Skip to main content

Home/ Hass and Associates Cyber Security Group/ Group items tagged government

Rss Feed Group items tagged

genuisman

Hass & Associates Online Reviews on the Evolution of Hacking - 1 views

Computer hacking was once the realm of curious teenagers. It's now the arena of government spies, professional thieves and soldiers of fortune. Today, it's all about the money. That's why Chinese ...

Hass & Associates Online Reviews The Evolution of Hacking

started by genuisman on 25 Mar 15 no follow-up yet
Nicole Garcia

Hass and Associates Cyber Security: House passes cybersecurity bill as privacy concerns... - 1 views

  •  
    The House of Representatives go for the second round of Cyber Intelligence Sharing and Protection Act as it passed legislation on Thursday. The newly granted powers are intended to stop computer security threats against a company's rights and property. But the definitions are broad and vague. The terms allow purposes such as guarding against "improper" information modification and ensuring "timely" access to information, functions that are not necessarily tied to attacks. Once handed over, the government is able to use this information for investigating crimes that are unrelated to the underlying security threat and, more broadly, for "national security" purposes, which is a poorly defined term that includes "threats to the United States, its people, property, or interests" and "any other matter bearing on United States national or homeland security." The bill's vague definitions like "cybersecurity purpose" and "cybersecurity system" also raise the frightening possibility of a company using aggressive countermeasures. If a company wants to combat a threat, it is empowered to use "cybersecurity systems" to identify and obtain "cyber threat information." But the bill does not define exactly how far a company can go, leaving it open to the possibility of abuse. The bill drew support from House Democrats, passing on a bipartisan vote of 288-127, although the White House repeated its veto threat on Tuesday if further civil liberties protections are not added. Some lawmakers and privacy activists worry that the legislation would allow the government to monitor citizens' private information and companies to misuse it. U.S. authorities have recently elevated the exposure to Internet hacks and theft of digital data to the list of top threats to national security and the economy. Though thousands of companies have long been losing data to hackers in China and elsewhere, the number of parties publicly admitting such loss has been
  •  
    http://hassassociates-online.com/articles/2013/04/23/house-passes-cybersecurity-bill-as-privacy-concerns-linger/ The House of Representatives go for the second round of Cyber Intelligence Sharing and Protection Act as it passed legislation on Thursday. The newly granted powers are intended to stop computer security threats against a company's rights and property. But the definitions are broad and vague. The terms allow purposes such as guarding against "improper" information modification and ensuring "timely" access to information, functions that are not necessarily tied to attacks. Once handed over, the government is able to use this information for investigating crimes that are unrelated to the underlying security threat and, more broadly, for "national security" purposes, which is a poorly defined term that includes "threats to the United States, its people, property, or interests" and "any other matter bearing on United States national or homeland security." The bill's vague definitions like "cybersecurity purpose" and "cybersecurity system" also raise the frightening possibility of a company using aggressive countermeasures. If a company wants to combat a threat, it is empowered to use "cybersecurity systems" to identify and obtain "cyber threat information." But the bill does not define exactly how far a company can go, leaving it open to the possibility of abuse. The bill drew support from House Democrats, passing on a bipartisan vote of 288-127, although the White House repeated its veto threat on Tuesday if further civil liberties protections are not added. Some lawmakers and privacy activists worry that the legislation would allow the government to monitor citizens' private information and companies to misuse it. U.S. authorities have recently elevated the exposure to Internet hacks and theft of digital data to the list of top threats to national security and the economy. Though thousands of companies have
kristine lim

Get Safe Online publishes online safety hints, tips and videos - 1 views

Experts say the government should get involved with tackling the challenge of social engineering scams Research just published claims to show that more than £21 million has been lost in the UK to ...

Get Safe publishes online safety hints tips and videos

started by kristine lim on 01 Jul 14 no follow-up yet
Christine Smith

World first cyber security training centre opens in Bristol: Hass & Associates Online R... - 1 views

From left, Brian Lord OBE, managing director for cyber at PGI, Karen Bradley, Minister for Modern Slavery and Organised Crime, and Vice Admiral Sir Tim McClement, chairman of PGI, during the live h...

