Richard C. Batka
New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20.



Get in on the seventh year of NYU-Poly’s most-anticipated student competition. CSAW participants are leading the next generation of computer science professionals who will think of proper cyber-security measures as a necessity, not as an afterthought.
Register | Follow Uson Facebook | Save the Dates | October 28 and 29, 2010 - Final Competitions and Awards Days |
Note: Registration for the High School Cyber Forensics challenge isn't open yet.Send us your contact information so we can let you know when you can register for the Cyber Forensics challenge.
Defense Secretary Lynn has been discussing a 2008 compromise of U.S. military network security by a foreign intelligence agency. The DOD is taking measures to protect itself. You should do the same.
The Washington Post reports in Defense official discloses cyberattack:
The most significant breach of US military computers was caused by a flash drive inserted into a US military laptop on a post in the Middle East in 2008.
A foreign intelligence agency managed to place malware on a USB flash drive that was later plugged into the US military laptop, infecting it. From there, the infection made its way onto a U.S. military Central Command network. According to Defense Secretary William J. Lynn III:
“That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control.”
“It was a network administrator’s worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.”
With the growth of widespread network-delivered malware infections in today’s almost universally connected world, it can be easy to forget that sometimes the old methods are still effective. In the 1990s, people who used computers on a regular basis were much more cognizant of the potential danger of viruses that could move from computer to computer via removable media like floppy disks.
How to avoid removable media malware

Developing a comprehensive cybersecurity strategy becomes simpler when you focus on four pillars, according to Kevin Manwiller, Cisco’s manager of federal security solutions. “To protect information and keep networks running, governments need to address achievable goals: identity and access control, secure remote access, data center and cloud security measures, and advanced threat defense throughout the enterprise,” he says. These four pillars of cybersecurity not only prevent information leakage and network damage, but also support government cost-saving initiatives such as cloud computing, telework, and citizen self-service.
The Four Pillars of Cybersecurity
Integrated Threat Detection and Defense

| ||
|

BadB’s real name is Vladislav A. Horohorin, according to a statementreleased last week by the United States Justice Department, and he was a resident of Moscow before his arrest by the police in France during a trip to that country earlier this month.
He is expected to appear soon before a French court that will decide on his potential extradition to the United States, where Mr. Horohorin could face up to 12 years in prison and a fine of $500,000 if he is convicted on charges of fraud and identity theft. For at least nine months, however, he lived openly in Moscow as one of the world’s most wanted computer criminals.

Google Android began with the greatest of intentions — freedom, openness, and quality software for all. However, freedom always comes with price, and often results in unintended consequences. With Android, one of the most important of those unintended consequences is now becoming clear as Google gets increasingly pragmatic about the smartphone market and less and less tied to its original ideals.
Here’s the dirty little secret about Android: After all the work Apple did to get AT&T to relinquish device control for the iPhone and all the great efforts Google made to get the FCC and the U.S. telecoms to agree to open access rules as part of the 700 MHz auction, Android is taking all of those gains and handing the power back to the telecoms.

August 26, 2010 2 pm ET / 11 am PT
Are you suffering from misconceptions about safe web browsing? You might think you’re being safe, it’s next to impossible to stay up to date on infected
sites—no matter how educated or aware of the risks you are.
Join this live one-hour webcast to bust some myths and learn how web threats are created and spread -- and the impact they have on your business. We’ll also discuss these
key topics and more:


For the second year in a row, Fordham has partnered with the FBI to sponsor this conference. The working relationships between law enforcement professionals and those in the private sector and academia are instrumental in combating cyber crimes worldwide. Representatives from various law enforcement and government agencies, academic institutions, and private industries enjoyed presentations, exhibitions, and access to networking opportunities. Participants discussed advancements in the field of cyber security and emerging cyber threats, in addition to other related topics.