Pentagon seeks hackers to test Defense Department’s cybersecurity

The Pentagon is looking for a few good computer hackers.  (CED Solutions provides CyberSecurity training and Certification for IT Pros). Screened high-tech specialists will be brought in to try to breach the Defense Department’s public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities. According to the Pentagon, it is the first time the federal government has undertaken a program with outsiders attempting to breach the networks. Large companies have done similar things. Defense officials laid out the [...]

Read more...

Tech skills put workers in control – demand for expertise keeps salaries high, unemployment low

Atlanta Journal Constitution February 21, 2016 (Training and Certifications for IT Tech Courses in pursuit of jobs or improved IT positions are available at CED Solutions in Atlanta at info@cedsolutions.com) The upside isn’t hard to figure out. High pay, flexible hours, a choice of jobs, the chance to work at the leading edge of your field, walk away when you get tired of it and walk back in when you want. And did we mention high pay? “There are not enough talented people to fill the [...]

Read more...

Hollywood hospital hit by ransomware attack, hackers demand $3.6M

Ransomware is always going to present a major headache for any victim, but when a hospital is at the center of an attack, the matter suddenly appears more threatening, with the stakes potentially a whole lot higher. Take the Hollywood Presbyterian Medical Center in Los Angeles. Its computer systems have been offline for more than a week following a ransomware attack, with hackers reportedly demanding a $3.6 million payment to restore access, CSO reported Monday. Staff are understandably having a hard [...]

Read more...

Russian cyberspy group uses simple yet effective Linux Trojan

The Fysbis Trojan runs without root and has an extensible, modular architecture. A cyberespionage group of Russian origin known as Pawn Storm is infecting Linux systems with a simple but effective Trojan program that doesn’t require highly privileged access. Pawn Storm, also known as APT28, Sofacy or Sednit, is a group of attackers that has been active since at least 2007. Over the years, the group has targeted governmental, security and military organizations from NATO member countries, as well as defense [...]

Read more...

Obama seeks $19B for cybersecurity in 2017, a 36% increase

President Barack Obama tours the National Cybersecurity and Communications Integration Center in Arlington, Virginia, Jan. 13, 2015. He is accompanied by Homeland Security Secretary Jeh Johnson, Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, and tour guides Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity & Communications, and Brigadier General Greg Touhill, (Ret.), Deputy Assistant Secretary for Cybersecurity Operations and Programs. (Official White House Photo by Pete Souza) The Obama administration is seeking a $5 billion funding [...]

Read more...