Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $25,957
32%  
Woo hoo!! And we're now over 32%!! Thank you all very much!! God bless.

Keyword: cybersecurity

Brevity: Headers | « Text »
  • 'Syrian Electronic Army' Hacks Marines Website

    09/03/2013 11:17:21 AM PDT · by lbryce · 12 replies
    New York Post ^ | September 3, 2013 | Staff
    Pro-Assad computer hackers today broke into the Marine Corps recruiting website, redirecting visitors to a screed that called President Barack Obama "a traitor who wants to put your lives in danger to rescue al- Qaida insurgents." A Marine Corps spokesman confirmed that the site, marines.com, was tampered with and redirected temporarily, but no information was put at risk.
  • Beware This Vulnerability in Cyber Pickpocketing

    08/14/2013 7:16:12 AM PDT · by William Tell 2 · 7 replies
    MainStreet.com ^ | 8-14-13 | Michael P. Tremoglie
    NEW YORK (MainStreet)—It used to be the stuff of science fiction and Dick Tracy comic strips. But fiction became fact and Mobile Personal Communication Devices (MPCDs) are commonplace. Now they are used for more than mere conversation. Mobile financial transactions are routine. They are even beginning to replace wallets. But as wallets go high tech, so do criminals. The advent of mobile wallets is creating ... http://www.mainstreet.com/article/smart-spending/technology/beware-vulnerability-cyber-pickpocketing
  • Hacker Forces Colin Powell To Deny Affair

    08/01/2013 9:24:15 AM PDT · by keat · 60 replies
    The Smoking Gun ^ | August 1, 2013
    AUGUST 1--As a notorious hacker seeks to distribute “very personal” e-mails sent to Colin Powell by a female Romanian diplomat, the retired general is denying that he engaged in an extramarital affair with the woman while he served as Secretary of State, though he recently advised her to delete all their online exchanges, The Smoking Gun has learned. In a statement addressing his relationship with Corina Cretu, a member of the European Parliament who previously held a series of senior posts in the Romanian government, Powell, 76, wrote that he has known Cretu for about 10 years, having first met...
  • Michael Hastings’ Chilling Final Story

    06/19/2013 9:07:56 PM PDT · by Olog-hai · 30 replies
    PJ Tatler ^ | June 19, 2013 - 9:46 am | Bryan Preston
    Journalist Michael Hastings was killed early Tuesday morning in a bizarre car incident in Los Angeles. Hastings, 33, was best known for writing the Rolling Stone story that ended in Gen. Stanley McChrystal’s resignation as head of U.S. forces in Afghanistan. Hastings’ final story, “Why Democrats Love to Spy on Americans,” was a searing take on the NSA snooping scandal, which Hastings described as “North Korea-esque.” Hastings pulled no punches as he linked the NSA scandal to the Department of Justice’s spying on reporters and the IRS abuse scandal. Hastings built a case that the same Democrats who turned Bush-era...
  • CBS REPORTER SHARYL ATTKISSON: I THINK I KNOW WHO HACKED MY COMPUTER

    06/18/2013 7:43:50 AM PDT · by SaveOurRepublicFromTyranny · 29 replies
    TPNN - TEA PARTY NEWS NETWORK ^ | June 18, 2013 | Matthew Burke
    CBS News reporter, Sharyl Attkisson, one of the very few real reporters left in the mainstream media, appeared on Monday’s O’Reilly Factor, telling Bill O’Reilly that she thinks she knew who hacked her computer (scroll down for video). In the interview, Attkisson begins by explaining that both her personal computer, as well as her CBS work computer would mysteriously turn on in the middle of the night, even though she’d shut them down...
  • The Real Story: A Major Breach of National Security on Obama's Watch

