singapore. It is hard to
attribute the real source of attacks.
|
Cloud Security Concerns |
06/07/2011
|
|
When I talk to people who deal
with network security on a daily basis, I often ask how they feel about
cloud security. The reaction I get is usually mixed. Some love it, but a
surprising number are very wary about it, and more than a few have
resisted the move to the cloud because they do not trust the security.
|
Security Breaches |
06/06/2011
|
|
If you have not yet checked to
see if your email address and password are now public knowledge, it
would be a good idea to take a couple of minutes to make sure your
information was not compromised in the past few days. One thing is
certain: Seldom have events supplied a more compelling argument for
following basic security measures.
|
Lockheed-Martin Hacked |
06/01/2011
|
|
The network of defense
contractor Lockheed-Martin was attacked using counterfeit electronic
keys. Since the RSA Security network was hacked and the keys to its
SecurID tokens were compromised a few months ago, the world has been
waiting for the proverbial other shoe to drop. Well, it dropped.
|
Google Wallet Security Has a Weakness |
06/02/2011
|
|
Google unveiled details of
Google Wallet this week. Google Wallet is an ambitious mobile payment
plan designed to let your Android smartphone be your wallet, but you
should consider very carefully just how secure your credit card data
will be in Google Wallet.
Do not get me wrong, Google understands the inherent security risks of
storing credit card information, and it has gone to great lengths to
ensure sensitive data is protected in every way possible. But, at the
end of the security chain is an authorized Android app, and that is the Achilles heel of Google Wallet security.
|
Cloud Security |
06/02/2011
|
|
Cloud Security Lie #1
The first big lie is that private cloud computing is, by definition,
secure merely by way of the fact that it is deployed within the
boundaries of a companys own data center. This misunderstanding arises
from the fact that cloud computing contains two key differences from
traditional computing: virtualization and dynamism.
Cloud Security Lie #2
The second lie about cloud computing security relates to assumptions
about public cloud security, specifically, the assumption that security
in public cloud computing rests solely with the CSP. The reality is that
security in a service provider world is a responsibility shared between
the provider and the user, with the former responsible for security in
the infrastructure up through the interface point between application
and hosting environment, and the user responsible for security with
respect to interfacing with the environment, and importantly, within the
application itself.
|
Microsoft Security Essentials |
06/01/2011
|
|
In these tough economic times,
everyone is trying to cut corners and get more for their money. Two free
applications for Windows will help protect your computer from viruses
and malicious software.
The first application is called Microsoft Security Essentials or MSE.
MSE is a free antivirus software created by Microsoft. It provides
protection against different types of malicious software like computer
viruses, spyware, and phony programs that pretend to be useful
applications but really steal your personal information.
|
|
The best security technology
available that would give the TSA an alternative controversial body
scanners is already in use worldwide -- just not here in the U.S.
And it will not be here any time soon, either.
Thanks to privacy concerns and infrastructure issues, iris scanners are
not planned for the U.S., a DHS spokesman told FoxNews.com. Airports and
security checkpoints could use the machines, which take an instant
picture of the eyeball from a few feet away and compare it against an
internal database, in the hunt for terror suspects or illegal
immigrants.
|
Bank Security in Pakistan |
05/30/2011
|
|
The State Bank of Pakistan has
asked banks to adopt minimum security standards to ensure safety,
security and maintenance of e-banking transactions.
Banks must design fool-proof data security processes and SBP has issued
various guidelines on critical subjects pertaining to operational
continuity and data security and safety, said SBP Deputy Governor Yaseen
Anwar.
|
New Malware on Android |
05/30/2011
|
|
New malware has appeared on Googles Android marketplace, under the guise of legitimate apps.
Users are duped into downloading the malicious code, which has been found in apps with names such as iBook, iCartoon and ShakeBanger.
The code is designed to send SMS messages in order to subscribe to paid services without the knowledge of the handset owner.
The SMS Trojans were discovered by security company AegisLab, which released the news via its blog this week.
|
Current Blog
2011 Security Blog Archive
June Archive
May Archive
April
Archive
March
Archive
February
Archive
January
Archive
2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive
2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
|