cyber security http://kplu.org en Wash. Courts seek IT security review, audit following breach http://kplu.org/post/wash-courts-seek-it-security-review-audit-following-breach <p></p><p><span style="line-height: 1.5;">Washington’s court system will hire an outside expert to perform a computer security review and audit in the wake of a hacking incident that targeted system’s public website.</span></p><p>The hacking, <a href="http://www.kplu.org/post/wash-state-courts-hacked-personal-data-accessed">the details of which were released last week</a>, exposed nearly a hundred social security numbers and perhaps up to a million driver’s license numbers. But now there’s another cyber security concern at Washington Courts, this time with the state’s Judicial Information System.</p><p> Wed, 15 May 2013 00:52:00 +0000 Austin Jenkins 8780 at http://kplu.org Wash. Courts seek IT security review, audit following breach U.S. attorney: A 'buggy whip moment' in fighting cyber crime http://kplu.org/post/us-attorney-buggy-whip-moment-fighting-cyber-crime <p><span style="line-height: 1.5;">United States Attorney for the Western District of Washington Jenny </span>Durkan<span style="line-height: 1.5;">&nbsp;</span><span style="line-height: 1.5;">faced tough questions from senators in Washington D.C. on Wednesday when she testified</span><span style="line-height: 1.5;">&nbsp;before the Senate Subcommittee on Crime and Terrorism.</span></p><p>Durkan, who was speaking as chair of the U.S. Justice Department Task Force on Cyber Crime, was asked why more isn't being done to stop thieves who use the Internet to steal everything from credit card numbers to trade secrets. Thu, 09 May 2013 00:48:54 +0000 Paula Wissel 8717 at http://kplu.org U.S. attorney: A 'buggy whip moment' in fighting cyber crime Could Iran wage a cyberwar on the United States? http://kplu.org/post/could-iran-wage-cyberwar-united-states Security professionals in both the U.S. government and in private industry have long feared the prospect of a cyberwar with China or Russia, two states capable of launching destructive attacks on the computer networks that control critical assets such as the power grid or the financial system.<p>Now they face a new cyberthreat: Iran.<p>"[The Iranians] have all the resources and the capabilities necessary to be a major player in terms of cyberwarfare," says Jeffrey Carr, an expert on cyberconflict who has consulted for the U.S. Thu, 26 Apr 2012 17:06:20 +0000 Tom Gjelten 4860 at http://kplu.org Could Iran wage a cyberwar on the United States? Countering the cyber espionage threat from China and Russia http://kplu.org/post/countering-cyber-espionage-threat-china-and-russia <p>It&#39;s official: China and Russia are the two biggest sources of cyber espionage attacks against the United States.</p><p><a href="http://www.ncix.gov/">The Office of the National Counterintelligence Executive</a> singled out those two nations in a recent <a href="http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf">report to Congress</a>&nbsp;(coincidentally, it&#39;s been difficult to reach the counterintelligence website since the report came out and those links may not work).</p><p> Tue, 29 Nov 2011 12:30:00 +0000 Dave Meyer & Mark Anderson 3282 at http://kplu.org Countering the cyber espionage threat from China and Russia Cyber attacks are escalating http://kplu.org/post/cyber-attacks-are-escalating <p>Remember when we used to call the Internet the &quot;information superhighway&quot;? Today, that highway is starting to resemble the route Mad Max traveled in <a href="http://en.wikipedia.org/wiki/Mad_Max_2">The Road Warrior</a>. You can&#39;t go out on it without inviting an attack. Hardly a week goes by without seeing news reports about another corporation being sabotaged by hackers ... <a href="http://www.pcworld.com/article/229997/sony_cyberattack_arrests_made_in_spain.html?tk=rel_news">Sony</a>, <a href="http://www.reuters.com/article/2010/02/24/us-intel-hackers-idUSTRE61M4PX20100224">Intel</a>, <a href="http://www.washingtonpost.com/business/china-rejects-google-allegation-of-massive-hacking-breach-as-fabrication/2011/06/02/AGMdsEHH_story.html">Google</a>, and<a href="http://www.informationweek.com/news/government/security/229700151"> Lockheed</a> are some of the more high profile victims.</p><p>For consumers, the biggest cyber threat is identity theft and stolen credit card numbers. But that&#39;s just the tip of the iceberg.&nbsp;This month on <strong><em>The Digital Future</em></strong>, <a href="http://stratnews.com/">Strategic News Service</a> publisher <a href="http://www.tapsns.com/aboutmark.php">Mark Anderson</a> looks at the huge increase in Advanced Persistent Threats: efforts by nation-states to steal information and technology.</p><p> Tue, 28 Jun 2011 12:30:00 +0000 Dave Meyer & Mark Anderson 1931 at http://kplu.org Cyber attacks are escalating