Malicious firmware designed into PC components may be next front in cyberwar
A DHS official confirmed to Congress the agency has examples of malware built as firmware into IT components built overseas, making them almost undetectable until actually triggered. read more
View ArticleSony finally hires new IT security chief
Sony announced today it has hired a new VP and chief security officer: Philip Reitman, whose impressive resume includes time as a prosecutor, bureaucrat, upper level manager of large organizations, but...
View Article'Leaked' FBI document calls Anonymous a national security threat
A document purportedly leaked form the FBI's criminal-profiling unit calls Anonymous not a collection of activists , but a unified criminal group focused on protest and social disruption.read more
View ArticleU.S. power grid is a big, soft target for cyberattack, MIT study shows
Mistaken reports that an Illinois water utility was hacked have reduced the angst about Stuxnet-like attacks on U.S. utilities, but the risk is actually worse than ever and increasing in scope every...
View ArticleCould hypocrisy at RIAA, DHS derail draconian rules against free downloads?
YouHaveDownloaded crawls BitTorrent sites, recording IP addresses of those downloading files and the files they're downloading. It turns out, if the record is correct, that two of the most energetic...
View ArticleGAO: DHS floods critical industries with irrelevant cybersecurity advice
When the president ordered DHS to provide cybersecurity guidance to seven industries that make up the critical infrastructure,' it responded, according to a GAO report, with a ton of data and advice...
View ArticleUse Twitter, get sent to Gitmo?
The FBI wants new ways to mine social media for threats. The DHS is deporting people for tweeting. Remember: What you say on Twitter and Facebook can be used against you. read more
View ArticleWhen you tweet, the CIA listens
Documents obtained by privacy advocates reveal that Uncle Sam is monitoring social networks for people critical of the government. Can an enemies list be far behind?read more
View ArticleDHS list of words you should never ever blog or Tweet. Ever.
The Electronic Privacy Information Center used the FOIA to get a copy of DHS' training manual, including the list of words you should never type online unless you want a visit from your future hosts at...
View ArticleBig data, big problems -- and, maybe, a solution
The era of big data is here. But better search tools can make it more useful for organizations and less risky for the rest of us.read more
View Article