443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation
443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation

Category

Cyber Maryland
EGYPT: Cyber war among possible presidential candidates: “Source: Nasry Esmat, Los Angeles Times. Egypt’s political cyber war is intensifying after hackers played havoc with the Facebook page of Gamal Mubarak, the son of President Hosni Mubarak and a possible presidential contender in 2011. The role of cyberspace politics is expected to grow through 2011. Statistics...
Read More
Below, are pictures, my abstract, and slides from my talk at Def Con 18. DEF CON 18This paper argues that the current rules of war are adequate for addressing the unique issues that are encountered as a result of conducting and defending against cyber warfare. The author begins by giving a survey of the laws...
Read More
Korea trying to put cyber security on G20 agenda: “Source: Kim Tong-hyung, The Korea TimesKorea is attempting to present computer security as a topic of discussion for the Group of 20 meetings in Seoul later this year. However, the talks for establishing an international body for combating cybercrimes seem to be discouraged. The Korea Communications...
Read More
EFF Wins New Legal Protections for Video Artists, Cell Phone Jailbreakers, and Unlockers: “Via: EFF: The Electronic Frontier Foundation (EFF) won three critical exemptions to the Digital Millennium Copyright Act (DMCA) anticircumvention provisions today, carving out new legal protections for consumers who modify their cell phones and artists who remix videos — people who, until...
Read More
Hacker Spoofs Cell Phone Tower to Intercept Calls: “Via: Wired: A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear. The device tricks the phones into disabling encryption and records call details and content...
Read More
Feds Admit Storing Checkpoint Body Scan Images: “Via: Wired: For the last few years, federal agencies have defended body scanning by insisting that all images will be discarded as soon as they’re viewed. The Transportation Security Administration claimed last summer, for instance, that “scanned images cannot be stored or recorded.” Now it turns out that...
Read More
S. 3480 The audio that you’ll hear is from the press conference video at the bottom of the page. http://hsgac.senate.gov/public/index.cfm?FuseAction=Press.MajorityNews&ContentRecord_id=227d9e1e-5056-8059-765f-2239d301fb7f Critique http://techdailydose.nationaljournal.com/2010/06/groups-wary-of-scope-of-latest.php
Read More
Cyber Warfare- it is here and now!: “Hackers,Terrorists or Cyber Warriors? The same infrastructure we use for managing our daily life, communications, trade and security is also providing subversive elements with the means and access to compromise our national security. This article provides a summary of a Cyber Warfare seminar conducted this week by the...
Read More
FOR IMMEDIATE RELEASE    June 7, 2010Contacts: Sara Lonardo (Lieberman) 202-224-1839                   Kevin Kelley (Collins) 202-224-4751                   Emily Spain (Carper) 202-224-2441 LIEBERMAN, COLLINS, CARPER TO INTRODUCE CY BER SECURITY LEGISLATION. Will Modernize Nation’s Defenses, Bring Government and Industry Together WASHINGTON—Senators Joe Lieberman, ID-Conn., Susan Collins, R-Me., and Thomas Carper, D-Del., will hold a press conference Thursday, June 10 at...
Read More
1 2 3 4 5 13