Cyber Defense

NSA Tracks Tor Encryption Users

WASHINGTON DC - Just because the National Security Agency hasn't cracked the anonymizing service Tor doesn't mean that people who use the service are free from surveillance. The NSA has been able to use ad networks like Google's, and The Onion Router's own entry and exit nodes on the Internet, to follow some Tor users,

By |2013-10-07T00:00:00-04:00October 7th, 2013|Archive, Cyber Defense|

Unpatched Internet Explorer Embedded With Attack Codes, Cyberattacks Imminent

SAN FRANCISCO - Attack code that exploits an unpatched vulnerability found in all supported versions of Internet Explorer has been released into the wild. This means that cyberattacks could now surge and affect Internet Explorer users. Known as CVE-2013-3893, the exploit was integrated Monday into Rapid7's open-source Metasploit penetration testing tool. By putting the exploit

By |2013-10-03T00:00:00-04:00October 3rd, 2013|Archive, Cyber Defense|

ISACA Detroit October Meeting Features Attack Paths, Data Breach Investigations

DEARBORN ? Attack paths and mitigations before dinner and Data Breach Investigations Report during are on tap Oct. 16 for the ISACA Detroit Chapter Meeting. J. Wolfgang Goerlich will address attack paths and mitigations, while Michael Betts will explain the results of the Verizon 2013 Data Breach Investigations Report. WHEN October 16 4:30 PM-7:45 PM

By |2013-10-02T00:00:00-04:00October 2nd, 2013|Archive, Cyber Defense|

UK Government To Recruit Computer Specialists To Defend Critical Infrastructure

LONDON - The UK government is planning to recruit hundreds of computer specialists to defend core infrastructure against cyberthreats, Conservative Defence Secretary Philip Hammond announced. Speaking at the annual Conservative party conference, Hammond said the United Kingdom was dedicating additional resources and funds to building a strong cyber intelligence and surveillance network, according to Reuters.

By |2013-10-01T00:00:00-04:00October 1st, 2013|Archive, Cyber Defense|

California Law Demands Web Sites, Apps Give Teenagers Eraser Button

SAN FRANCISCO - Teenagers in California worried that their online posts might jeopardize their future opportunities have gained a measure of recourse in the form of an online "eraser button." Legislation signed Monday by Gov. Jerry Brown will require Web sites, apps, and online services geared toward minors to offer, by 2015, the option of

By |2013-09-26T00:00:00-04:00September 26th, 2013|Archive, Cyber Defense|

Hacker Aggregator Network Provides Personal Data On Any U.S. Resident

SAN FRANCISCO - An illegal service that sells personal data on any U.S. resident, which can then be used for identity theft, hacked into servers at several major data aggregators including LexisNexis and Dun & Bradstreet, according to a report. The service's customers have, the report said, "spent hundreds of thousands of dollars looking up

By |2013-09-26T00:00:00-04:00September 26th, 2013|Archive, Cyber Defense|

U.S. Senators Propose Bill To Restrict NSA’s Spying On U.S. Citizens

WASHINGON DC - Several US senators are trying to clamp down on the activities of the National Security Agency through a new bill that would curb the NSA?s data gathering, which has angered privacy rights groups in the United States and foreign governments everywhere. Unveiled in Congress on Wednesday, the Intelligence Oversight and Surveillance Reform

By |2013-09-26T00:00:00-04:00September 26th, 2013|Archive, Cyber Defense|

Security Company Finds Trojan Horse For OS X – Syrian Electronic Army Culprit

SAN FRANCISCO - Security company Intego has found a new malware package for OS X, called OSX/Leverage.A, which appears to be yet another targeted command-and-control Trojan horse, this time with apparent associations with the Syrian Electronic Army; however, Apple has blocked its ability to run with an XProtect update only days after its discovery. The

By |2013-09-23T00:00:00-04:00September 23rd, 2013|Archive, Cyber Defense|