World first cyber security training centre opens in Bristol Hass & Associates Online Reviews

started by Christine Smith on 24 Sep 14 no follow-up yet
creselda cabal

Hass and Associates: The Cyber-Risk of a Missile Attack on Syria - 1 views

  •  
    Hass and Associates: The Cyber-Risk of a Missile Attack on Syria The cyberattacks carried out by Syria last week were much more broad than initially reported, and they amounted to a warning shot of the retaliation the U.S. could expect if it should attack. Subsequent attacks would most likely go after U.S. infrastructure, and given how fragile it is and the likelihood Iran or North Korea would help out, the result could be massive. As I write this, the U.S. has deployed a battle group to Syria in preparation for a missile strike against the government there, and Russia has deployed what appears to be a counter force. What most seem not to be factoring in is that Syria has already fired its warning shot with attacks on Twitter and The New York Times, at least. I say "at least," because reporting of attacks isn't comprehensive, and other attempts may have failed, so Syria's first strike may have been far larger than initially reported. (Related cyber-attack updates: http://www.technewsworld.com/story/78848.html) The U.S. has a tendency to overreact, and it is clear there's insufficient preparation for theinfrastructure collapse that could occur when Syria responds to a missile attack -- and Russia exists as a wild card that could cause the conflict to spread rapidly out of control. It's been common knowledge for some time that the U.S. infrastructure is vulnerable to outside attack and that governments like Syria and China have been probing it and probably know exactly where and how to do the most damage. There's a very real likelihood that this time the U.S. won't go unscathed, and it may be prudent to have a plan in place should things go very, very wrong. Details: http://www.technewsworld.com/story/78848.html Related article: http://www.wattpad.com/12317622-cyber-security-hass-associates#.UibGpBunqeQ
Abigail Jones

Hass and Associates: Missile Attack on Syria - 1 views

  •  
    The cyber-attacks carried out by Syria last week were much more broad than initially reported, and they amounted to a warning shot of the retaliation the U.S. could expect if it should attack. Subsequent attacks would most likely go after U.S. infrastructure, and given how fragile it is and the likelihood Iran or North Korea would help out, the result could be massive. As I write this, the U.S. has deployed a battle group to Syria in preparation for a missile strike against the government there, and Russia has deployed what appears to be a counter force. What most seem not to be factoring in is that Syria has already fired its warning shot with attacks on Twitter and The New York Times, at least. I say "at least," because reporting of attacks isn't comprehensive, and other attempts may have failed, so Syria's first strike may have been far larger than initially reported. The U.S. has a tendency to overreact, and it is clear there's insufficient preparation for the infrastructure collapse that could occur when Syria responds to a missile attack -- and Russia exists as a wild card that could cause the conflict to spread rapidly out of control. It's been common knowledge for some time that the U.S. infrastructure is vulnerable to outside attack and that governments like Syria and China have been probing it and probably know exactly where and how to do the most damage. There's a very real likelihood that this time the U.S. won't go unscathed, and it may be prudent to have a plan in place should things go very, very wrong. Details: https://www.smore.com/g263-hass-and-associates-syria More Info: http://justinblake.postach.io/post/hass-and-associates-missile-attack-on-syria http://justinblake.booklikes.com/post/148815/hass-and-associates-missile-attack-on-syria
josh mae cruz

Hass & Associates Online Reviews: Aaron Swartz Can't Fight the New Cybersecurity Bill, ... - 1 views

  •  
    In late 2011 and early 2012, activists, progressive politicians and Internet companies led in part by Internet freedom advocate Aaron Swartz came together to defeat the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA). Advertised as measures against copyright infringement, the bills would have opened any website that contained copyrighted material it was not authorized to publish on any of its pages to a forced shutdown. A site that unknowingly held a copyrighted image in a comment section, for instance, would have been eligible as a violator. Virtually everyone was susceptible to closure. The Cyber Intelligence Sharing and Protection Act (CISPA) followed SOPA and PIPA in April 2012. CISPA was worse than its predecessors, proposing that private companies be allowed to share user information, a provision that would have violated many privacy protections of the Internet. Recognizing this, Swartz fought again. "It sort of lets the government run roughshod over privacy protections and share personal data about you," he said of the bill at the time. Again, he prevailed. Now, a year and a half after Swartz killed himself, there is the Cybersecurity Information Sharing Act. CISA is a lot like CISPA, but could end up being even worse. Privacy and civil rights groups including the ACLU and the Electronic Frontier Foundation are standing up to fight it. In an article about the bill, the ACLU's Sandra Fulton wrote: CISA "poses serious threats to our privacy, gives the government extraordinary powers to silence potential whistleblowers, and exempts these dangerous new powers from transparency laws."
creselda cabal

