Yasmin Tadjdeh National Defense Magazine Charleston, S.C. — The military, the government, the private sector and private citizens are underprepared for growing cyberthreats from Chinese hackers, said a top Google executive. “Security needs to be everybody’s concern, and it needs to be much more pervasive not only in the Defense …
Read More »What To Do When Your Phone Gets Hacked
Elise Ackerman Forbes What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing …
Read More »US to Scan Facebook and Twitter for Evidence of Bioterrorism
Liat Clark Wired Magazine – UK The US department of Homeland Security has commissioned a one-year contract to investigate the efficacy of using social networks to identify instances of bioterrorism, pandemics and other health and security risks. It is paying Accenture Federal Services $3 million (£1.8 million) to scan the …
Read More »CIA Mistress’ Email May Have Been Hacked By Anonymous
Zeke Miller Buzzfeed Paula Broadwell’s personal email appears on a list of compromised accounts, hacked by Anonymous, stolen from the commercial intelligence firm Stratfor. A Yahoo email account belonging to former CIA Director David Petraeus’ mistress may have been compromised by the group Anonymous. The personal email account, which other …
Read More »US Fighting Global Cyber Warfare
Michael Kling Money News The Pentagon is striving to improve the military’s global cyber warfare capabilities — both offensive and defensive abilities — in an effort to prevent an electronic Pearl Harbor. The Army is interested in leading the cyber war effort through its new Army Cyber Command, according …
Read More »NICT Daedalus Gives Startling Function and Beauty to Cyber Security
Meg Jones VirtualThreat Guest Writer NICT Daedalus. It’s an unfortunate fact that many people fail to realize, but advancements in technology also lead to advancements in criminal activity. Yes, even the technologies that are intended for our safekeeping, security, and protection. In short, the bad guys can nearly always …
Read More »The Jester’s OSINT Tools Include Maltego Creepy and Spokeo
Infosecurity Magazine Jester (th3j35t3r) describes himself as a patriotic cyber activist. He spends his time trying to find and take down what he considers to be enemies of the USA, ranging from Wikileaks and Anonymous to militant Islamic websites. Jester’s identity is not publicly known. Many suspect that …
Read More »Five Week Financial Cyber Attack Against Largest US Banks Continues
Chris Dougherty VirtualThreat Contributing Writer For five weeks now some of the largest banks in the United States, including HSBC, Capitol One and BB&T, have been under a sustained cyber attack from unidentified hackers. The attackers are using denial of service (DOS) attacks to cripple access to the banks’ …
Read More »Hackers May Be Able To Manipulate Election Results
Ericka Chickowski DarkReading Hackers May Be Able To Manipulate Election Results. As the rest of the nation’s citizens sit on on pins and needles about who will win the presidential election — Barack Obama or Mitt Romney — information security pros are even more anxious in their wait to …
Read More »Hacked Pacemaker Used For Anonymous Assassination
Jeremy Kirk ComputerWorld IDG News Service – A hacked pacemaker or implantable cardioverter-defibrillator could be manipulated for an anonymous assassination. Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming …
Read More »