Cybersecurity

  • Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

    January 21, 2014
  • Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

    January 21, 2014
  • Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.

    January 21, 2014
  • GSA made the first set of awards under the continuous diagnostics and mitigation (CDM) contract.

    January 17, 2014
  • The White House and the Information Sharing Environment released the Strategic Implementation Plan for the President's National Strategy for Information Sharing and Safeguarding. The plan details 16 initiatives that span federal, state, local and tribal governments as well as private sector and international partners. January 16, 2014

    January 16, 2014
  • Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues. January 13, 2014

    January 13, 2014
  • With so much gloom and doom about Cyber vulnerabilities, the Rand Corporation has some good news. In his book Cyberdeterrence and Cyber war, Martin Libicki puts it into perspective --suggesting Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. But the overall message is… cyber war is nothing so much as the manipulation of ambiguity.

    January 13, 2014
  • What's the best thing you can do for your computer? Make sure that it's secure. Kaspersky Lab says you should don't invite bugs and malware in by allowing your computer systems to become outdated. The security company urges you to install operating system and application updates as soon as they're available. It also suggests using your software's built-in systems, and don't ignore the prompts they give you to update your computer security.

    January 13, 2014
  • The Government Accountability Office in a recent report found the requirement for agencies to report data breaches to the Homeland Security Department within one hour of discovering the incident is of little value.

    January 09, 2014
  • The Syrian Electronic Army (SEA) said hacked into Skype's social media accounts last week. Now the Internet calling service confirms it had been hit with a "cyber-attack" but said no user information was compromised. SEA posted a tweet posted on Skype's official Twitter feed that read: "Don't use Microsoft emails (hotmail, outlook). They are monitoring your accounts and selling the data to the governments. More details soon. #SEA"

    January 06, 2014
  • Mandiant, the Virginia-based cyber-security firm than pinpointed a hacking unit in Shanghai that experts believe is part of the Chinese Army's cyber command has been sold. FireEye said that the purchase of privately held Mandiant would increase its ability to stop attacks in their early stages. The company valued the deal at nearly $1 billion.

    January 06, 2014
  • On this week's Capital Impact show, Liberty Group Ventures President Kiersten Todt will discuss how corporations and the general public are handling the rollout of the cybersecurity framework. January 2, 2014

    January 02, 2014
  • Companies planning to bring aboard some new staff should rethink their secret use of social networking Web sites, like Facebook, to screen new recruits. William Stoughton of North Carolina State University, lead author of a study published in Springer's Journal of Business and Psychology, indicated in his work this practice is viewed by some as a breach of privacy and could create a negative impression of the company for potential employees. This type of spying could even lead to law suits.

    December 26, 2013
  • Budget cuts notwithstanding, the U.S. Air Force plans to add 1,000 new personnel between 2014 and 2016 as part of its cyber security units. The 24th Air Force at Joint Base San Antonio-Lackland, Texas is home to the U.S. Air Force cyber command. With a budget of about $1 billion and a staff of roughly 400 military and civilian personnel, the command oversees about 6,000 cyber defense personnel throughout the Air Force.

    December 26, 2013