Source: National Cyber Security – Produced By Gregory Evans Healthcare executives’ “lackadaisical approach” to cybersecurity endangers the lives and futures of breach victims, who have little help or recourse for dealing with identity theft, according to a new report from the Institute for Critical Infrastructure Technology. It looks at The…
Snowden outlines government cellphone hacking tools, says he’s willing to do time in U.S.
Source: National Cyber Security – Produced By Gregory Evans National Security Agency whistleblower Edward Snowden said Monday that he’s willing to return to the U.S. and serve time in prison but won’t allow the government to use him to punish other whistleblowers. “I’ve volunteered to go to prison with the…
Detained Colombia hacker outlines alleged political plot against peace process
Source: National Cyber Security – Produced By Gregory Evans President Juan Manuel Santos Monday called on officials to get to the bottom of allegations that the political party of former President Alvaro Uribe was using classified intelligence to try to derail ongoing peace talks with the country’s largest guerrilla […]…
CBP Commissioner Kerlikowske outlines agency goals
Top Priority Sector: border_security Image Caption: R. Gil Kerlikowske Read More…. View full post on The Cyber Wars
ICE outlines U.S. laws it vigorously enforces
Top Priority Sector: law_enforcement_first_responders U.S. Immigration and Customs Enforcement’s (ICE) protects the United States by promoting homeland security and public safety through the criminal and civil enforcement of federal laws governing border control, customs, trade and immigration. Read More…. View full post on The Cyber Wars
State of Utah outlines mistakes made allowing theft of 780K records
After losing nearly 800,000 residents personal information the State of Utah admits to not encrypting the data, leaving default passwords in place and not performing regular audits to find the mistakes. View full post on Naked … View full post on National Cyber Security
F-Secure outlines the 2011 Mac malware scene
Over the past year we have regularly covered new malware threats that have emerged for OS X, which included attacks like MacDefender, BlackHole RAT, Flashback, and Revir, among a number of others. While our coverage of these threats may make them appear significant, when looking at the overall Mac malware…
Richard Clarke outlines four avenues for cyber crime attacks
Criminality, espionage, warfare and activism are the impetuses for today’s hackers Visit website for full story… View full post on cyber crime hacking – Yahoo! News Search Results View full post on National Cyber Security