Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $23,056
28%  
Woo hoo!! And we're now over 28%!! Thank you all very much!! God bless.

Keyword: cybersecurity

Brevity: Headers | « Text »
  • Hope Hicks told House Intelligence Committee she was hacked, sources say

    03/07/2018 7:21:51 PM PST · by Magnatron · 31 replies
    NBC News ^ | 7 March 2018 | Jonathan Allen, Mike Memoli and Ken Dilanian
    A day before she resigned as White House communications director, Hope Hicks told the House Intelligence Committee last week that one of her email accounts was hacked, according to people who were present for her testimony in the panel's Russia probe. Under relatively routine questioning from Rep. Jim Himes, D-Conn., about her correspondence, Hicks indicated that she could no longer access two accounts: one she used as a member of President Donald Trump's campaign team and the other a personal account, according to four people who spoke on the condition of anonymity because the closed meeting of the Intelligence Committee...
  • Frank Abagnale: "Catch Me If You Can" | Talks at Google

    03/01/2018 3:56:51 PM PST · by dontreadthis · 15 replies
    For Google's Security and Privacy Month, we are honored to present the real Frank Abagnale, Renowned Cybersecurity And Fraud Prevention Expert, Bestselling Author ...
  • Sessions forms U.S. cyber task force after election warnings

    02/21/2018 6:50:39 AM PST · by saywhatagain · 26 replies
    Reuters ^ | February 21,2018 | Dustin Volz
    U.S. Attorney General Jeff Sessions on Tuesday announced he would create a task force to examine how his Justice Department can better combat global cyber threats, including efforts to interfere with elections or damage critical infrastructure.
  • US government 'hacked global bank system'

    04/14/2017 9:57:49 PM PDT · by Fedora · 9 replies
    BBC ^ | 04/15/2017 | Dave Lee
    A huge range of security exploits, said to be worth over $2m if sold on the black market, have been leaked online.The tools are said to have been created by the US National Security Agency (NSA), and accompanying documents appear to indicate a possible breach of the Swift global banking system.Such a hack could have enabled the US to covertly monitor financial transactions, researchers said.The files were released by Shadow Brokers, a hacking group that has previously leaked malware.If genuine, it represents perhaps the most significant exposure of NSA files since the Edward Snowden leaks in 2013.On Twitter, Mr Snowden...
  • Hackers Hit Dozens of Countries With a Stolen N.S.A. Tool

    05/12/2017 1:00:35 PM PDT · by Oldeconomybuyer · 29 replies
    New York Times ^ | May 12, 2017 | By DAN BILEFSKY and NICOLE PERLROTH
    Hackers using a tool stolen from the United States government conducted extensive cyberattacks on Friday that hit dozens of countries around the world, severely disrupting Britain’s public health system and wreaking havoc on computers elsewhere, including Russia. The tool was leaked by a group calling itself the Shadow Brokers, which has been dumping stolen N.S.A. hacking tools online since last year. Microsoft rolled out a patch for the vulnerability in March, but hackers apparently took advantage of the fact that vulnerable targets — particularly hospitals — had yet to update their systems. The malware was circulated by email. Targets were...
  • American Spies Paid $100,000 to Russian Who Wanted to Sell Material on Trump

    02/09/2018 4:20:17 PM PST · by springwater13 · 108 replies
    After months of secret negotiations, a shadowy Russian bilked American spies out of $100,000 last year, promising to deliver stolen National Security Agency cyberweapons in a deal that he insisted would also include compromising material on President Trump, according to American and European intelligence officials. The cash, delivered in a suitcase to a Berlin hotel room in September, was intended as the first installment of a $1 million payout, according to American officials, the Russian and communications reviewed by The New York Times. The theft of the secret hacking tools had been devastating to the N.S.A., and the agency was...
  • REPRISE: Video - Hillary planned secret email 15 years ago (in her own words, the motivation)

    02/05/2018 1:56:06 PM PST · by doug from upland · 9 replies
    dfu via youtube ^ | orig 2015 | DFU
    HILLARY CLIP In case some of you had missed this, here it is again. This clip was provided to Trey Gowdy's committee investigators over 2 1/2 years ago, they acknowledged receipt, and we discussed it on the phone. The clip is from a 2000 fundraiser at Wolfgang Puck's Spago in Beverly Hills. Hilly is sitting between Peter Paul and Spiderman Stan Lee and the discussion turns to email. It is difficult to understand it completely, but Hillary is saying that, because of investigations, why would I want to use email......can you imagine? Fast forward to when she started at State....
  • Cables Portray Expanded Reach of Drug Agency [Blabber mouths......]

