Russian cyberspy group uses simple yet effective Linux Trojan

The Fysbis Trojan runs without root and has an extensible, modular architecture. A cyberespionage group of Russian origin known as Pawn Storm is infecting Linux systems with a simple but effective Trojan program that doesn’t require highly privileged access. Pawn Storm, also known as APT28, Sofacy or Sednit, is a group of attackers that has been active since at least 2007. Over the years, the group has targeted governmental, security and military organizations from NATO member countries, as well as defense [...]

Read more...

Obama seeks $19B for cybersecurity in 2017, a 36% increase

President Barack Obama tours the National Cybersecurity and Communications Integration Center in Arlington, Virginia, Jan. 13, 2015. He is accompanied by Homeland Security Secretary Jeh Johnson, Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, and tour guides Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity & Communications, and Brigadier General Greg Touhill, (Ret.), Deputy Assistant Secretary for Cybersecurity Operations and Programs. (Official White House Photo by Pete Souza) The Obama administration is seeking a $5 billion funding [...]

Read more...

Dallas architectural titan HKS helps swing the NFL back to L.A.

Rendering of new stadium in Inglewood, Calif. This is an architectural rendering of the new stadium in Inglewood, Calif., one designed by the Dallas-based firm, HKS. The National Football League has voted to have the St. Louis Rams return to Los Angeles and begin play in the new stadium in 2019. The National Football League voted overwhelmingly Tuesday to let the St. Louis Rams move to Los Angeles and construct a lavish new stadium in suburban Inglewood, Calif. The big winners that [...]

Read more...

Cybersecurity Firm Says Chinese Hackers Keep Attacking U.S. Companies

HONG KONG — It was heralded as the first concrete step taken by the United States and China on the thorny issue of online espionage. With President Xi Jinping of China beside him at a news conference in the White House Rose Garden last month, President Obama said the two had come to an agreement that China and the United States would refrain from attacks aimed at pilfering company intellectual property or trade secrets for commercial advantage. Less than a day [...]

Read more...

How to land a cybersecurity job – 5 tips for getting hired in this fast-growing, high-paying segment of the IT industry

Cybersecurity jobs are plentiful, from government, financial services and utilities to manufacturing and retail. But what skills do IT professionals need to qualify for these high-paying jobs? RELATED: IT certifications lead to jobs, higher pay  (CED Solutions is a leading provider of CyberSecurity training and Certifications – www.cedsolutions.com) We asked the experts and came up with this list of five tips for landing a top-notch cybersecurity job: 1. Get certified. Security-related certifications are a prerequisite for most commercial cybersecurity jobs and all defense-related [...]

Read more...