Hacker to Help DARPA

DARPA has tapped well-respected hacker Peiter Zatko, commonly known as Mudge, to be the program manager in the Strategic Technologies Office. He will be in charge of funding research that is meant to help the federal government defend against cyber attacks. He will enter into his new position in March. …

Read More »

Featured Job- Deputy Assistant Director for Technical CI and Cyber Threats with DNI

Duties Oversee, lead, and manage strategic planning and operation processes in support of the National Counterintelligence Plan, the National Counterintelligence Operating Plan, and Cyber Operations plans to ensure technical aspects of defensive and offensive measures are implemented effectively and in a timely manner. Represent the Associate Director for Cyber during …

Read More »

Update: Open Government Dashboard now live

It was just two months ago that Federal Chief Technology Officer Aneesh Chopra and Federal Chief Information Officer Vivek Kundra (above) both announced the Open Government Directive, the intent of which would be to drive transparency, collaboration (on the state and local level, among others), and cost-saving results. Now comes …

Read More »

Company Sues Bank Following Successful Phishing Attack

Experi-Metal Inc., a metal supply company, is suing Comerica Bank, claiming the bank opened its customers up to be victims of phishing attacks, according to krebsonsecurity.com. The lawsuit alleges the Comerica Bank routinely sent email messages to customers asking them to click a link to update security technology. The suit …

Read More »

CyberSecurity Malaysia Calls for More Cyber Experts

Despite the current manageable level of cyber crime, CyberSecurity Malaysia has highlighted the need for more trained cyber professionals to deal with the growing problem. CEO  retired Lt. Col. Husin Jazri said, “I do not want to claim we have a lack of experts or our experts are enough to …

Read More »

Botnets Battle for Domination

A new botnet, which came out in late December, is trying to kill off a rival botnet, according to security researchers. The new toolkit, known as SpyEye V1.0, is similar to the more prolific Zeus trojan, both of which can be used to form botnets by infecting computers. SpyEye also …

Read More »

China Looks to Increase Capacity for Cyber War

The Chinese Communist Party is devoting an unprecedented level of resources to growing China’s cyber-war capabilities, according to Asian Times. The issue of cyber war and cyberspace espionage is featured heavily in the drafts of the 12th Five-Year Plan, which is being drafted by the government and the People’s Liberation …

Read More »

Featured Job- Cyber Information Security Analyst with Booz Allen

Job Description Provide network operations subject matter expertise with an emphasis on Information Assurance and Computer Network Defense (IA-CND), Red Team and Blue Team Exercise Oversight, and enterprise-wide network exercise coordination. Provide analysis, advice, and guidance on policies, procedures, and techniques to support cyber exercises and CND activities supporting Headquarters …

Read More »

PwC Brings in Former FBI Agent to Head Forensic Technology Solutions Sector

PricewaterhouseCoopers LLP yesterday announced Edward Gibson, a former FBI agent and former chief security adviser for Microsoft LTD in the U.K., has joined as the director of the U.S. Forensics Technology Solutions practice. Gibson’s duties will include aiding organizations with issues surrounding money laundering, economic espionage, theft of intellectual property …

Read More »

Senator Jim Webb Speaks at POC Breakfast

The Potomac Officer’s Club held a breakfast on February 4th at the Ritz Carlton in Tyson’s Corner. Senator Jim Webb spoke in front of 175 executive members and guests of the organization in attendance. He addressed some key concerns for our nation today. Webb spoke on healthcare reform and civilian …

Read More »

Utility Companies to Invest Billions on Cybersecurity

Within the next five years, utility companies will likely invest $21 billion on cybersecurity to protect electrical grids, according to a new report by Pike Research. Much of the increased spending (investment will triple between 2010-2015) will be driven by configuration management and equipment protection. As the United Stats and …

Read More »

Highly Sensitive Info Available via P2P

Peer-to-peer networks can be useful to increase the rate and volume of information exchange. However, this also has its drawbacks as two security researchers demonstrated at the ShmooCon conference over the weekend. Larry Pesce and Mick Douglas took a look at the information individuals send via P2P applications and found …

Read More »

Spying on Your Smartphone

Last week, The New New Internet reported about the vulnerabilities in the iPhone to exploitation. The iPhone is not the only smartphone with vulnerabilities, as Tyler Shields, a senior security researcher at Veracode, demonstrated over the weekend. According to an article on Kaspersky Labs Threat Post, Shields demonstrated a spyware …

Read More »

Featured Job- Cyber Intel Analyst Sr with Lockheed Martin

Job Description A Bachelors degree in Computer Science or Information Systems with a concentration in Information Security. Several years experience in an information technology information security/assurance or several years of applied experience as an information system security officer. Familiarity with DCID 6/3, DCID 6/9. Familiar with typical Project Management Processes. …

Read More »