InfraGard National Capital Region Members Alliance

124 Flips | 12 Magazines | 54 Followers | @InfraGardNCR | The InfraGard National Capital Region Members Alliance (InfraGardNCR) is an alliance between the FBI & individuals committed to securing U.S. critical infrastructure.

Oh, snap: Apple’s latest motion turns the US government’s own security record against it

Apple is showing some sass in its campaign against the US government’s attempt to bypass iPhone security. The company filed a motion today (Feb. 25) to vacate the court order (pdf) requiring Apple to help the FBI break into an iPhone used by one of the San Bernardino shooters.<p>The government wants …

Privacy

Customer Letter

Privacy

Encryption isn’t at stake, the FBI knows Apple already has the desired key

The FBI knows it can't bypass the encryption; it just wants to try more than 10 PINs.<p>Apple has been served with a court order at the FBI's request, …

There Were So Many Data Breaches in 2015. Did We Learn Anything From Them?

The cyber breaches in 2015 demonstrate the broad impact across both the public and private sectors.

Hackers caused a blackout for the first time, researchers say

Hackers caused a power outage in Ukraine during holiday season, researchers say, signalling a potentially troubling new escalation in digital attacks.<p>"This is the first incident we know of where an attack caused a blackout," said John Hultquist, head of iSIGHT Partner's cyberespionage intelligence …

Google commits to $1 million in security research grants for Drive next year

Google today announced that it has allocated $1 million for grants to give out for security vulnerability research, even when the research doesn’t directly lead to the discovery of bugs.<p>This initiative, which was first introduced at the beginning of 2015, is in addition to Google’s Vulnerability …

Critical Infrastructure Protection: Sector-Specific Agencies Need to Better Measure Cybersecurity Progress, Nov 19, 2015

What GAO FoundSector-specific agencies (SSA) determined the significance of cyber risk to networks and industrial control systems for all 15 of the …

DHS phished own employees with Redskins tickets

One means of training employees not to click on suspicious links in emails is to set up phishing stings — fake malicious emails that show them just …

After Paris, top officials reopen encryption, surveillance debates

In the wake of the recent attacks in Paris, some U.S. lawmakers and agency leaders are pushing to resurrect controversial techniques for gathering …

50 Shades of Dark: From the Surface to the Dark Web

By Staffan on May 22, 2015<p>We just published a new white paper outlining how we used open source intelligence (OSINT) to research the dark web. You …

Dark Web

James Comey, FBI director: Encryption debate on hold despite national security concerns

The Obama administration has abandoned for now its plans to put in place a law that would require Internet companies to give investigators access to …

Apple CEO Tim Cook: 'Privacy Is A Fundamental Human Right'

Apple has long touted the power and design of its devices, but recently the world's most valuable company has been emphasizing another feature: privacy. That's no small matter when many users store important private data on those devices: account numbers, personal messages, photos.<p>Apple CEO Tim …

Apple CEO Tim Cook on guns, drugs and strong encryption

NPR’s Robert Siegel put Tim Cook on spot Thursday in interview for <i>All Things Considered</i>.<p>What if, Siegel asked, a government agency came to him with …

FBI Director Says Agents Need Access To Encrypted Data To Preserve Public Safety

FBI Director James Comey told senators on Wednesday that increased encryption on mobile devices is complicating the FBI's job.<p>Comey, along with a roster of Obama administration officials, has been asking Silicon Valley companies for months for a solution that would allow law enforcement to monitor …

An influential congressman just gave a passionate speech about not giving up on Syria

Rep. Eliot Engel (D-New York), the ranking member of the House Committee on Foreign Affairs, testified at a hearing on US policy in Syria on Wednesday, noting just how bad the war has gotten.<p>"Where to begin with Syria?" he asked. "At this point, the whole situation is such a mess that it might be …

New ‘XcodeGhost S’ Discovered to Target iOS 9 Users

A month after the biggest malware attack on the App Store and all the press around it, many US businesses are still using iOS apps infected with the …

The Apps That Can Secretly Spy on You Through Your Cellphone

Imagine being tracked through your cellphone without even knowing it.<p>That’s what one woman says happened to her. She told “GMA” Investigates that her …

Hackers can gain full access to your iPhone/iPad with these 2846 backdoored Apps on Apple App Store

Researchers discover a backdoor in 2846 iOS Apps which can allow full access to hackers<p>FireEye researchers have discovered that thousands of Apps …

Microsoft just buried the hatchet with another huge and bitter rival, Red Hat

Linux is a free and open source competitor to Windows offered by a number of players, with Red Hat being the biggest.<p>Microsoft has had Linux computer servers on Azure for a couple of years now but Azure never supported Microsoft's arch rival Red Hat. Microsoft was instead offering versions that …

Only 100 cybercrime brains worldwide says Europol boss

<b>There are only "around 100" cybercriminal kingpins behind global cybercrime, according to the head of Europol's Cybercrime Centre.</b><p>Speaking to the BBC's Tech Tent radio show, Troels Oerting said that law enforcers needed to target the "rather limited group of good programmers".<p>"We roughly know who …

Cybersecurity

The death of Google Chrome: Popular laptop operating system 'being folded into Android'

Google's much-loved Chrome operating system could soon be retired and replaced with Android.<p>Chrome OS is mostly used on laptop computers , where it …

The five stages of a cyber intrusion

Cyber Defense<p>When it comes to cybersecurity, the most egregious breaches often come down to human error, such as someone clicking on a link in a …

One of us: the militant Egypt's army fears most

CAIRO, (Reuters) - As a special forces officer in the Egyptian Army, Hisham al-Ashmawy trained in the desert, learning camouflage and survival techniques and how to hunt the enemy in rough terrain. Now he has turned militant, and uses that training to another purpose: helping fellow jihadists fight …

National Security

Why America's Alliance With Syria's Kurds Has Many Worried

“The West often falls in love with freedom fighters, but those freedom fighters can turn out to be not-so-good guys later.”<p>ISTANBUL — It was a vicious double murder, even for a region growing ever more bloody.<p>Two Turkish police officers were found dead, shot execution-style, in an apartment near …

Cyber crime on the increase in the UK

According to the latest crime survey, there is a greater likelihood of being scammed online than being mugged in a dark alley. The modern day …

Research Shows How NSA Exploits Flaws to Decrypt Huge Amounts of Communications Instead of Securing the Internet

Machine Learning: Sizing Up Its Role in InfoSec

By identifying abnormal data access behaviors, machine learning systems could improve breach prevention and fraud detection in the healthcare arena …

7 Amazing Moments From The Fox News ‘Terrorism Expert’ Who Was Just Arrested For Fraud

On Thursday, a man named Wayne Simmons was arrested by the FBI for what the agency called “major fraud” — lying about having worked for the Central …