background preloader

HTTB Direct Distribution (V7)

Facebook Twitter

Tax-Shelter Fraud Defendant Seeks New Trial Over Ineffective Counsel. McAfee Explains The Dubious Math Behind Its 'Unscientific' $1 Trillion Data Loss Claim. Internet Wins Again! We Beat Back Cyber-Snooping Bill. Internet Wins Again!

Internet Wins Again! We Beat Back Cyber-Snooping Bill

We Beat Back Cyber-Snooping Bill The Internet wins again! The advocates for the cyber-security bill failed to get enough support to proceed to a final vote on the legislation. They won't be reading your email and sharing your personal data -- anytime soon, at least. Will you add your name at right to thank the senators who stood with us? You guys were amazing throughout this fight: Demand Progress members sent 500,000 emails to the Senate and made thousands of phone calls in opposition to the bill. Cyber war games on tap for Wright-Patt - Dayton Business Journal. iStockphoto The U.S. military’s latest batch of cyber defenders will test its talent in war games at Wright-Patterson Air Force Base.

Cyber war games on tap for Wright-Patt - Dayton Business Journal

The U.S. military’s latest batch of cyber defenders will test its talent in war games at Wright-Patterson Air Force Base. On Wednesday, more than three dozen cadets and midshipmen from Air Force, Army and Navy ROTC detachments will be split into two teams competing in a “Hackfest” exercise. During the large-scale cyber warfare event, which runs through the end of this week, the future military officers will use defense tactics they learned this summer at the Air Force Institute of Technology.

Participants in this year’s Cyber Security Boot Camp at AFIT come from 30 different schools and 22 states. Campaign 2012 » Defense Update: Congress Drops Cybersecurity Ball. U.S.

Campaign 2012 » Defense Update: Congress Drops Cybersecurity Ball

Air Force personnel monitor cybersecurity threats from the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs, Colorado July 20, 2010 (Rick Wilking/Courtesy Reuters). Congress left Capitol Hill for its summer vacation without passing a measure that would protect U.S. infrastructure from foreign attacks via the Internet despite concerns expressed from the presidential campaign trail. A bill that would have established security standards to prevent large-scale cyber attacks (WashPost) on the U.S. critical infrastructure failed to draw enough votes in the Senate to overcome a GOP filibuster last week, in spite of support from current and former homeland security, intelligence, and defense leaders from both sides of the aisle.

The White House is now said to be considering an executive order (TheHill) to enact some of the protections without help from Congress. How Apple and Amazon Security Flaws Led to My Epic Hacking. In the space of one hour, my entire digital life was destroyed.

How Apple and Amazon Security Flaws Led to My Epic Hacking

First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. The Security & Privacy Digest. Blogs. Posted by: Arunachalam Sam, Group IT/IS Manager, Mulitex Group Every day I see stories on the benefits the cloud brings to businesses.

Blogs

From improved flexibility and scalability to resource savings, the cloud’s business value is clear. Yet, all that promise is irrelevant if a cloud provider’s promises aren’t backed up with a commitment to security and privacy and an adherence to internationally recognized standards. Fortunately for my company, Mulitex Group, we found the security and privacy commitment we needed in Microsoft Office 365 and are now reaping the benefits. We are headquartered in Hong Kong, with offices in the U.S., South America, Bangladesh, Vietnam and India.

With our company facing rapid growth we needed a cloud solution that could help our workers access data securely from a variety of devices in multiple locations. Information Security News. Cities / Visakhapatnam : Full-fledged cyber police station under consideration, says CP. A Cyber Crime Investigation Cell was inaugurated by Police Commissioner J.

Cities / Visakhapatnam : Full-fledged cyber police station under consideration, says CP

Purnachandra Rao at the Two Town Police Station here on Saturday. Speaking to the media after the inauguration, Mr. Purnachandra Rao said that the Cyber Cell was functioning from the premises of the Central Crime Station (CCS) during the last couple of years. He, however, said that the proposal for setting up of a full-fledged Cyber Crime Police Station was still under consideration. Mobile apps are new cyber crime attack vector. RSA identifies and manages malicious mobile apps that infiltrate online app stores.

Mobile apps are new cyber crime attack vector

Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says RSA, the security division of EMC. To combat this issue, the company has introduced the RSA FraudAction Anti Rogue App Service that can identify and take action against rouge mobile apps that are out to serve up malware or phishing attacks. The release of this application is well timed as a report from TrendMicro TrendLabs indicates that the number of malicious Android apps jumped over 20,000 in July 2012. RSA also notes an April 2012 report from Goode Intelligence that shows about 71 percent of organisations allow their employees to use their own mobile devices for company business. RSA's new managed service has been designed to monitor all major app stores for all mobile operating systems. Proactive management.