Days after U.S. President Barack Obama declared cyber-security a national security priority in a speech, reports are circulating that potential sensitive information on the country’s nuclear facilities leaked out onto the Internet. The 260-plus page document, which featured maps showing the locations of stockpiles of fuel for nuclear weapons, was posted on the U.S. Government […]
If you are a network administrator worried about managing your fellow employees’ iPhones, fear not–the Center for Internet Security has some security advice for you. The nonprofit just released a benchmark for Apple iPhone security. The document offers more than 20 recommendations and instructions dealing with iPhone OS settings, secure data destruction, settings for Safari […]
Sophos is bringing together its e-mail, endpoint and Web security technologies in a new protection suite aimed at slashing costs and administration for enterprises. With the Security and Data Protection suite, Sophos is combining several offerings: Endpoint Security and Data Protection, Email Security and Data Protection, and Sophos Web Security and Control. Much of the […]
Researchers at Websense are reporting a mass compromise that may have affected as many as 40,000 Websites. Although Websense would not name any of the compromised sites, researchers said the victims did not include any “big-name government or business sites.” The compromised sites are redirecting users to typo-squatted misspellings of legitimate Google Analytics domains. From […]
Researchers at Kaspersky Lab have uncovered what may be the first attempt by attackers to use Twitter for scareware scams. The attack begins with a message, or tweet, with the words “Best Video” laced with a malicious link. Those tricked into clicking the link are directed to a rogue Website with a YouTube video. Once […]
Now that the 60-day review of America’s cyber-security strategy is public, the hard part can begin. With the challenge of implementing policies to shore up the nation’s cyber-infrastructure lying ahead, some in the security community shared their thoughts on the first steps the Obama administration should take on the path to a more secure Internet. […]
Five Hacks That Will Challenge Obamas Cyber-security Plans by Brian Prince Hackers Fly Off with Plans for Fighter Plane Hackers took advantage of network vulnerabilities of contractors involved in the development of the Pentagon’s $300 billion Joint Strike Fighter project to get their hands on project data. U.S. military officials said they traced the penetration […]
U.S. President Barack Obama pledged a new era for the country’s cyber-security efforts today as White House officials pulled the covers off the 60-day review of the government’s cyber-security posture. The document, available here, calls for anchoring leadership for cyber-security efforts at the White House. To that end, Obama also announced the creation of the […]
A report by the U.S. Department of Interior’s inspector general’s office does not paint a rosy picture of the department’s IT. On the heels of a separate report alleging widespread failures around the tracking and managing of passports, the inspector general found that the department cannot locate roughly 18 percent of a sample of 2,500 […]
Microsoft is investigating reports of a vulnerability in Microsoft DirectX that is under attack by hackers using malicious QuickTime videos. According to a Microsoft advisory, the vulnerability can be exploited by hackers to remotely execute code with the rights of the logged-on user. Specifically, the vulnerability is in the QuickTime parser in Microsoft DirectShow, and […]