Tagged: cybersecurity

Catching Credit Thieves: A Global Approach

The U.S. Department of Justice published a new report, “Examining the Structure, Organization, and Processes of the International Market for Stolen Data”, by Thomas Holt and Olga Smirnova.  This report found that Russia provides a “home base” for hackers and that many hackers and data thieves are operating primarily in...

25 Years of the World Wide Web: Current Overview and Predictions for the Future

Today marks the 25th anniversary of the creation of the World Wide Web (the Web) by British computer scientist, Sir Tim Berners-Lee. On March 12, 1989, Berners-Lee wrote a proposal for an “information management” system that could be accessed and utilized by all, a concept that would eventually become the...

Power Grid Needs a Cybersecurity Boost: Bipartisan Policy Center Report Finds Weaknesses in U.S. Critical Infrastructure Protection

In February, the Co-chairs of the Bipartisan Policy Center’s Electric Grid Cybersecurity Initiative, together with the National Homeland Security Project, published a report of findings on the security status of the nation’s electricity infrastructure. Protecting this power grid from cyber attacks is critical to national security in an environment where...

NISTs New ‘Framework’ for Cybersecurity

Cybersecurity is an important subject, especially when it comes to the U.S. government. We are becoming a more “connected” society, and with a constant connection there are constant risks. The threats on our critical infrastructure places the Nation’s, “security, economy, public safety and health at risk.” On February 12, 2014,...

Federal Government’s Track Record on Cybersecurity and Critical Infrastructure

The Senate Committee on Homeland Security and Governmental Affairs released today a new report that outlines the recent failures of the federal government to prevent cyberattacks on the nation’s critical infrastructure. The report, “The Federal Government’s Track Record on Cybersecurity and Critical Infrastructure”, looks into the cyber vulnerabilities of six...

Declassified ODNI Report Explores the Link between National Security and the Virtual World

Following a 2009 request from the Federation of American Scientists (FAS), the Office of the Director of National Intelligence (ODNI) has declassified and released a report resulting from a July 2008 ODNI SHARP (Summer Hard Problem) program on “virtual worlds and their implications.” The formerly Confidential-level report, “3D Cyberspace Spillover:...

Ring in the New Year With Emergency Preparedness

  As 2014 approaches, various communities have released emergency preparedness calendars to plan for and prevent potential emergency events that may happen during the next year. These advanced preparedness calendars include ways that families can prepare for disasters; they include ways to prepare for evacuations that might include pets; and...

Digital Map Shows Real-Time Cyber Attacks

A Distributed Denial of Service (DDoS) attack is considered an attempt to make an online service unavailable by jamming or overwhelming it with traffic. These attacks may target a wide variety of frequently-used or critical resources, such as bank servers, news media outlets, or government websites. The new “Digital Attack...

Ten Years of Cyber Safety: October is Cyber Security Awareness Month

This year marks the 10th anniversary of National Cyber Security Awareness Month. The program’s goal is to bring awareness about safety while exploring the vast and sometimes risky internet. Cyber safety is a constantly changing issue, and with the introduction of internet-friendly mobile phones, tablets, and even gaming systems, risks...

Economic Impact of Cybercrime and Cyber Espionage

The Center for Strategic and International Studies and McAfee, Inc. have published a report on the Economic Impact of Cybercrime and Cyber Espionage. From the report: “Is cybercrime, cyber espionage, and other malicious cyber activities what some call ‘the greatest transfer of wealth in human history,’ or is it what...