British and American intelligence agents attempting to hack the “dark web” are being deliberately undermined by colleagues, it has been alleged. Spies from both countries have been working on finding flaws in Tor, a popular way of anonymously accessing “hidden” sites. But the team behind Tor [...]
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.
2014 FedCyber Date Announced - Registration Open
Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.
Video Overview of the 2013 Event
The FedCyber Wire
Sony’s PlayStation network has been shut down after cyber-attackers overloaded it in what’s known as a distributed denial of service attack. via BBC News – Sony PlayStation network has been shut down by cyber-attack. Via OODA Loop [...]
An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing man-in-the-middle (MITM) attacks, and occasionally additional ones, as well. via Most popular Android apps [...]
An analysis by security researchers of 48,000 extensions for Google’s Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users. via Many Chrome browser extensions do sneaky things – Computerworld. Via OODA Loop [...]
Amazon Web Services has become the first commercial cloud provider authorized to handle the Defense Department’s most sensitive unclassified data. via Big Win for Amazon: First Provider Authorized to Handle Sensitive DOD Workloads in Cloud – Nextgov.com. Via OODA Loop [...]
A security ratings firm found that Flashback – a trojan noted for infecting hundreds of thousands of Mac machines – was the most prevalent malware impacting institutions of higher education. via Study: Most higher ed malware infections attributed to ‘Flashback’ – SC Magazine. Via OODA Loop [...]
The following is a recap of Navy Gold Coast 2014, a Small Business Procurement Event. Attendees were treated to some great presentations 11-13 Aug 2014 in San Diego as the Navy provided their assessment of upcoming opportunities to interested small businesses. This event receives great support! [...]
Do You Have Contributions To Make To National Security? Attend 18-19 Sep 2014 Intelligence and National Security Summit
By Bob Gourley The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Two of the most highly regarded professional organizations in the national security ecosystem have combined to facilitate this event: the Armed Forces C [...]
Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their inept [...]
By Katie Kennedy What you did not know about your personal data? Reddit, Imgur, Twitch, and a couple other major internet portals are about to hand over reams and reams of user data to university professors to do research on. How can the sites do it while still maintaining users’ trust? Earlier th [...]
Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, [...]
In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it do [...]
The next major network security threat could come from the sky, in the form of drones equipped with video cameras and the ability to sniff out mobile devices and their unique identifiers, perhaps even establishing rogue network access points in the sky that could be used to hack sensitive government [...]
Community Health Systems Inc, one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients. via Community Health says data stolen in cyber attack f [...]
A Chinese national has been indicted in connection with an alleged computer hacking scheme to steal trade secrets from American defense contractors, federal prosecutors announced Friday. via Chinese national in custody for allegedly hacking into Boeing computer – LA Times. Via OODA Loop [...]