cyber

Remarks by Assistant Attorney General John P. Carlin on Cyber National Security Threats at Carnegie Mellon University

This week marks a busy time for national security law. There is a lot going on in the world, all of which we are tracking closely. But I’m going to focus today on the threats associated with national security cyber issues.




cyber

Justice Department Participates in Child Cyber Safety Night at Nationals Park, Saturday, September 6th

Child Cyber Safety Night at the Ballpark is the latest effort by the Justice Department and its law enforcement and community partners to encourage parents to speak with their children about online and cell phone safety and provide prevention materials.



  • OPA Press Releases

cyber

The MDCG cybersecurity guidance – a helpful rush job

It has been some time since the MDCG guidance on cybersecurity for medical devices was released (MDCG 2019-16 December 2019), so everybody has probably had the opportunity to get used to the document by now. While the document is by no means ideal or even flawless (congratulations MDCG on a glaring spelling mistake in the […]




cyber

Cyber-spinach turns sunlight into sugar




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Shining a Light on Cybersecurity Policy in the Middle East

Despite the growing profile of cyber hacks, leaks, and resulting diplomatic crises in Gulf Cooperation Council (GCC) countries, conversations about policy in the Middle East and North Africa (MENA) rarely address cybersecurity concerns. During the 2018-2019 academic year, a research collaboration between MEI and the Cyber Project at the Belfer Center looked to shift the dialogue.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




cyber

A Crime Wave in Cyberspace

Listen to the chatter from top officials, and you’d think that World War III was about to break out on the Internet. The defense secretary is warning about a digital “Pearl Harbor.” Former director of national intelligence Mike McConnell declares that the United States is “fighting a cyber war, and we’re losing.” Every new hack brings more pronouncements of network doom.

The scare talk, however, is misplaced. Yes, we’re facing enormous cybersecurity problems — just look at the high-profile penetrations of such companies as Sony and Lockheed or the millions of Americans whose personal information has been stolen online.

But these aren’t signs of some impending cataclysmic showdown as I explain in my new cybersecurity paper for The Brookings Institution. They’re markers of a rising tide of online crime that, in its own way, could be more dangerous than a cyberwar. According to the British government, online thieves, scammers and industrial spies cost U.K. businesses an estimated $43.5 billion in the past year alone. Crooks-for-hire will infect a thousand computers for $7 — that’s how simple it’s become. Sixty thousand new malicious software variants are detected every day. Forget “Pearl Harbor”; if we’re not careful, the Internet could be in danger of looking like the South Bronx circa 1989 – a place where crooks hold such sway that honest people find it hard to live or work there.

Could there be some online conflict in the future? Maybe. But crooks are draining billions from the legitimate global economy right now. Even the Pentagon’s specialists are worried, noting in their new cybersecurity strategy that “the tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate.”

Those tools also are becoming easier to use. The latest crimeware makes stealing passwords about as simple as setting up Web pages. One gang, recently arrested, used it to drain $9.5 million in just three months.

Read the full article at washingtonpost.com >>

Authors

Publication: The Washington Post
      
 
 




cyber

Cyber runs: How a cyber attack could affect U.S. financial institutions

Cyber risks to financial stability have received significant attention from policy makers. These risks are worsened by the increasing diversity of perpetrators—including state and non-state actors, cyber terrorists, and “hacktivists”—who are not necessarily motivated by financial gain. In fact, for some actors, the potential of exploiting a cyber event to inject systemic risk into our…

       




cyber

Waging (cyber)war in peacetime

Editor’s note: In this post, the second in a series drawing from Fergus Hanson's new book, "Internet Wars: The Struggle for Power in the 21st Century," Hanson makes the case that the United States has a strong interest in leading a more robust global discussion on cyberwarfare as cyberattacks in times of peace increase. A…

       




cyber

Norms of cyberwar in peacetime

Editor’s Note: Cyberattacks and the appropriate response are new territories in national security. While most attacks do little damage and their perpetrators are often unclear, the potential risk is growing. Fergus Hanson unpacks the cyber threat and offers his thoughts on how to best respond. This post originally appeared on Lawfare.  Cyberattacks regularly make the headlines.…

       




cyber

Will Sharing Cyberthreat Information Help Defend the United States?

On Tuesday January 13th, 2015, the White House published several legislative proposals concerning cybersecurity. The purpose of one of the initiatives is to “codify mechanisms for enabling cybersecurity information sharing between private and government entities, as well as among private entities, to better protect information systems and more effectively respond to cybersecurity incidents.” How should…

       




cyber

What are the prospects for the Cyber Threat Intelligence Integration Center?