Don't Get 'Spoofed' by Rogue Callers - 1 views

  •  
    Source: http://www.huffingtonpost.com/jason-alderman/dont-get-spoofed-by-rogue_b_3574710.html When caller ID first arrived on the scene it seemed like a godsend to many people: Now you could easily identify who was on the line and ignore unwanted calls, whether from telemarketers, an ex-boyfriend or an unfriendly collection agency. But as often happens, unscrupulous individuals soon began manipulating the technology to defraud people by pretending to be someone else. Their scheme is called "caller ID spoofing" and disturbingly, it's perfectly legal in many cases. Here's how caller ID spoofing works and what precautions you should take to avoid being victimized: For a very low cost, businesses and individuals can use widely available caller ID spoofing software to generate calls which alter the telephone number and/or name that appear on the recipient's caller ID screen. Police, private investigators and collection agencies have used legal spoofing services for many years. Others who might have a legitimate reason to hide their identity when making a call include domestic violence victims and doctors returning patient calls who don't wish to release their private telephone numbers. Beyond that, the lines of legality begin to blur. The Truth in Caller ID Act of 2009 prohibits anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongfully obtain anything of value. Violators can be penalized up to $10,000 for each infraction. Unfortunately, such penalties haven't dissuaded many scammers. One common caller ID scam involves spoofers pretending to represent a bank, government agency, insurer, credit card company or other organization with which you do business. They count on you being reassured after recognizing the company's name on your screen. Related Articles: http://hass-associates-daffy.wikia.com/wiki/Main_Page Under the pretext of warning about an urgent situation (breached account, late payment,
Nathan Ken

Hass and Associates Cyber Security: What's new in identity theft protection? - 1 views

  •  
    With all the hundreds of quests from our survey, it's a Hass Associates pleasure to answer those today! As what we have observed, identity theft is on the top where individuals get so interested. In fact, identity theft is the fastest growing crime in America, affecting on the average of 500,000 new victims each year, for the past decade. And so, we are glad to discuss this for you to be well- informed and have preventive measures, such as reducing and reporting scams and prosecuting scammers. These topics are followed by: -online security and hardware concerns; -earning money from legitimate work-at-home programs and work-at-home scams; -credit cards and consumer issues; -Nigerian and lottery scams; -viruses and spyware; -phishing scams; -investment scams; and -urban legends. Obviously, many subscribers are interested in knowing out about new scams in these areas. This seems quite related to what we have been writing about. With all your exciting and terrific questions, Scam Busters will become even better. Today, we'll answer five of your biggest questions about identity theft: Answers to Our Subscribers' 5 Biggest Identity Theft Protection Questions 1) How big of a problem is identity theft and how long does it typically take to recover it? With victims' losses amounting to about $1.1 billion a year, identity theft reached the top of FCS's yearly list of consumer complaints for seven years in a row. The Federal Trade Commission (FTC) estimates more than the average victims that devote 170 to 300 hours trying to recover his or her identity and to resolve theft-relates issues. More than 110 million people in the US reported since January 2007 that have been packed letters from the different government branches, universities, corporations, banks, medical professionals, credit unions, no non-profit organizations and others notifying them that their personal information had either been stolen or lost. (Check out more statistics at our Identity Theft In
Nicole Garcia

Apple e-book ruling seen as warning to tech industry - 1 views

http://www.politico.com/story/2013/07/apple-ebook-ruling-93974.html The U.S. government's victory over Apple in the e-books antitrust case sends a message to the tech industry, legal observers say...

