By Bob Gourley We have to assume all our readers, being the savvy connected people you are, are tracking the many concerning global events that appear to be happening with much more frequency. Humanity has a history of violence and some have postulated that what we are seeing now is just do to bette [...]
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.
2014 FedCyber Date Announced - Registration Open
Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.
Video Overview of the 2013 Event
The FedCyber Wire
The team behind a social network being used by Islamic State (IS) militants has admitted it cannot prevent the spread of extremist material. Diaspora is a decentralised network with data stored on many private servers which cannot be controlled by any single administrator. IS is believed to have swi [...]
US researchers say they have been able to hack into Gmail accounts with a 92% success rate by exploiting a weakness in smartphone memory. via BBC News – Gmail smartphone app hacked by researchers. Via OODA Loop [...]
British and American intelligence agents attempting to hack the “dark web” are being deliberately undermined by colleagues, it has been alleged. Spies from both countries have been working on finding flaws in Tor, a popular way of anonymously accessing “hidden” sites. But the team behind Tor [...]
Sony’s PlayStation network has been shut down after cyber-attackers overloaded it in what’s known as a distributed denial of service attack. via BBC News – Sony PlayStation network has been shut down by cyber-attack. Via OODA Loop [...]
An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing man-in-the-middle (MITM) attacks, and occasionally additional ones, as well. via Most popular Android apps [...]
An analysis by security researchers of 48,000 extensions for Google’s Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users. via Many Chrome browser extensions do sneaky things – Computerworld. Via OODA Loop [...]
Amazon Web Services has become the first commercial cloud provider authorized to handle the Defense Department’s most sensitive unclassified data. via Big Win for Amazon: First Provider Authorized to Handle Sensitive DOD Workloads in Cloud – Nextgov.com. Via OODA Loop [...]
A security ratings firm found that Flashback – a trojan noted for infecting hundreds of thousands of Mac machines – was the most prevalent malware impacting institutions of higher education. via Study: Most higher ed malware infections attributed to ‘Flashback’ – SC Magazine. Via OODA Loop [...]
The following is a recap of Navy Gold Coast 2014, a Small Business Procurement Event. Attendees were treated to some great presentations 11-13 Aug 2014 in San Diego as the Navy provided their assessment of upcoming opportunities to interested small businesses. This event receives great support! [...]
Do You Have Contributions To Make To National Security? Attend 18-19 Sep 2014 Intelligence and National Security Summit
By Bob Gourley The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Two of the most highly regarded professional organizations in the national security ecosystem have combined to facilitate this event: the Armed Forces C [...]
Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their inept [...]
By Katie Kennedy What you did not know about your personal data? Reddit, Imgur, Twitch, and a couple other major internet portals are about to hand over reams and reams of user data to university professors to do research on. How can the sites do it while still maintaining users’ trust? Earlier th [...]
Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, [...]
In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it do [...]