Critical Infrastructure Targeted by Malware

Organizations within the critical infrastructure, such as oil, energy and chemical industries, experienced a higher percentage of malware in 2009 than organizations in other sectors. According to web security firm ScanSafe, critical infrastructure companies experienced at least twice as much malware as other organizations. According to ScanSafe’s ‘Annual Global Threat …

Read More »

Lynn Calls for Cybersecurity Cooperation with Australia

The alliance between the United States and Australia has lasted from 1908 to the present day, against a variety of threats from the Kaiser to Bin Laden. During a roundtable with with Australian civic and business people, Deputy Defense Secretary William J. Lynn III called for that relationship to continue …

Read More »

Executive Spotlight: Paul Colangelo of Convergys

We recently had a chance to speak with Paul Colangelo of Convergys Government Solutions.  You might remember from our past interviews that Paul had established Convergys as a leader in federal customer care and customer service, and had established Convergys as a preferred contact center solutions provider with the the …

Read More »

Featured Job- Java Developer with Booz Allen

Job Description Key Role: Perform complex analysis, design, development, testing, and debugging of computer software in support of distinct product hardware, cyber projects, or technical service lines of businesses. Perform activities ranging from software design and operating architecture integration to the selection of computer systems. Build Web and J2EE applications …

Read More »

Genachowski Praises Google's Broadband Offering

Earlier this week, search engine giant Google announced plans to conduct a high-speed fiber trial in select locations. Google is asking cities and states to express interest in a fiber service capable of flowing at one gigabit per second. Richard Whitt, Google’s telecom and media counsel, said, “We’re excited to …

Read More »

Israel Beefs Up Cyber Capabilities

The use of cyberspace on the modern battlefield is essential for the 21st-century military. The United States, Britain and China all have developed cyber capabilities, which can be used for defense and attack. The Israeli Defense Forces have also disclosed their efforts to stand up a cyber capability. Maj. Gen. …

Read More »

Hunting Down the Aurora Creator

Earlier this year, search engine giant Google announced it had been subjected to cyber attacks back in December and more than 20 other companies experienced similar attacks. The attacks, termed Aurora, now appear to have hit even more companies than originally reported, according to DarkReading.com. However, researchers may be closing …

Read More »

Snowpocalypse ’10: Five Tips for Teleworking

While whiteout conditions, widespread power outages and snow-covered roadways might keep some executives home and incommunicado, the fearsome weather proved no match for a dedicated teleworker with a smart phone and a car charger. Stephen O’Keeffe, executive director of the Telework Exchange told Washington Technology “I was 100 percent on …

Read More »

Phishing for iPhone Victims

Scammers are employing a new phishing attack targeting iPhone users. The attacks impersonate Apple.com and attempt to gather sensitive information from unsuspecting iPhone users and could be used for a variety of scams. The emails generally highlight a ‘Free 1 Year Warranty Extension’ and route the user to a phishing …

Read More »

Featured Job- Advisor, Cyber Crime and Cyber Defense with DoD

Duties ADVISOR TO INTELLIGENCE AND FEDERAL INVESTIGATIVE COMPONENTS OF THE IRAQI SECURITY FORCES (ISF) TO DEVELOP AND IMPLEMENT A MINISTERIAL CYBER CRIME INVESTIGATIVE AND CYBER DEFENSE DETECTION, SURVEILLANCE, AND PREVENTION CAPABILITY.  ADVISING MAINLY OCCURS IN SUPPORT OF THE MINISTRY OF INTERIOR’S (MOI) NATIONAL INFORMATION AND INVESTIGATION AGENCY.  AIDS IN THE …

Read More »

State, Local Funds Dropped from DOE Budget

As with most budgets, good and bad news can be found within the president’s recent fiscal request for the Department of Energy. Overall, the $28.4 billion Fiscal Year 2011 budget request represents a continuing commitment to energy efficiency and the core goals of the Obama Administration as laid out during …

Read More »

EPIC Submits Statement to Congress on Google-NSA Relationship

The Electronic Privacy Information Center has issued a statement to the House Foreign Affairs Committee regarding the recent revelations surrounding the Google-NSA relationship. The statement asked the committee to conduct an investigation into the relationship between Google and NSA, urged the committee to support the ratification of the Council of …

Read More »

NIST Issues Second Draft of Smart-Grid Cybersecurity Plan

The National Institute of Standards and Technology has issued its second draft of its strategy, Smart Grid Cyber Security Strategy and Requirements, for public review. The implementation of smart-grid technology opens up a variety of new vulnerabilities with the power grid. Foreign nations and terrorists would be capable of using …

Read More »

Hacktivists Strike Australian Government Websites

In protest of proposed censorship regulations by the Australian government, hacktivists launched a distributed denial of service attack against Australian government websites. Operation Titstorm, launched Wednesday, disrupted access to the sites of the Australian parliament and government, www.australia.gov.au and www.aph.gov.au. The attacks included pornographic images, which were slated to be …

Read More »

New Banking Trojan Found

Security researchers with SecureWorks have discovered a new banking Trojan, which is used by cyber criminals to siphon off millions of dollars. The so-called Bugat Trojan looks to exploit wire transfer and Automated Clearing House transactions, which are used by smaller businesses. The Trojan uses malware commonly used in other …

Read More »