    12/25/2010 6:58:55 PM PST · by Sub-Driver · 19 replies · 1+ views
    Cables Portray Expanded Reach of Drug Agency By GINGER THOMPSON and SCOTT SHANE WASHINGTON — The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables. In far greater detail than previously seen, the cables, from the cache obtained by WikiLeaks and made available to some news organizations, offer glimpses of drug agents balancing diplomacy and law enforcement in places where it can be...
  • The Spectre Bug aka Spectre Attack – What You Need To Know

    01/04/2018 10:41:43 AM PST · by Gennie · 25 replies
    Stronghold Cyber Security ^ | 01/04/18 | Jason McNew
    Like the Meltdown bug, the Spectre bug is a hardware bug in the form of a CPU design flaw. Unlike the Meltdown bug which only affects Intel processors, the Spectre bug impacts Intel, AMD, and some ARM (used in many smart phones and other mobile devices) processors. These three are by far the most common CPUs on the planet, running literally billions of devices. In a Spectre attack, the CPU is tricked into executing instructions that it normally would not, causing leaks in the victims memory address space.
  • Trump first president to protect electric grid from EMP, cyberattacks

    12/21/2017 8:37:37 PM PST · by PA Engineer · 43 replies
    Washington Examiner ^ | Dec 20, 2017 | Paul Bedard
    President Trump became the first national leader to call for protecting the U.S electric and communications grid against an electromagnetic attack like one practiced in North Korea. Deep in his new national security strategy released this week, he made good on a campaign promise to move quickly to make the fixes that proponents have long called for. Two of the chief advocates, William R. Graham and Peter Vincent Pry, executives of the nation’s first Congressional EMP Commission, said in a statement, “President Trump understands, even if everyone in his administration does not, that ‘strategic stability’ and ‘longstanding strategic relationships with...
  • Hack of U.S. securities regulator rattles investors, stirs doubts

    09/21/2017 10:48:31 AM PDT · by Oldeconomybuyer · 6 replies
    Reuters ^ | September 21, 2017 | by Sarah N. Lynch, Jonathan Spicer
    Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the Securities and Exchange Commission struck at the heart of the U.S. financial system. The SEC’s EDGAR filing system is the central repository for market-moving information on corporate America with millions of filings ranging from quarterly earnings to statements on acquisitions. Accessing documents before they are released publicly would offer hackers a lucrative opportunity to trade on that information. The SEC has said it was...
  • Report: Congressman Wexler to resign

    10/13/2009 3:48:23 PM PDT · by Fawn · 288 replies · 16,739+ views
    Reported by: Sun-Sentinel ^ | Oct 13, 2009 | Reported by: Sun-Sentinel
    PALM BEACH COUNTY, FL---Our news partners at the Sun Sentinel report: U.S. Rep. Robert Wexler, who represents Broward and Palm Beach counties, plans to resign from Congress. He plans to announce his plans at a news conference Wednesday at 10 a.m. in Boca Raton. A Democratic source with knowledge of Wexler's plans said he is likely to take a public policy job that deals with the Middle East. Wexler, a senior member of the House Foreign Relations Committee, has long been involved in issues involving Israel and Turkey.
  • CIA director announces sweeping reorganization of spy agency

    03/06/2015 9:15:08 PM PST · by Olog-hai · 42 replies
    Associated Press ^ | Mar 6, 2015 11:11 PM EST | Ken Dilanian
    Director John Brennan has ordered a sweeping reorganization of the CIA, an overhaul designed to make its leaders more accountable and close espionage gaps amid widespread concerns about the spy agency’s limited insights into a series of major global developments. Brennan announced the restructuring to the CIA workforce on Friday, including a new directorate devoted to boosting the CIA’s computer hacking skills. He said the move comes after nine agency officers spent three months analyzing its management structure, including what deputy CIA director David Cohen called “pain points,” organizational areas where the CIA’s bureaucracy does not work efficiently. […] The...
  • Ex-NSA Worker Pleads Guilty

    12/02/2017 9:04:54 PM PST · by Rabin · 18 replies
    Brui Direct ^ | December 3rd, 2017 | courtesy of ENGADGET by Jon Fingas
    The admission revealed the identity behind a big data breach. Nghia Hoang Pho, 67. Nghia, Carted home, “Top Secret” and “Sensitive Compartmented”, Information for over five years. These files were downloaded onto Pho’s personal computer and then routinely harvested by Russian intelligence. Pho took a mix of digital and physical info home between 2010 and 2015. he was using it to rewrite his resume -- this was intentional, but not spiteful. Pho may face prison time when he's sentenced on April 6th, but prosecutors “are open to calls for a lighter sentence” given the non-malicious nature of the case. It...
  • Congress Questioning Kaspersky Breach

