Parliament Sees UK as Cybersecurity Leader for EU

The House of Lords European Union Committee has released a report which examines the UK’s cyber capabilities and the efforts in the EU. The Committee determined that the UK is “reasonably well placed” to handle cyber issues. The report praised the UK efforts, saying that the UK is “thought to …

Read More »

Beward of Fake Email Facebook Warns

Social networking giant Facebook has issued a warning to users regarding a new scam that tricks users into downloading a Trojan onto their computers. The Trojan enables the cyber criminal to steal a user’s password for the social networking site. Once that occurs, the cyber criminal is able to use …

Read More »

UK School Children: NextGen Hackers?

One in four children of school age in the UK have admitted to attempting to hack into an email or Facebook account, according to a recent survey. The poll, which surveyed 1,000 students in London and 150 from Cumbria, found that almost 80 percent of students understood that hacking was …

Read More »

Vodaphone Spain Admits Shipping Thousands of Infected Smartphones

Earlier this week, The New New Internet reported that Vodaphone Spain has shipped two pre-infected smartphones to security researchers at Panda Security and S21Sec. After each incident, a Vodaphone Spain spokesman claimed that the incidents were isolated. Late yesterday, however, the company admitted to the Spanish press, that it shipped …

Read More »

FCC Chairman Julius Genachowski: “Consumers Need to Make the Internet Work.”

In an interview with Steve Grove, YouTube’s head of news and politics, FCC Chairman Julius Genachowski discussed his goals in implementing the FCC’s National Broadband Plan. Genachowski’s priorities include serving all Americans with broadband coverage while increasing private-sector competition and improving information available to consumers. “There is very little that …

Read More »

Featured Job- Cybersecurity Systems Engineer with QinetiQ

Job Description Responsibilities: Participate as a member of the Cyber Security Team with specific responsibilities in the system development life-cycle including, system architecture development, system development, system integration, interaction with technical partners, tailoring the offering for specific customer engagements, and life-cycle maintenance of installed system solutions. The candidate will be …

Read More »

Executive Profile: Adnan Ahmed of CNSI

Adnan Ahmed is co-founder and chief strategy officer of CNSI. He is responsible for generating new business opportunities for the company, with focus on identifying new strategic markets and leveraging relationships with customers and partners. Additionally, Ahmed oversees sales, marketing, government relations and business development across the company’s strategic business …

Read More »

Northrop’s Bernie McVey on the Need for Change in IT

According to ExecutiveBiz, Northrop Grumman’s Bernie McVey stressed the importance of breaking the status quo in IT. “Change is very difficult,” McVey said. “We’ve done business in the IT space for quite a long time a certain way so getting people aligned with this change, having leadership to drive it …

Read More »

Daily Government Contracting Recap – March 18, 2010

CACI’s Paul Cofoni discussed his company’s recent SPAWAR win. Lockheed Martin opened a second security intelligence center. MIT kept its system online during a cyber attack. A pair of Ponzi scam artist Bernie Madoff’s programmers have been indicted. The GAO upheld DynCorp’s protest of an Afghan police training contract award. …

Read More »

FCC’s Broadband Plan: 11 Provisions for Healthcare IT

On Tuesday, the FCC released its National Broadband Plan.  It notes that “the United States is not taking full advantage of the opportunities that health IT provides. It lags other developed countries in health IT adoption among primary health care providers,” and provides eleven recommendations to close the gap between …

Read More »

Vodafone Spain Provides Botnet Smartphone

Vodafone Spain has provided a pre-infected smartphone to a researcher at S21Sec, one week after a similar incident in which the company provided an infected smartphone to a researcher at Panda Security. The smartphones are infected with the Mariposa botnet client and other malware. Both of the smartphones were order …

Read More »

Madoff Programmers Indicted

Two computer programmers were indicted by the Federal Grand Jury on charges in fraud and conspiracy. Jerome O’Hara and George Perez knowingly  created the software programs used by Bernard Madoff to “cook the books” in the billion dollar bonzi scheme. The indictment claims  O’Hara and Perez knew their programs were …

Read More »