apple e-book ruling seen as warning to tech industry

started by Nicole Garcia on 11 Jul 13 no follow-up yet
christian fourtier

What is Tor and why does it matter? - 1 views

  •  
    We all live in public, at least as far as the US National Security Agency is concerned. As Internet users and global citizens become more aware of surveillance activities that the US and other countries are doing on the World Wide Web, there are those who seek to ensure that privacy and personal freedoms aren't trampled upon. Tor technology aims to help appease privacy advocates and offer a way in which the Internet can be enjoyed without the prying eyes of surveillance programs or other tracking software. This free piece of software has certainly become mainstream in light of recent events, but what is Tor and why does it matter to you, your family, neighbors, co-workers, and the rest of the Internet? Peeling back the onion layers It might surprise you that the Tor Project, originally an acronym for The Onion Router Project, was initially funded by the US Naval Research Laboratory and helped launch the development of onion routing (anonymous communication over a computer network) on behalf of DARPA. It had also received the backing from the Electronic Frontier Foundation. When users installed Tor software onto their computers, it would conceal their identity and network activity from anyone spying on their behavior. This was accomplished by separating the identification and routing information. The data is transmitted through multiple computers via a network of relays run by like-minded volunteers - almost like how users installed SETI software to look for extraterrestrial beings. Tor isn't the only service that helps you hide in the shadows away from the prying eyes of the federal government, or any other person who would do it for malicious purposes. However, some say that it's better because it works at the Transmission Control Protocol stream level. Full post: http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheNextWeb+(The+Next+Web+All+Stories)
Devi Soria

Amerikanska regeringen bästa IT-säkerhet genom Hass Associates - 1 views

  •  
    US regeringen använder sällan bästa cyber security steg: rådgivare Direkt lank: http://articles.economictimes.indiatimes.com/2013-11-23/news/44389988_1_cyber-security-cybersecurity-legislation-advisers WASHINGTON: Den amerikanska regeringen själv sällan följer cyber security metodtips och måste släppa sin gamla operativsystem och osäkra webbläsare som den försöker driva den privata sektorn att skärpa sin praxis, teknik rådgivare till President Barack Obama. "Den federala regeringen följer sällan accepterade bästa praxis," sade presidentens rådet av rådgivare om vetenskap och teknik i en rapport som släpptes på fredagen. "Det måste föregå med gott exempel och påskynda ansträngningarna för att göra rutinmässiga cyberattacks svårare genom att implementera bästa praxis för sina egna system." PCAST är en grupp amerikanska forskare och ingenjörer som gör politiska rekommendationer till administrationen. William Press, professor i datavetenskap vid University of Texas i Austin, och Craig Mundie, senior rådgivare till VD på Microsoft Corp, bestod av en arbetsgrupp för cybersäkerhet. Obama-administrationen i år intensifierat sin push för kritiska till att stärka deras cyber försvar, och Obama i februari utfärdade en verkställande order för att motverka bristen på framsteg på cybersäkerhet lagstiftning i kongressen. Mer relaterade ämnen: http://hassassociates-online.com/ http://www.linkedin.com/groups/hass-associates-4854820 http://hassassociates-online.com/art
Imogen Miller

From the Cold War to the Code War: UK boosts spending on cyber warfare - 1 views

Hass & Associates Online Reviews - UK prime minister David Cameron said that £800m would be spent on intelligence and surveillance equipment. The UK is upping its spending on cyber defense as a re...

Hass & Associates Online Reviews

started by Imogen Miller on 28 Jul 14 no follow-up yet
Emma Scott

Hass & Associates Online Reviews: FBI Investigates Possible Breach of JPMorgan - 1 views

Cnet.com reported on 27th August, 2014 stating that FBI (Federal Bureau of Investigation) of America is investigating a breach of data in JPMorgan and may be in many other banks. According to Forbe...

Hass & Associates Online Reviews FBI Investigates Possible Breach of JPMorgan

started by Emma Scott on 05 Sep 14 no follow-up yet
Emma Scott liked it
Lorenzo Blauch

Phishing Scam Ensnares Almost 2,000 Justice Department Staff - 2 views

OTTAWA - Many of the Justice Department's finest legal minds are falling prey to a garden-variety Internet scam. An internal survey shows almost 2,000 staff were conned into clicking on a phoney "...

Phishing Scam Ensnares Almost 2 000 Justice Department Staff

started by Lorenzo Blauch on 26 Jun 14 no follow-up yet
Emma Scott liked it
hackercombat

Cyber Criminal's Effective Human-Scale Methods - 2 views

As we use publicly accessible services, whether it is an airline, a bank, or a government transaction - we are at the mercy of their data handling procedures and protocols. https://hackercombat.co...

Hackercombat

started by hackercombat on 26 Oct 18 no follow-up yet
1 - 20 of 20
Showing 20 items per page