Cyber Defense

Cyber Defense Update: How To Protect The “Smart Grid” From Cyber Attack

BIRMINGHAM ? Eric Knapp, Director of Critical Infrastructure Markets at NitroSecurity, talks about how to secure the power distribution systems and the ?smart grid? in a Cyber Defense Update webinar with Richard Stiennon. Knapp is the author of Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. He

By |2012-01-13T00:00:00-05:00January 13th, 2012|Archive, Cyber Defense|

Fallout From The Christmas Hack of Stratfor

BIRMINGHAM - Let this be the day that you change your password practices. On December 24th, 2011, Anonymous, the group of hackers that includes anyone who chooses to adapt that label, announced that they had broken into the servers of the defense intelligence organization Stratfor. Despite Anonymous? belief in a vast military-industrial-government conspiracy, Stratfor is

By |2012-01-04T00:00:00-05:00January 4th, 2012|Archive, Cyber Defense|

Sprint Disables Carrier IQ Software On Mobile Phones

SAN FRANCISCO - Sprint, which for weeks has defended its use of Carrier IQ software on mobile phones, is now disabling the software, a Sprint spokeswoman told CNET News.Com. "We have weighed customer concerns and we have disabled use of the tool so that diagnostic information and data is no longer being collected," spokeswoman Stephanie

By |2011-12-19T00:00:00-05:00December 19th, 2011|Archive, Cyber Defense|

Android Malicous Apps Proliferating

SAN FRANCISCO - The number of malicious apps mobile security firm Lookout has identified in less than six months has doubled to 1,000, according to a report from Lookout. The vast majority of those dubious apps are found on third-party app stores and alternatives to the official Android Market, the company said in a report

By |2011-12-16T00:00:00-05:00December 16th, 2011|Archive, Cyber Defense|

Only One-Third Of Companies Use Data Effectively For Biz Decision Making

NEW YORK - The largest-ever global survey of the data science community, spanning the United States, the United Kingdom, France, Germany, India and China, finds that only one-third of companies are able to effectively use new data to assist their business decision-making, gain competitive advantage, drive productivity growth, yield innovation and reveal customer insights. The

By |2011-12-14T00:00:00-05:00December 14th, 2011|Archive, Cyber Defense|

Apple iOS Is Safer Than Android, McAfee Says

SAN FRANCISCO - In the fight against malware, Apple's iOS outshines Android as a safer environment, but no mobile device is free from risk, says a new report from McAfee. Apple has so far done a good job of securing its devices, according to the report, noting that there have been no known cases of

By |2011-12-07T00:00:00-05:00December 7th, 2011|Archive, Cyber Defense|

Fragmented Enterprise Encryption Cost Businesses Average $124,965 Per Year

SAN FRANCISCO - Symantec's new 2011 Enterprise Encryption Trends survey concludes that the inability to access important business information due to fragmented encryption solutions and poor key management is costing the average business $124,965 per year. Survey has found businesses are securing data with encryption in more places than ever. The problem is that encryption

By |2011-12-02T00:00:00-05:00December 2nd, 2011|Archive, Cyber Defense|

Your Android Smartphone Could Be Watching Your Every Move

SAN FRANCISCO - Your Android-based smartphone could be watching just about everything you do, Android security researcher Trevor Eckhart argues in a video posted earlier this week. In the nearly 20-minute video clip, Eckhart shows how software developed by mobile-device tracker Carrier IQ logs each keystroke and then sends them off to locations unknown. In

By |2011-11-30T00:00:00-05:00November 30th, 2011|Archive, Cyber Defense|

DHS Denies Report Of Illinois Water Utility Hack

WASHINGTON DC - The Department of Homeland Security and FBI dismissed the conclusions of a report that a cyber intrusion caused a pump at an Illinois water utility to burn out. But the statement doesn't explain why an Illinois state terrorism intelligence center would say it was a hacker when it wasn't. In the meantime,

By |2011-11-28T00:00:00-05:00November 28th, 2011|Archive, Cyber Defense|