Cyber Defense

Google Expands Bug-Bounty To Cover Android Vulnerabilities

MOUNTAIN VIEW, Ca. - Google has expanded its bug-bounty program to cover vulnerabilities uncovered in Android. The program began with Chrome and expanded to Google Web sites and other open-source software projects. Under the program, people who find security holes get paid bounties. That often equates to a few hundred dollars, but particularly skilled attacks

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

3 U.S. Senators Say NSA Spying Not Necessary To Ensure U.S. Security

WASHINGTON DC - Three US senators with access to confidential NSA information don't see the agency's data-gathering methods as necessary to ensure US security. On Tuesday, Senators Mark Udall (D-Colorado), Ron Wyden (D-Oregon), and Martin Heinrich (D-New Mexico) filed an amicus brief on behalf of a lawsuit filed by several organizations that claims the National

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

Gartner Says Agility Is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

TENAFLY, N.J. - Private cloud computing is a reality for half of large enterprises with agility being the key driver, according to Gartner Inc. In a recent research report, "Private Cloud Matures, Hybrid Cloud Is Next," the industry analyst firm said cost was an important consideration as well. Security, often cited by IT professionals as

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

Boom Times for Cloud Security

BIRMINGHAM - Amazon announced several initiatives at its AWS re:Invent conference that are destined to disrupt several markets. One such program is Amazon WorkSpaces, an Amazon provided virtual desktop (VDI) product, which will be available for a low monthly fee, starting, according to Amazon, at $35. Another initiative is AWS AppStream that provides infrastructure to

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

IT Security Salaries Expected to Increase in 2014

By Aimee Rhodes TENAFLY, N.J. - IT-security related salaries are expected to climb in 2014, according to a survey released by TEKsystems, which polled some 900 IT leaders including CIOs, IT VPs, IT directors and IT hiring managers. Some 65 percent of respondents said they expected security salaries to increase. That?s up from a similar

By |2013-11-15T00:00:00-05:00November 15th, 2013|Archive, Cyber Defense|

Software Defined Radio: A Hacker’s Dream

TENAFLY, N.J. - Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn?t light- or sound-based will attract a hoard of researchers (and attackers) looking at ways to exploit them. Are you prepared? It is now known that your car?s GPS, toaster and medical devices are vulnerable to attack. For

By |2013-11-13T00:00:00-05:00November 13th, 2013|Archive, Cyber Defense|

Internet Bug Bounty Offers $5000 Reward For Hacks

SAN FRANCISCO - Internet Bug Bounty challenges you to hack your way into such critical Web platforms as OpenSSL, PHP, Perl, and Apache for the chance to earn as much as $5,000. Sponsored by Microsoft and Facebook, one challenge even invites you to hack the Internet itself, meaning finding a bug that affects a wide

By |2013-11-11T00:00:00-05:00November 11th, 2013|Archive, Cyber Defense|

Snowden Reportedly Used Co-Workers Passwords To Gain Access To Secrets

WASHINTON DC - Former NSA contractor Edward Snowden reportedly gained access to classified data after persuading several co-workers to reveal their passwords. As many as 20 to 25 workers at a National Security Agency base in Hawaii revealed their login credentials to Snowden, allowing him to obtain some of the documents that he eventually leaked

By |2013-11-11T00:00:00-05:00November 11th, 2013|Archive, Cyber Defense|