ITL Bulletin for April 2010 |
- ITL Bulletin for April 2010
- Texas man cops to botnet-for-hire charges
- Government backs competition to recruit security experts
- Storm Worm Reappears
- Childs found guilty in SF network password case
- CIA Boosting Cybersecurity Investment
- Militants using international credit cards for operations
Posted: InfoSec News: ITL Bulletin for April 2010: ITL BULLETIN FOR APRIL 2010 ITL BULLETIN FOR APRIL 2010 GUIDE TO PROTECTING PERSONALLY IDENTIFIABLE INFORMATION Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce [...] |
Texas man cops to botnet-for-hire charges Posted: InfoSec News: Texas man cops to botnet-for-hire charges: http://www.theregister.co.uk/2010/04/28/botnet_for_hire_guilty/ By Dan Goodin in San Francisco The Register 28th April 2010 A Texas man has agreed to plead guilty to charges he trained a botnet on a popular internet service provider so he could demonstrate custom-made [...] |
Government backs competition to recruit security experts Posted: InfoSec News: Government backs competition to recruit security experts: http://www.telegraph.co.uk/technology/7638185/Government-backs-competition-to-recruit-security-experts.html By Claudine Beaumont Technology Editor Telegraph.co.uk 27 April 2010 The competition, which has the backing of the Cabinet Office and the Metropolitan Police, uses a series of web-based games and challenges to find people with untapped analytical, forensic and programming skills. There are fears that unless the country bolsters its ranks of computer security experts and analysts, it won't be able to cope with rising levels of cyber crime. The Cyber Security Challenge games are designed to measure eight key skill areas, including network analysis and logical thinking. People who pass those challenges will be invited to take part in further tests to ascertain their suitability for a security role. Those who meet the requirements could be offered scholarships and training courses. "The current system is not delivering enough skilled professionals to meet the cyber security challenges we face," said Judy Baker, director of the Cyber Security Challenge. "We have to improve the quality and quantity of talented people entering the profession to accommodate escalating requirements. [...] |
Posted: InfoSec News: Storm Worm Reappears: http://www.darkreading.com/insiderthreat/security/client/showArticle.jhtml?articleID=224700110 By Kelly Jackson Higgins DarkReading April 28, 2010 It's baaack: The bot code used in the infamous, massive Storm botnet that was taken down nearly two years ago is being used to build another [...] |
Childs found guilty in SF network password case Posted: InfoSec News: Childs found guilty in SF network password case: http://www.computerworld.com/s/article/9176060/Childs_found_guilty_in_SF_network_password_case?taxonomyId=17 By Robert McMillan IDG News Service April 27, 2010 Terry Childs, the San Francisco network administrator who refused to hand over passwords to his boss, was found guilty of one felony count of denying computer services, a jury found Tuesday. Childs now faces a maximum of five years in prison after jurors determined that he had violated California's computer crime law by refusing to hand over passwords to the city's FiberWAN to Richard Robinson, the chief operations officer for the city's Department of Technology and Information Services (DTIS). Although the city's network continued to run, San Francisco went 12 days without administrative control of the FiberWAN, and that constituted a denial of service -- illegal under state law. Childs' lawyers had argued that he was a buttoned-down, security-obsessed administrator who believed he was simply doing his job. [...] |
CIA Boosting Cybersecurity Investment Posted: InfoSec News: CIA Boosting Cybersecurity Investment: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=224600617 By Elizabeth Montalbano InformationWeek April 27, 2010 The CIA has made investing in technology to prevent and fight cyber threats as one of its three main priorities in a five-year strategic [...] |
Militants using international credit cards for operations Posted: InfoSec News: Militants using international credit cards for operations: http://sify.com/news/militants-using-international-credit-cards-for-operations-news-national-ke1uPNeejgf.html Sify News 2010-04-27 New Delhi: Terrorists, sleeper cells and terror suspects have been using international credit cards to fund their operations in India, Parliament was told on Tuesday. [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment