Students supported through California State University, San Bernardino's SFS program are being educated in cyber intelligence to deal proactively with cyber threats — to predict malicious behavior before it happens. Doing so draws not only on a background in computer and information science, but also on an understanding of human behavior and psychology and the political and economic environment.
Most organizations are facing rising threats in their information security risk environment, but...
More than 200 organizations and 400 cybersecurity professionals from 29 European countries...
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy;...
American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.
This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.
The U.S. Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."
Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. “White-hat hackers” deliberately break into computer systems and digital devices to find vulnerabilities before “black-hat hackers” can exploit them.
As high-tech features like adaptive cruise control, automatic braking and automatic parallel parking systems make cars smarter, it's also making them more vulnerable to hackers – a risk that an automotive security researcher says carmakers appear to be ignoring.
This webcast will walk through the details of a real-life Distributed Denial of Service (DDoS) attack, where Internet evidence recovered during the investigation was vital to the outcome of the case.
The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.
As a former ‘research scientist’ at the National Security Agency, I feel compelled to respond to James Bamford’s exclusive interview with Edward Snowden that appeared in the September issue of Wired magazine. Many of the factual assertions about the NSA and intelligence community that were included in Bamford’s article, and previous Snowden “disclosures,” are highly questionable.
The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.
According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.
The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.
In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.
Another day, another breach, and more credit cards are on the open market. I’m not sure what the thieves are going to be doing with the credit cards at this point but let’s take a look at where we are going and take a moment to reflect on what we’re doing here in infosec land.
A little-known Department of Homeland Security program for providing liability protection to US firms in the wake of terrorist or other attacks could also provide shelter for firms facing legal action in the wake of a cyber attack.
If we have learned anything about payment technology over the past decade, it’s that there will always be a new technology or a new scheme that will be championed as a way to reduce the growing rise of payment card fraud.
Former U.S. Homeland Security secretary Tom Ridge has launched a cyber crime insurance product in collaboration with syndicates operating at the Lloyd's of London insurance market, Ridge's new insurance firm says.
The city has scuttled an outdoor media company's project slated to install in payphone booths thousands of transmitters that could track people's movements by sending signals to their smartphones. Titan, which sells ad space in more than 5,000 phone kiosks, had received approval from the city to place the transmitters, known as beacons, in the booths, and 500 had already been installed around Manhattan.
Cybersecurity breaches such as those at Target, Home Depot, and JPMorgan Chase are expensive and embarrassing. While attacks may come from outside hackers, the FBI recently issued a warning that internal hacking from current and former employees poses the biggest threat — and is on the rise.
The National Institute of Standards and Technology (NIST) has published its NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, a document that reflects advances in smart grid technologies and developments from NIST’s collaborative work with industry stakeholders. Revisions to its guidelines for smart grid cybersecurity are available as well.
Days after GM announced the appointment of a chief security officer, automotive cybersecurity has gotten another boost with a $4 million Series A funding shot for car-focused Argus Cyber Security.
The 2014 iOCTA (Internet Organised Crime Threat Assessment), published by Europol's European Cybercrime Centre (EC3), describes an increased commercialization of cyber crime. A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals.
The U.S. Commerce Department’s National Institute of Standards and Technology has awarded a contract to operate its first Federally Funded Research and Development Center, which will support the National Cybersecurity Center of Excellence.
In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.
After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.
- Page 1