DHS looking at cybersecurity flaws in two dozen medical devices

From: GovernmentHealthIT

Tom Sullivan, Editor

A senior official at the U.S. Department of Homeland Security said that it is currently reviewing nearly two dozen medical devices and pieces of hospital equipment for potential cybersecurity issues, according to reports.

Though it’s not a complete list, Reuters reported that DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT is looking at a Hospira infusion pump, and implantable heart devices from both Medtronic and St. Jude Medical, as well as medical imaging and networking equipment.

Read Complete Article


Former NSA inspector general joins MIT Center for International Studies

From:  MIT News

Joel Brenner, former inspector general and senior counsel at the National Security Agency (NSA), has joined the MIT Center for International Studies (CIS) as a 2014-2015 Robert E. Wilhelm Fellow.

Brenner specializes in cyber- and physical security, data protection and privacy, intelligence law, the administration of classified information and facilities, and the regulation of sensitive cross-border transactions. He is the author of “America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare,” available in paperback as “Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World.”


The state of internet policy making in Ethiopia

From: CyberEthiopia

Kinfe Michael Yilma, a scholar at Brunel University London UK, discusses Ethiopia’s internet policies and participation in internet governance forums.

Ethiopia is among those countries with the lowest level of internet penetration and use. A 2014 World Internet Stats report, for instance, claims that Ethiopia has had only 1.9% internet penetration. Similarly, the World Economic Forum also rated the number of internet users in Ethiopia at 1.1%, ranking the country 142 out of 144 countries surveyed in 2012/13. As of December 31, 2013, that number had only risen to 5.5%, according to a report released by the Ethiopian government. Indeed, it was only in 1997 that Ethiopia introduced the internet, and not until 2005 that the first four thousand kilometers of fiber optic backbone were laid in Addis Ababa. This delay in the proliferation of the internet has played a role in delaying the development of internet policies including legislative measures surrounding the internet.


U.S. Delegation to the International Telecommunication Union Plenipotentiary Conference in Busan, Republic of Korea

From: US Department of State

Ambassador Daniel Sepulveda, U.S. Coordinator for International Communications and Information Policy, is leading the U.S. delegation to the International Telecommunication Union (ITU) 2014 Plenipotentiary Conference, which takes place from October 20-November 7 in Busan, Republic of Korea.

Other members of the U.S. delegation include Federal Communications Commission Chairman Tom Wheeler, FCC Commissioner Michael O’Reilly, Permanent Representative of the United States of America to the United Nations and other International Organizations in Geneva Pamela Hamamoto, State Department Coordinator for Cyber Issues Christopher Painter, Assistant Secretary of Commerce for Communications and Information and Administrator of the National Telecommunications and Information Administration Lawrence E. Strickling, Dr. Andy Ozment Ozment, Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security, and officials of the National Aeronautics and Space Administration and the Department of Defense.


Why the government needs access to your data

From: betaNews

By Paul Cooper

We are in Brussels at the 27th annual Information Security Solutions Europe Conference (ISSE), one of Europe’s largest gatherings of cyber security experts.

Troels Oerting of the Danish police gave a fascinating opening keynote defending the right of the police to use surveillance over the Internet. It certainly ruffled some feathers in Brussels, but here are some of the highlights so you can make up your own mind.

At the moment I’m taking a lot of flak from privacy people on the Internet, because I want police and law enforcement to have access to people’s data on the Internet.


J.P. Morgan CEO: Cybersecurity Spending to Double

From: The Wall Street Journal

James Dimon Appears on Panel in First Public Remarks Since Throat Cancer Treatment

By Emily Glazer

J.P. Morgan Chase JPM -0.93% & Co. Chairman and Chief Executive James Dimon said the bank would double spending on cybersecurity over the next five years, his first public remarks following the data breach that hit the nation’s largest bank this summer.

Mr. Dimon was speaking in his first public appearance since July, when he disclosed that he had been diagnosed with throat cancer.


Obama Said to Warn of Crippling Cyber Attack Potential

From: Fox Business


President Barack Obama believes cyber terrorism is one of the biggest threats to national security and says the White House is bracing for a possible doomsday scenario if hackers can successfully penetrate government and business computer systems, the FOX Business Network has learned.

The president shared his thoughts on cyber terrorism last week, during a fundraising tour in New York City and a stop in Greenwich Conn., according to people who attended the events. At the same series of events, the president also downplayed the threat of a large Ebola outbreak in the United States, citing the nation’s medical infrastructure as the main reason the deadly virus hasn’t spread as it has in West Africa, these people say.


Cyberattacks trigger talk of ‘hacking back’

From: The Washington Post

By Craig Timberg, Ellen Nakashima and Danielle Douglas-Gabriel

The recent rash of cyberattacks on major U.S. companies has highlighted the scant options available to the victims, who often can do little more than hunker down, endure the bad publicity and harden their defenses in hopes of thwarting the next assault.

But behind the scenes, talk among company officials increasingly turns to an idea once considered so reckless that few would admit to even considering it: Going on the offensive. Or, in the parlance of cybersecurity consultants, “hacking back.”

Read Complete Article


Xi calls on PLA to step up information security to counter growing cyber threat

From: South China Morning Post

Central Military Commission, chaired by the president, says military information security is a key part of building a strong army

Laura Zhou

President Xi Jinping has called for the country’s military to promote home-grown security systems to boost military information security.

The directive, issued by the supreme Central Military Commission which is chaired by Xi, is designed to act as a guideline for the People’s Liberation Army (PLA) and People’s Armed Police.

It stipulates military information security is a key part of building a strong army.

Read Complete Article


Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats

From: CircleID

By Bruce Levinson

You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don’t remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you’re reading this. But the Russian mafia and other Transnational Criminal Organizations and Foreign Terrorist Organizations understand the connections quite well. Criminals around the world know that tobacco trafficking is a lucrative, low risk way of raising cash that can be used to fund narcotics deals, arms smuggling, human trafficking and, more recently, the theft of credit card and banking data.

Older posts «