Last week we learned that the federal government plans to create a Cyber Threat Intelligence Integration Center (CTIIC). There is some confusion about the purpose of this agency, especially as it relates to the National Cybersecurity and Communications Integration Center (NCCIC) and the United States Computer Emergency Readiness Team (US-CERT). While I am not a…

       




cyber

New cybersecurity mantra: “If you can’t protect it, don’t collect it”

In early August I attended my 11th Black Hat USA conference in sunny Las Vegas, Nevada. Black Hat is the somewhat more corporate sibling of the annual DEF CON hacker convention, which follows Black Hat. Since my first visit to both conferences in 2002, I’ve kept tabs on the themes expressed by computer security practitioners.…

       




cyber

Outside perspectives on the Department of Defense cyber strategy

Chairman Thornberry, Ranking Member Smith, members of the Committee, thank you for the opportunity to testify. I am Richard Bejtlich, Chief Security Strategist at FireEye. I am also a nonresident senior fellow at the Brookings Institution, and I am pursuing a PhD in war studies from King’s College London. I began my security career as…

       




cyber

Cyber Grand Challenge contrasts today’s cybersecurity risks

Cade Metz’s article for Wired titled “Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It” described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests,…

       




cyber

Tweetable, Interactive Algae Farm is Energy-Generating "Cyber-Garden" (Photos)

This fascinating installation where algae, bioluminescent bacteria, humans and smartphones interact may chart where a new generation of urban "cyber-gardeners" may go.




cyber

One In Five Canadians Crossing the Border To Get Into the Black Friday/ Cyber Monday Madness

It's one thing to drive to the mall, but one fifth of Canadian shoppers are driving to another country. That's crazy.






cyber

'It was suddenly Cyber Monday' — Etsy CEO says sales spiked 79% in April

"When the CDC changed its [face mask] guidelines ... we all of a sudden saw overwhelming amounts of demand come on to our site," Etsy CEO Josh Silverman told CNBC.




cyber

Financial advisors need to put cybersecurity plans to the test

Today's advisory firms face numerous cybersecurity risks, from phishing to ransomware to email viruses, to name a few. And the one way that firms can tell if they're ready to face these risks, as well as regulators' requirements, is to put them to the test.






cyber

soooo cyber

Today on Toothpaste For Dinner: soooo cyber






cyber

Ananya Panday and The Vamps' James McVey to get vocal on cyber bullying

In a first of its kind international venture, youth icons Ananya Panday and international songwriter and guitarist from The Vamps band - James McVey - are all set to come together on the former’s ‘So Positive’ platform to raise awareness about social media bullying. The live session will be hosted on 8th May 2020 at 7 pm.

James McVey, the lead guitarist, and songwriter of the internationally renowned British band The Vamps, is known globally for spreading social media positivity. The coming together of the two, Panday and McVey, marks a collaboration that goes beyond the confines of language and geography to attain more awareness on the issue. The statistics are proof of how teenagers and children are the most affected in this digital era. The number of platforms accessible to the population across the world are increasing with every passing day. This collaboration would be extremely insightful in terms of shedding light on this issue and help individuals dealing with social media bullying.

Sharing his experience James McVey said, “During this difficult time we find ourselves using social media more than ever. When I was at the receiving end of bullying I felt isolated and alone. Regardless of where you live or your background, it’s important to remember that you are never alone. Millions of others are going through the same traumatic experience and I believe together we further the conversation and join the fight to end bullying. I’m looking forward to speaking with Ananya on ‘So Positive’ to learn more about her experiences.”

Ananya Panday shares, "Social media bullying is an evil that people face every day on the numerous platforms that they use in their daily lives. I’m glad that James McVey and I will be fighting this evil together in our own small way. The world is going through a difficult time, currently and it is even more important than ever to be kind to everyone around and spread positivity. So Positive has been creating awareness through different ways and our aim continues to be to negate the spread of social media bullying by spreading positivity all across. I’m really looking forward to this insightful exchange with James”.

So Positive is a cause taken up by Ananya which is backed with substantial data, research, and behavioural statistics. The initiative aims at creating and spreading awareness about social media bullying. Its prime focus is to make people aware of the fact that this issue exists and stays very prevalent in society. Also, the steps that can be taken by the recipients of this destructive criticism in order to deal with this.

ALSO READ: Ananya Panday says Vijay Deverakonda is humble and grounded despite being a huge star




cyber

Software defends against cyberattacks on energy grids

An EU-funded project is developing software designed to prevent, detect and act on cyberattacks on smart meters in big infrastructure installations, boosting the security of our power supplies.