Reuters
WASHINGTON (Reuters) - The U.S. Congress should conduct an in-depth assessment of Chinesecyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage, a federal advisory group said Wednesday. The ...
Yes, the FBI and CIA can read your email. Here's how | ZDNet: "The U.S. government -- and likely your own government, for that matter -- is either watching your online activity every minute of the day through automated methods and non-human eavesdropping techniques, or has the ability to dip in as and when it deems necessary -- sometimes with a warrant, sometimes without. . . . What caught Petraeus out was, of all things, his usage of Google's online email service, Gmail. . . . "
Cyber security bill is one of the most important issues facing Congress
Examiner.com
We are going to have a vote on cyber security. I spoke to the chairman of the committee a short time ago, Senator Lieberman. He is going to come over tomorrow and give a speech about the importance of this legislation. He and Senator Collins have...
Examiner.com
Haley orders extra cyber security
WPDE
South Carolina Governor Haley announced Wednesday she handed down an Executive Order requiring extra forms of cyber security be implemented in all of her cabinet agencies. The order requires all of the cabinet agencies to use 24-7 monitoring by South ...
AT&T Cyber Security Is $1 Billion Business Opportunity, Company Says
Huffington Post
Jules said AT&T's strategy for its global business solutions unit was to accompany big multinationals as they expand overseas to provide them not just with connectivity but new products and services like security and machine-to-machine technology ...
Report: Obama authorizes new cyber warfare directive
The Hill (blog)
“The directive establishes principles and processes for the use of cyber operations so that cybertools are integrated with the fully array of national security tools we have at our disposal,” the official said. “It provides a whole-of-government ...
Georgia Tech Cyber Threats Forecast for 2013: In Two Words - 'Very Active'
Techzone360
The annual Georgia Tech Cyber Security Summit is always a great event for catching up on what IT and risk assessment professionals need to be mindful of for protecting their data and the networks that critical information flows over. The event is also ...
New Cyber Group Aims To Spread Basic Security
DefenseNews.com
The critical control concept, where a simple list of security ideas is created as a starting point for cybersecurity efforts, is not new. The NSA created a version for internal use several years ago. At the suggestion of several cyber experts, John ...
HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security
eWeek
After the Cyber-Security Act of 2012 failed to pass, Rockefeller sent a letter on Sept. 19 to 500 CEOs, including many from health care organizations, to suggest that they conduct an audit of their level of preparedness for cyber-attacks. He inquired ...
Report warns electricity grid vulnerable to attack
Reuters
WASHINGTON (Reuters) - The electrical grid is vulnerable to terrorist attacks, including cyberstrikes, that could cause far more damage than those associated with natural disasters such as Hurricane Sandy, according to a report released on Wednesday ...
Tips to avoid cyber thieves
Bluefield Daily Telegraph
Don't share passwords with anyone. Avoid using common words, phrases, or personal information. Update regularly. • Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available free ...
ACLU worries about effects of Obama's 'vague' secret cyber security ...
By Stephen C. Webster
CISPA, however, included some things that Democrats actually wanted to do, like setting securitystandards for networks outside the government, which was at the heart of the squabble over cyber security earlier this year on Capitol Hill. Since that dust-up, Obama's staff has been drafting an executive order that would ... Building a relationship now in case there is an attack on private networks? Making resources available to critical infrastructure? There's so many ways you can go ...
The Raw Story
Georgia Tech releases cyber threats forecast for 2013 | Science Codex
By News
Those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging CyberThreats Report for 2013. The report was released at the annual Georgia ... One possible example is for attackers to use stolen credit card information to purchase cloud computing resources and create dangerous clusters of temporary virtual attack systems. Search History Poisoning – Cyber ...
Science Codex - Science news,...
Obama Signs Cyber Warfare Strategy - Business Insider
By Geoffrey Ingersoll
Nakashima reports that that the directive had been signed back in October, but the new cyber security defense capabilities are secret, and they can't be accessed. Crucially the new rules seem to allow for far more pre-emptive action. From the ...
Business Insider
Follow @sobeqorg