    06/12/2013 12:51:42 PM PDT · by Kaslin · 44 replies
    Townhall.com ^ | June 12, 2013 | Donald Lambro
    WASHINGTON - Several key elements in the bombshell story about the government's secret surveillance programs have been either underreported or left out of the narrative altogether. The first is the degree to which all three branches of the government -- executive, legislative and judicial -- oversee these programs. The second is how did a little-known, low-level, 29-year-old, high school drop out with no academic or work credentials to speak of gain access to America's most critical national security secrets. The first element, often completely missing from network nightly news stories, is that surveillance programs such as these are being closely...
  • How to protect your PC from PRISM surveillance

    06/11/2013 11:48:04 AM PDT · by Nachum · 58 replies
    PC World ^ | June 7, 2013 | Mark Hachman, PC World
    PC World - Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and other electronic communications used by Americans for the last several years, via a program known as PRISM. [ALSO: Prism leaker steps forward] According to the reports, the Web's largest names--AOL, Apple, Facebook,A Google, Microsoft, Skype, PalTalk, Yahoo, and YouTube--participated, perhaps unwittingly. (Dropbox will reportedly be added as well.) The report claims that the National Security Agency had "direct access" to servers owned by those companies. Most, if not all, of those companies have denied participating...
  • What If China Hacks the NSA's Massive Data Trove?

    06/09/2013 8:03:45 PM PDT · by SeekAndFind · 31 replies
    The Atlantic ^ | 06/09/2013 | CONOR FRIEDERSDORF
    Bradley Manning proved that massive amounts of the government's most secret data was vulnerable to being dumped on the open Internet. A single individual achieved that unprecedented leak. According to the Washington Post, "An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances." And this week, we learned that the FBI, CIA and NSA were unable to protect some of their most closely held secrets from Glenn Greenwald, Richard Engel, Robert Windrem, Barton Gellman, and Laura Poitras. Those journalists, talented as they are, possess somewhat fewer resources than foreign governments! So...
  • Obama orders US to draw up overseas target list for cyber-attacks

    06/07/2013 5:02:11 PM PDT · by Calamari · 25 replies
    The Guardian ^ | Friday 7 June 2013 15.06 EDT | Glenn Greenwald and Ewen MacAskill
    Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging". It says the government will "identify potential targets of...
  • Remember All Those Passwords? No Need

    06/06/2013 12:51:37 PM PDT · by nickcarraway · 35 replies
    New York Times ^ | June 5, 2013 | David Pogue
    “If you want to avoid having your identity stolen, use long passwords that contain digits, punctuation and no recognizable words. Make up a different password for every Web site. And change all of your passwords every 30 days.” Have these security pundits ever listened to themselves? That advice is clearly unfollowable. I currently have account names and passwords for 87 Web sites (banks, airlines, blogs, shopping, e-mail, Facebook, Twitter). How is anyone — even a security professional — supposed to memorize 87 long, complex password strings, let alone remember which goes with which Web site? So most people use the...
  • Microsoft Security Essentials detected virus on FR

    05/29/2013 8:25:46 PM PDT · by The Cajun · 109 replies
    Me
    Microsoft Security Essentials just detected about 6 attemps at *Trojan: Win32/Jpgiframe.A* trying to install on *latest post* page.
  • Chinese Hackers Have Stolen Plans For Pretty Much The Entire US Military

    05/28/2013 10:23:57 AM PDT · by blam · 61 replies
    Business Insider ^ | 5-28-2013 | Geoffrey Ingersoll
    Chinese Hackers Have Stolen Plans For Pretty Much The Entire US Military Geoffrey Ingersoll May 28, 2013, 11:11 AM Hackers have accessed designs for more than two dozen major U.S. weapons systems, according to a devastating classified report from a Pentagon advisor shared with the Washington Post. Although the report from the Defense Science Board did not identify the hackers, senior military and industry officials with knowledge of the breaches say they come primarily from China, according to Ellen Nakashima of the Post. A public version of the report released in January warned of an "existential cyber attack" with "potentially...
  • PENTAGON: Chinese Hackers Have Stolen Data From 'Almost Every Major US Defense Contractor'

