Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

The Problem With PEAP

By BryanHalfpap In previous posts (The Wireless Attack Toolkit and What’s Trending For Hackers) I highlighted some common wireless security attacks. If you believe your corporate network has some additional security on top of it, well, this post is aimed directly at you. Modern wireless security p [...]


Operational Levels of Cyber Intelligence

Cyber intelligence is a complex, as yet undefined, multifaceted approach to framing, thinking about, and reacting to cyber adversarial activity. Many discussions emphasize the complexity of the cyber operational domain, the speed in which activity and operations take place, and the supposed inherent [...]


Hacking U.S. Secrets, China Pushes for Drones

“For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.” So [...]


New Mac Trojan Discovered Related to Syria

“A new Mac Trojan has been discovered that creates a backdoor on an affected user’s machine. It was found on VirusTotal, sent by a user in Belarus. At the time of writing, the Command and Control (C&C) server is down and no longer sending commands to affected users. This appears to be a targ [...]


SCADA and ME: A Book For Children and Management

By Richard Stiennon I have just published a children’s book on SCADA. How crazy is that? Supervisory Control and Data Acquisition(SCADA) refers to the technologies and protocols used in most manufacturing, oil and gas, electrical grid, and transportation for communicating with physical components [...]


Facebook, Twitter blocked again in Iran

“Many Iranian Internet users were disappointed Tuesday morning to discover that Facebook and Twitter were blocked once again after a short-lived spurt of unfettered access Monday.” Source: Facebook, Twitter blocked again in Iran Via OODA Loop [...]


1.29 DDOS Attacks Occur Every Two Minutes, Experts Say

“Distributed denial-of-service (DDOS) protection solutions provider NSFOCUS has published its mid-year DDOS Threat Report for 2013. The company’s anti-DDOS analysts have observed 168,459 incidents and determined that, on average, 1.29 DDOS attacks are launched worldwide every two minutes. Anothe [...]