internet security

See the following -

Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, VMware And The Linux Foundation Form New Initiative To Support Critical Open Source Projects

Press Release | The Linux Foundation, Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, VMware | April 24, 2014

The Linux Foundation today announced it has formed a new project to fund and support critical elements of the global information infrastructure. The Core Infrastructure Initiative enables technology companies to collaboratively identify and fund open source projects that are in need of assistance, while allowing the developers to continue their work under the community norms that have made open source so successful.

Read More »

Another Heartbleed-Style OpenSSL Vulnerability Discovered

Polly Mosendz | Nextgov.com | June 6, 2014

Just a few months after Heartbleed was discovered and (thankfully) resolved, another OpenSSL bug is haunting web encryptions. The new bug SSL/TLS MITM was posted by the OpenSSL group in a formal advisory on Thursday...

Read More »

Cyber Threats To Healthcare Systems, Medical Devices Rising

Greg Slabodkin | Health Data Management | April 23, 2014

Compared to other industries, healthcare is particularly vulnerable to cyber attacks with the threats to health information continuing to mount as the industry moves to adopt electronic health records. Earlier this month, the FBI's Cyber Division issued a notice warning that healthcare systems and medical devices are at risk for increased cyber intrusions for financial gain.

Read More »

How The NSA Undermines Cybersecurity

Brendan Sasso | Nextgov.com | April 30, 2014

...Officials have warned for years that a sophisticated cyberattack could cripple critical infrastructure or allow thieves to make off with the financial information of millions of Americans. President Obama pushed Congress to enact cybersecurity legislation, and when it didn’t, he issued his own executive order in 2013...

Read More »

Obama Lets NSA. Exploit Some Internet Flaws, Officials Say

David E. Sanger | The New York Times | April 12, 2014

Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.  But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.

Read More »

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security

Jeff Larson, Nicole Perlroth, Scott Shane | ProPublica, New York Times | September 5, 2013

Newly revealed documents show that the NSA has circumvented or cracked much of the encryption that automatically secures the emails, Web searches, Internet chats and phone calls of Americans and others around the world. The project, referred to internally by the codename Bullrun, also includes efforts to weaken the encryption standards adopted by software developers. Read More »

Should U.S. Hackers Fix Cybersecurity Holes Or Exploit Them?

Bruce Schneier | The Atlantic | May 19, 2014

Maybe someday we'll patch vulnerabilities faster than the enemy can use them in an attack, but we're not there yet.  There’s a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose and fix them...

Read More »

So...Is Paying Ransom What Bitcoin Is For?

The tech, law enforcement, and privacy worlds are abuzz with the recent decision by Apple to refuse to help the FBI crack the security on an iPhone, even though the iPhone in question belonged to an alleged terrorist/mass murderer.  As fascinating and important as that story is, I was even more interested in another cybersecurity story, about a hospital paying ransom to hackers in order to regain access to its own computer systems. This was not the first such occurrence, and it won't be the last.

The Future Beyond The Web Is Called FIA

Richard Byrne Reilly | Venture Beat | May 14, 2014

The virtual future beyond the Internet is known as FIA.  At least it is to the National Science Foundation, an independent federal agency in Washington, D.C...

Read More »

Thousands Of People Oblivious To Fact That Anyone On The Internet Can Access Their Computers

Kashmir Hill | Forbes.com | August 13, 2014

...While talking about the issue at hacker conference Defcon on Sunday, security engineer Paul McMillan sent his winged monkey scanners out looking for computers that have remote access software on them, but no password. In just that short hour, the results came pouring in: thousands of computers on port 5900 using a program called VNC for remote access...

Read More »