ITL Bulletin for April 2010

ITL Bulletin for April 2010


ITL Bulletin for April 2010

Posted:

InfoSec News: ITL Bulletin for April 2010: ITL BULLETIN FOR APRIL 2010
ITL BULLETIN FOR APRIL 2010 GUIDE TO PROTECTING PERSONALLY IDENTIFIABLE INFORMATION Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce [...]

Texas man cops to botnet-for-hire charges

Posted:

InfoSec News: Texas man cops to botnet-for-hire charges: http://www.theregister.co.uk/2010/04/28/botnet_for_hire_guilty/
By Dan Goodin in San Francisco The Register 28th April 2010
A Texas man has agreed to plead guilty to charges he trained a botnet on a popular internet service provider so he could demonstrate custom-made [...]

Government backs competition to recruit security experts

Posted:

InfoSec News: Government backs competition to recruit security experts: http://www.telegraph.co.uk/technology/7638185/Government-backs-competition-to-recruit-security-experts.html
By Claudine Beaumont Technology Editor Telegraph.co.uk 27 April 2010
The competition, which has the backing of the Cabinet Office and the Metropolitan Police, uses a series of web-based games and challenges to find people with untapped analytical, forensic and programming skills.
There are fears that unless the country bolsters its ranks of computer security experts and analysts, it won't be able to cope with rising levels of cyber crime.
The Cyber Security Challenge games are designed to measure eight key skill areas, including network analysis and logical thinking. People who pass those challenges will be invited to take part in further tests to ascertain their suitability for a security role. Those who meet the requirements could be offered scholarships and training courses.
"The current system is not delivering enough skilled professionals to meet the cyber security challenges we face," said Judy Baker, director of the Cyber Security Challenge. "We have to improve the quality and quantity of talented people entering the profession to accommodate escalating requirements.
[...]

Storm Worm Reappears

Posted:

InfoSec News: Storm Worm Reappears: http://www.darkreading.com/insiderthreat/security/client/showArticle.jhtml?articleID=224700110
By Kelly Jackson Higgins DarkReading April 28, 2010
It's baaack: The bot code used in the infamous, massive Storm botnet that was taken down nearly two years ago is being used to build another [...]

Childs found guilty in SF network password case

Posted:

InfoSec News: Childs found guilty in SF network password case: http://www.computerworld.com/s/article/9176060/Childs_found_guilty_in_SF_network_password_case?taxonomyId=17
By Robert McMillan IDG News Service April 27, 2010
Terry Childs, the San Francisco network administrator who refused to hand over passwords to his boss, was found guilty of one felony count of denying computer services, a jury found Tuesday.
Childs now faces a maximum of five years in prison after jurors determined that he had violated California's computer crime law by refusing to hand over passwords to the city's FiberWAN to Richard Robinson, the chief operations officer for the city's Department of Technology and Information Services (DTIS).
Although the city's network continued to run, San Francisco went 12 days without administrative control of the FiberWAN, and that constituted a denial of service -- illegal under state law.
Childs' lawyers had argued that he was a buttoned-down, security-obsessed administrator who believed he was simply doing his job.
[...]

CIA Boosting Cybersecurity Investment

Posted:

InfoSec News: CIA Boosting Cybersecurity Investment: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=224600617
By Elizabeth Montalbano InformationWeek April 27, 2010
The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic [...]

Militants using international credit cards for operations

Posted:

InfoSec News: Militants using international credit cards for operations: http://sify.com/news/militants-using-international-credit-cards-for-operations-news-national-ke1uPNeejgf.html
Sify News 2010-04-27
New Delhi: Terrorists, sleeper cells and terror suspects have been using international credit cards to fund their operations in India, Parliament was told on Tuesday. [...]

0 comments:

Post a Comment