    10/28/2017 4:52:29 AM PDT · by smileyface · 4 replies
    One America News Network ^ | Oct 27, 2017 | Emerald Robinson
    Lawmakers expressed bipartisan interest in expanding the role of the National Institute of Technology and Standards according to H.R. 1224 concerning how contracted companies work with federal agencies and departments. Members of the House Subcommittee on Science Oversight met Thursday to discuss a recent revelation of a 2015 security breach involving an NSA contractor and a Russian spyware product. Julio Rivera who is a cybersecruity expert and Editor of Reactionary Times says that the breach that occurred in 2015 was first discovered by Israeli intelligence who then alerted the U.S. However, officials did not ban the software at the time...
  • FBI says Russian spies got close to Cabinet [Hillary Clinton]

    11/01/2011 12:33:20 AM PDT · by iowamark · 63 replies
    Washington Times ^ | 10/31/2011 | Bill Gertz
    The FBI rounded up a network of deep-cover Russian spies last year after the group came close to placing an agent near a Cabinet official in the Obama administration, a senior FBI counterspy said Monday as the bureau released once-secret documents on the case. ...U.S. officials said it was Secretary of State Hillary Rodham Clinton. Mr. Figliuzzi said in an interview that the FBI decided to end its more than 10-year-long counterspy investigation of the network because of concerns that the spies were “getting very close to their objective.” “These 10 Russian officers were sent to the U.S. on a...
  • Imran Awan case: Lawmaker calls 'massive' data transfers from Wasserman Schultz aide..

    10/10/2017 8:55:13 PM PDT · by bitt · 25 replies
    fox news ^ | Oct 10, 2017 | FoxNews
    A Republican lawmaker on Tuesday described the “massive” data transfers on government servers by a former IT aide to Democratic Florida Rep. Debbie Wasserman Schultz as “a substantial security threat.” “These facts, standing alone, indicate a substantial security threat,” Pennsylvania Republican Rep. Scott Perry said of the Imran Awan case during an informal hearing of Republican House members on Capitol Hill on Tuesday. Awan pleaded not guilty in September to multiple federal charges including bank fraud and conspiracy. A grand jury had returned an indictment in August in the U.S. District Court for the District of Columbia charging Imran Awan...
  • Hillary Clinton talks cyber security at Stanford

    10/07/2017 4:00:24 PM PDT · by DFG · 54 replies
    abc7news ^ | 10/06/2017
    Former Secretary of State Hillary Clinton ended a day in Bay Area at Stanford University. She addressed a crowd of about 500 people as part of a launch event for Stanford's new Global Digital Policy Incubator. On the topic of digital technology, Clinton focused her remarks on Russia's interference in the 2016 election. She called the hacking of a U.S. election by a foreign adversary "the darker side of technology."
  • Isis 'hacking division' releases details of 1,400 Americans and urges attacks

    08/13/2015 7:13:42 AM PDT · by CorporateStepsister · 34 replies
    The Guardian ^ | Aug. 12, 2015 | Michael Safi
    A group calling itself the Islamic State hacking division has published the details of 1,400 mostly US military and government personnel, urging supporters to attack those listed. The spreadsheet, published online on Wednesday, exposes names, email addresses, phone numbers and passwords. Those listed include members of the marine corps, Nasa, the state department, air force and FBI. Supporters of Isis on Twitter seized on the breach, posting personal details of soldiers and government staffers and encouraging lone wolves to “act and kill”. A person claiming to speak for the group told the Guardian the information was obtained from military and...
  • EXCLUSIVE: Tech company which maintained Hillary's secret server was sued for 'illegally accessing'

    08/14/2015 1:04:48 AM PDT · by Cincinatus' Wife · 35 replies
    The Daily Mail ^ | August 13, 2015 | Daniel Bates
    EXCLUSIVE: Tech company which maintained Hillary's secret server was sued for 'illegally accessing' database and 'stealing White House military advisers' phone numbers' The Internet company used by Hillary Clinton to maintain her private server was sued for stealing dozens of phone lines including some which were used by the White House. Platte River Networks is said to have illegally accessed the master database for all US phone numbers. It also seized 390 lines in a move that created chaos across the US government. Among the phone numbers which the company took - which all suddenly stopped working - were lines...