Brian Prince

U.S. Nuclear Information Leaked on GPO Web site

Days after U.S. President Barack Obama declared cyber-security a national security priority in a speech, reports are circulating that potential sensitive information on the country’s nuclear facilities leaked out onto the Internet. The 260-plus page document, which featured maps showing the locations of stockpiles of fuel for nuclear weapons, was posted on the U.S. Government […]

Center for Internet Security Releases iPhone Security Benchmark

If you are a network administrator worried about managing your fellow employees’ iPhones, fear not–the Center for Internet Security has some security advice for you. The nonprofit just released a benchmark for Apple iPhone security. The document offers more than 20 recommendations and instructions dealing with iPhone OS settings, secure data destruction, settings for Safari […]

Sophos Arms New Security Suite with Encryption Technology

Sophos is bringing together its e-mail, endpoint and Web security technologies in a new protection suite aimed at slashing costs and administration for enterprises. With the Security and Data Protection suite, Sophos is combining several offerings: Endpoint Security and Data Protection, Email Security and Data Protection, and Sophos Web Security and Control. Much of the […]

Hackers Hit 40,000 Websites with Mass Compromise

Researchers at Websense are reporting a mass compromise that may have affected as many as 40,000 Websites. Although Websense would not name any of the compromised sites, researchers said the victims did not include any “big-name government or business sites.” The compromised sites are redirecting users to typo-squatted misspellings of legitimate Google Analytics domains. From […]

Twitter Hit with Fake Security Software Scam

Researchers at Kaspersky Lab have uncovered what may be the first attempt by attackers to use Twitter for scareware scams. The attack begins with a message, or tweet, with the words “Best Video” laced with a malicious link. Those tricked into clicking the link are directed to a rogue Website with a YouTube video. Once […]

Sizing Up Obama’s Plans for Cyber-security

Now that the 60-day review of America’s cyber-security strategy is public, the hard part can begin. With the challenge of implementing policies to shore up the nation’s cyber-infrastructure lying ahead, some in the security community shared their thoughts on the first steps the Obama administration should take on the path to a more secure Internet. […]

Five Hacks That Will Challenge Obamas Cyber-security Plans

Five Hacks That Will Challenge Obamas Cyber-security Plans by Brian Prince Hackers Fly Off with Plans for Fighter Plane Hackers took advantage of network vulnerabilities of contractors involved in the development of the Pentagon’s $300 billion Joint Strike Fighter project to get their hands on project data. U.S. military officials said they traced the penetration […]

Obama Declares Cyber-Security a National Security Priority, Talks Strategy

U.S. President Barack Obama pledged a new era for the country’s cyber-security efforts today as White House officials pulled the covers off the 60-day review of the government’s cyber-security posture. The document, available here, calls for anchoring leadership for cyber-security efforts at the White House. To that end, Obama also announced the creation of the […]

Department of Interior Computers Missing, Report Finds

A report by the U.S. Department of Interior’s inspector general’s office does not paint a rosy picture of the department’s IT. On the heels of a separate report alleging widespread failures around the tracking and managing of passports, the inspector general found that the department cannot locate roughly 18 percent of a sample of 2,500 […]

Microsoft DirectX Vulnerability Under Attack

Microsoft is investigating reports of a vulnerability in Microsoft DirectX that is under attack by hackers using malicious QuickTime videos. According to a Microsoft advisory, the vulnerability can be exploited by hackers to remotely execute code with the rights of the logged-on user. Specifically, the vulnerability is in the QuickTime parser in Microsoft DirectShow, and […]