HTTB Direct Distribution (V7)
Get flash to fully experience Pearltrees
Internet Wins Again! We Beat Back Cyber-Snooping Bill The Internet wins again! The advocates for the cyber-security bill failed to get enough support to proceed to a final vote on the legislation.
iStockphoto The U.S. military’s latest batch of cyber defenders will test its talent in war games at Wright-Patterson Air Force Base. The U.S. military’s latest batch of cyber defenders will test its talent in war games at Wright-Patterson Air Force Base . On Wednesday, more than three dozen cadets and midshipmen from Air Force, Army and Navy ROTC detachments will be split into two teams competing in a “Hackfest” exercise. During the large-scale cyber warfare event, which runs through the end of this week, the future military officers will use defense tactics they learned this summer at the Air Force Institute of Technology . Participants in this year’s Cyber Security Boot Camp at AFIT come from 30 different schools and 22 states.
U.S. Air Force personnel monitor cybersecurity threats from the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010 (Rick Wilking/Courtesy Reuters). Congress left Capitol Hill for its summer vacation without passing a measure that would protect U.S. infrastructure from foreign attacks via the Internet despite concerns expressed from the presidential campaign trail. A bill that would have established security standards to prevent large-scale cyber attacks ( WashPost ) on the U.S. critical infrastructure failed to draw enough votes in the Senate to overcome a GOP filibuster last week, in spite of support from current and former homeland security, intelligence, and defense leaders from both sides of the aisle.
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
Posted by: Arunachalam Sam , Group IT/IS Manager, Mulitex Group Every day I see stories on the benefits the cloud brings to businesses. From improved flexibility and scalability to resource savings, the cloud’s business value is clear. Yet, all that promise is irrelevant if a cloud provider’s promises aren’t backed up with a commitment to security and privacy and an adherence to internationally recognized standards. Fortunately for my company, Mulitex Group , we found the security and privacy commitment we needed in Microsoft Office 365 and are now reaping the benefits. We are headquartered in Hong Kong, with offices in the U.S., South America, Bangladesh, Vietnam and India.
A Cyber Crime Investigation Cell was inaugurated by Police Commissioner J.
August 06, 2012 — IDG News Service — Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says RSA, the security division of EMC. To combat this issue, the company has introduced the RSA FraudAction Anti Rogue App Service that can identify and take action against rouge mobile apps that are out to serve up malware or phishing attacks. The release of this application is well timed as a report from TrendMicro TrendLabs indicates that the number of malicious Android apps jumped over 20,000 in July 2012. RSA also notes an April 2012 report from Goode Intelligence that shows about 71 percent of organisations allow their employees to use their own mobile devices for company business. RSA's new managed service has been designed to monitor all major app stores for all mobile operating systems.