    05/07/2013 6:11:55 PM PDT · by lbryce · 41 replies
    Business Insider ^ | May 7, 2013 | Michael kelley
    For the first time the Obama administration has explicitly accused China’s military of hacking into computer systems of the U.S. government and its defense contractors. "The accusations relayed in the Pentagon’s annual report to Congress on Chinese military capabilities were remarkable in their directness," writes David Sanger of The New York Times.
  • AP says its Twitter account hacked (led to Market flash crash)

    04/23/2013 10:24:16 AM PDT · by RummyChick · 61 replies
    market watch ^ | 4/23 | market watch
    Associated Press says its Twitter account has been hacked, as the Twitter feed falsely said that there had been two explosions at the White House.
  • CISPA passes U.S. House: Death of the Fourth Amendment? (Cybersecurity)

    04/18/2013 12:34:57 PM PDT · by illiac · 19 replies
    ZD Net ^ | 4/18/13 | Zack Whittacker
    The controversial Cyber Intelligence Sharing and Protection Act (CISPA) just passed the U.S. House, and will now head to the upper Senate chamber for further deliberation. Rinse and repeat. This isn't the first time this has happened, but it still poses a major threat to Fourth Amendment rights, according to civil liberties campaigners. The bill was passed 288-127 in favor of the bill after two days of debate and discussion on the House floor. Only 18 members of the House abstained from the vote. CISPA will allow private sector firms to search personal and sensitive user data of ordinary U.S....
  • What is CISPA, and what does it mean for you? FAQ

    04/14/2013 8:40:40 PM PDT · by LibWhacker · 8 replies
    ZDNet ^ | 4/13/13 | Zack Whittaker
    Summary: Dubbed as one of the most privacy infringing pieces of legislation ever to have hit the Capitol, what exactly is CISPA, and how does it affect you?Described as "misguided" and "fatally flawed" by the two largest U.S. privacy groups, the Cyber Intelligence Sharing and Protection Act (CISPA) threatens the online privacy of ordinary U.S. residents more so than any other bill since Congress amended the Foreign Intelligence Surveillance Act in 2008. A lot of confusion still surrounds what CISPA can do, who it affects, and what it will practically achieve. Here's what you need to know. What is CISPA?CISPA,...
  • NSA data center front and center in debate over liberty, security and privacy

    04/14/2013 10:38:45 AM PDT · by null and void · 28 replies
    FoxNews.com
 ^ | April 12, 2013 | Catherine Herridge
    The Utah Data Center is a facility for the intelligence community that will have a major focus on cyber security. Asked if the Data Center would hold the data of American citizens,  Alexander said, "No...we don't hold data on U.S. citizens," adding that the NSA staff "take protecting your civil liberties and privacy as the most important thing that they do, " Thomas Drake who worked at the NSA says Americans should be concerned about letting the government go too far in the name of security. The only way you can have perfect security is have a perfect surveillance state....
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... What’s Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • Young Hacktivists Worse Than DOJ Drone Killers?

    Pause and reflect on this hypocrisy: The Department of Justice prosecutes young hackers who use computers to promote free speech while highly educated adults within the DOJ threaten to use lethal drone force against American citizens without due process. Which is worse? Certainly, I do not condone hacking. However, you and I need to start talking about the best way to handle cyber-attacks while also recognizing that the same government officials we trust to protect us are assaulting our constitutional freedoms. Last month, cyber security firm Mandiant released an explosive, 76-page report indicating that the Chinese government is most likely...
  • DHS to Scan Emails and Increase Monitoring of Web Traffic

    03/21/2013 4:54:32 PM PDT · by EXCH54FE · 16 replies
    Town Hall ^ | Mar. 21, 2013 | Heather Ginsberg
    The U.S. Government has decided to expand a program that scans Internet traffic in and out of defense contractors to include more private, civilian-run operations. Now more private sector employees will have their emails and Internet activities scanned. Those affected include big banks, utilities and transportation companies. Under last month's White House executive order on cybersecurity, the scans will be driven by classified information provided by U.S. intelligence agencies — including data from the National Security Agency (NSA) — on new or especially serious espionage threats and other hacking attempts. U.S. spy chiefs said on March 12 that cyber attacks...