Toggle light / dark theme

US Navy fighting the real war that is ramping up by unpluging from certain networks. Well, that is an option; but also very limiting to “sneaker net” information file transfers. Definitely not uncommon across other areas of government.


SAN DIEGO — For the Navy, the best defense against a high-tech enemy may be a low-tech strategy.

After decades of building equipment, aircraft and ships designed to communicate with each other and back to shore, the Navy is now looking to “selectively disconnect” its systems to minimize vulnerability to cyberattacks, said Rear Adm. Lorin Selby, commander of the Naval Surface Warfare Center.

“We’re going back now and trying to selectively disconnect things and slow down some of these connections and only do it where we think it makes sense, where it’s safe to do it,” Selby told an audience at the AFCEA West conference in San Diego. “We’ve got to be more judicious with the things we connect to the internet or to shore, those kinds of vulnerabilities.”

HYDERABAD: Telangana police and Assam police nabbed an online fraudster in Guwahati on Thursday, even as the culprit tried to open fire at the police party.

A team of Cyberabad Cyber wing police had been camping in Guwahati for the last two days to nab one Vipul, wanted in a Rs 76-lakh online fraud case. He would send emails promising to get contracts in corporate companies, but after collecting money he would cheat the aspirants. The Cyberabad police party called Vipul on the pretext of some business deal to trap him. Crime wing officials and Assam police were waiting in a car for Vipul, who arrived in a Scorpio car.

However, Vipul got alert after seeing the police party and sped away from the location. On seeing the culprit slipping from the location, police chased his car.

Read more

One thing that will remain with tech for many years is jobs in cyber security — even with the layer of security that Quantum technology brings in the next 10 years; there is always a migration and retirement state that can (depending on the business and systems involved) could go on for years after Quantum platforms and networks are installed.


Then in December, aided and abetted by a Republican-controlled Congress, he eradicated those minor restrictions and replaced mindless austerity with clueless profligacy.

It proposes lifting the limits entirely from 2018. “It adheres to last year’s bipartisan budget agreement, it drives down the deficit, and includes smart savigs on health care, immigration and tax reform”.

Even with the increased taxes, Obama’s budget projects sharply higher deficits in coming years, totaling $9.8 trillion over the next decade.

Read more

Finally; it’s a start at least.


This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators and defensive measures among private companies and between the private sector and the Federal government by providing liability protection for sharing such information in accordance with the Act. The DHS Federal Register notice was published this morning here.

As required by the Act, the government has released four pieces of guidance designed to assist companies and Federal agencies with respect to sharing, receiving and handling cyber threat information.

Read more

What would it mean if you lost all of your personal documents, such as your family photos, research or business records? How much would you pay to get them back? There’s a burgeoning form of cybercrime that hinges on the answers to these questions.

You have probably heard of viruses and malware. These dangerous pieces of software can make their way into your computer and wreak havoc. Malware authors are intent on stealing your data and disrupting the proper functioning of your digital devices.

Then there is ransomware. This is crafted by cyber-criminals for extorting data from innocent users, and is rapidly becoming a threat to individuals, small business and corporate users alike.

Read more