A 33 year-old Chinese man pleaded guilty in U.S. Federal Court to stealing proprietary source code used by the U.S. Federal Reserve to help track billions of dollars in government transfers that occur daily, according to a report by Reuters.
Browsing Category: Critical Infrastructure
The White House revealed today a set of initiatives it plans to use as part of its public-private partnership to combat increasingly disruptive networks of infected computers known as botnets.
UPDATE: Are the winds of cyber war blowing, or is the newly discovered Flame worm just a tempest in a teapot? Just days after it was disclosed to the public, the Flame worm is fanning the flames of controversy within the security world. Threatpost takes a look at what people are saying.
The Department of Homeland Security Is Offering Organizations That Use Industrial Control Systems advice or mitigating the effects of cyber attacks. Among the agency’s recommendations: hold on to data from infected systems and prevent enemies from moving within your organization.
The FBI said that there are still more than 330,000 computers believed to be infected with the DNSChanger malware, with just weeks to go before a court order to cut off their ability to communicate with the rest of the Internet. Fully 77,000 are located in the U.S., according to data provided to Threatpost.
Attackers using a feature that is common to many firewalls, switches and other networking gear could silently hijack Web sessions on mobile and desktop devices, according to a research paper presented by two Ph.D students from the University of Michigan.
There’s an old saying that all things end badly or else they wouldn’t end. It sounds nice, but it’s not necessarily true. Plenty of things simply end. The useful career of the Police, Man Vs. Food and highway A1A all ended without any catastrophic effects or gnashing of teeth. Now, with the end of Howard Schmidt’s career as White House cybersecurity coordinator nearing its end, much will be made of what he did or didn’t accomplish in his time in government service. That’s a fun parlor game to play, but the most important aspect of Schmidt’s time in Washington is the simple fact that he answered the bell when no one else would.
Defense giant Northrop Grumman is hiring software engineers to help it carry out “offensive cyberspace operations,” according to a recent job posting.
In a bulletin, the Department of Homeland Security (DHS) is warning healthcare organizations about the threat posed by insecure, network attached medical devices and the proliferation of smart phones, tablet PCs and other mobile devices in medical settings.
The first annual Index of Cyber Security finds that senior security officers are more concerned than at this time last year about the risk of cyber attack and other online risks, with concerns about ideologically-motivated hacktivists and the threats posed by business partners and other “counter parties” topping the list.