Posts Tagged security

TSA Procedures Need to Be Remade from Scratch

From RAND:

It is time for a new approach to meeting America’s next-generation aviation security needs, one that dodges the influence of politics and bureaucracies and relies instead on the resources and objectivity of independent researchers operating from a clean slate. This would enable the government to confront the need for cost-risk trades that agencies and Congress find so difficult to acknowledge and present to the public.

, , , ,

No Comments

Drone Video Unencrypted

From Danger Room:

Four years after discovering that militants were tapping into drone video feeds, the U.S. military still hasn’t secured the transmissions of more than half of its fleet of Predator and Reaper drones, Danger Room has learned. The majority of the aircraft still broadcast their classified video streams “in the clear” — without encryption. With a minimal amount of equipment and know-how, militants can see what America’s drones see.

, , , , , , , ,

No Comments

Massad Ayoob on Answering the Door

, ,

No Comments

Scam Alerts

FBI: Internet Scam Alerts

, ,

No Comments

FBI: Smartphone Malware Safety Tips

Internet Crime Complaint Center (IC3) | Smartphone Malware Safety Tips

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims.

New E-Scams & Warnings: Smartphone Users Should be Aware of Malware Targeting Mobile Devices and Safety Measures to Help Avoid Compromises

, , , , , ,

No Comments

US Drones Susceptible to Hacking

From Wired’s Threat Watch:

The Government Accountability Office is warning Congress that its push for drones to become commonplace in U.S. airspace fails to take into account concerns surrounding privacy, security and even GPS jamming and spoofing.

, , ,

No Comments

FBI Computer Scam Alert

IC3 Scam Alerts

, ,

No Comments

Computer Virus: Reveton Ransomware

Reveton Ransomware

A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week

, , , , , , , ,

No Comments

New Malware Goes After Financial Information

CNET reports on the new Gauss malware tool:

Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.

, , , , , , ,

No Comments

Oppose HR 3523, the Cyber Intelligence Sharing and Protection Act of 2011

From the Electronic Frontier Foundation:

Congress is considering legislation that would give companies a free pass to monitor and collect communications, including huge amounts of personal data like your text messages and emails, and share that data with the government and anyone else. All a company has to do is claim its privacy violations were for “cybersecurity purposes.” Tell Congress that they can’t use vaguely-defined “cybersecurity threats” as a shortcut to bypassing the law.

, , , , , , ,

No Comments

Smartphones Leak Encryption

Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

, , , , ,

No Comments

Web Links Could Compromise Your Smartphone

Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:

A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.

, , , , ,

No Comments

U.S. and U.K. Counter Terror Expos

U.S. – Washington, D.C. May 16-17, 2012

www.counterterrorUS.com

U.K. – Olympia, London April 25-26, 2012

www.counterterrorexpo.com

, , , ,

No Comments

Counterterrorism & Security Education and Research Foundation

CTSERF is a not-for-profit organization dedicated to understanding all facets of terrorism.

, , , , , , ,

No Comments

LAPD Bails on Google Apps Because of Security & Privacy Concerns

From: Cloudline

LAPDMicrosoft’s Office 365 isn’t the only cloud service losing high-profile customers to security and privacy concerns. Google got a dose of the same medicine on Wednesday, with the LA Timesreporting that the LAPD is now backing out of its contract with Google so it can stick with its on-premises Novell platform for e-mail.

The LAPD and the city attorney’s office ultimately decided, some two years after deciding to move their e-mail systems to the cloud in order to save costs, that no cloud computing solution is really compatible with the federal security guidelines that the departments are required to follow.

“It will be difficult for law enforcement to move to a cloud solution until the [security requirements] and cloud are more in line with each other,” LAPD’s CIO told the LA Times.

more

, , , , , , ,

No Comments