DARPA looks to Raytheon to help root out cyber security insider threats

DARPA looks to Raytheon to help root out cyber security insider threats
Military & Aerospace Electronics
Cyber security experts at the Information Security Solutions business of the Raytheon Co. Intelligence and Information Systems segment in Dulles, Va., will help US Department of Defense (DOD) researchers detect and deter insider threats to DOD computer ...
At a Hacker Conference, Plenty of Friendly Feds
New York Times (blog)
Government agencies especially need computer professionals with cybersecurity skills. At Defcon, these skills were in ample supply — and they can alternately thrill and scare. There were hackers and lockpickers here, problem solvers, troublemakers and ...
Cybercriminals Use 'Pottermore' Mania to Infect Harry Potter Fans
International Business Times
By James Lee Phillips | August 7, 2011 8:16 AM EDT As far as cybersecurity is concerned, it may be more dangerous right now to be a Harry Potter fan than to be a government official. That's because cybercriminals have been taking advantage of the huge ...
Chinese hackers spreading virus through HC replica websites?
Economic Times
Mukesh Saini, former naval officer who is a cyber security consultant, brought the nefarious designs of these alleged hackers to the notice of Cybercrime wing of the CBI recently, which is looking into it. In his report, Saini highlighted the modus ...
Gozo may get world-first - The new Internet of the future may be deployed there
Malta Independent Online
“Projects will involve several of the six proposals from Synaptic Laboratories Limited that were presented at and published in the proceedings of the United States Government Cyber SecuritySummit, August 2009. Other cutting edge research and ...
Sheriff: No sensitive info obtained by hackers
(WTVA/AP) -- Despite a hacking attempt by an group of criminals known worldwide for their ability to compromise cybersecurity, Prentiss County Sheriff Randy Tolar said no sensitive data was obtained from his department's system. ...
Government's former IT boss in MI6 grilling after taking job with Chinese ...
Daily Mail
John Suffolk, the Government's former head of IT, is to join Chinese mobile technology firm Huawei to head its global cyber-security operations. But in an unprecedented move, he is being forced to meet a Cabinet Office official to discuss the concerns ...
China Must Worry about an American Version of Shady RAT
Council on Foreign Relations (blog)
Cybersecurity is broken and has been broken for a while. Cloud computing and the explosion of mobile devices have greatly complicated the problem. Traditional firewalls and signature detection cannot cope with the highly personalized attacks that the ...
Gov't Gives Go-Green for Cyber Crime Unit
Arutz Sheva
The unit will also help increase awareness of cyber security in the private sector, government officials said. Establishment of the unit has come in the wake of recent major cyber attacks by hacker groups on governments, banks and businesses around the ...
AntiSec Attacks US Law Enforcement Agency Web Sites, Release 10GB Data
International Business Times
The top police agency had outsourced cyber security to ManTech Services last year in a $100-million deal. Hackers have attacked media organizations like PBS, computer giants like Sony and Apple, and defense majors like Lockheed Martin in recent times.
Week ahead: Back-to-school shots offered
The Tennessean
The public meeting is expected to draw 1500 for presentations, workshops and mock drills oncybersecurity matters. It's free and open to the public, and designed in particular for company CIOs, security teams and law enforcement personnel. ...
Sunday Breakfast Menu, Aug. 7
New York Times (blog)
Vice Admiral Mike McConnell, retired, the former director of national intelligence, discusses the violence in Syria, as well as cybersecurity in the wake of the reports of attacks originating in China. Bloomberg's “Political Capital” has Carmen M. ..
Elite crime agency steps up its fight to catch internet hackers
Herald Scotland
A bulletin from the Department of Homeland Security's National Cybersecurity and Communications Integration Centre stated many of the tactics and techniques being used were associated with less skilled hackers known as “Script Kiddies”. ...
Our View: Spy vs. Spy in cyberspace age
San Gabriel Valley Tribune
"The technology for, say, how to build a sophisticated jet engine is one thing," cybersecurity analyst Dave Clemente told Britain's The Guardian newspaper. "But there's a whole set of other processes -J the logistics, how to manage the supply chain to ...
Capital Gazette Communications
Annapolis Capital
The development of the STEM and Cyber Security programs are excellent examples of collaborative partnerships that benefit individuals and businesses throughout the region. What was not noted in the press was how in 2008 the Board of Trustees was ...
Law Firms Overlook Vulnerabilities to Cyberattacks, Panel Says
ABA Journal
The session, “Foreign Espionage Targets the Private Sector: The Cybersecurity Threat from Nation States," was sponsored by the ABA's Administrative Law Section, Section of International Law, Law Student Division and Government and Public Sector Lawyers ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud