140
140
Jun 24, 2014
06/14
by
KGO
tv
eye 140
favorite 0
quote 0
the most common malware forces a computer to call phone numbers that charge by the minute. >> a new player in the game of thrones and off to an impressive start. >> queen elizabeth is setting her shiites on ad has atrial fib, or afib. he has the most common kind... ...it's not caused by a heart valve problem. dad, it says your afib puts you at 5 times greater risk of a stroke. that's why i take my warfarin every day. but it looks like maybe we should ask your doctor about pradaxa. in a clinical trial, pradaxa® (dabigatran etexilate mesylate)... ...was proven superior to warfarin at reducing the risk of stroke. and unlike warfarin, with no regular blood tests or dietary restrictions. hey thanks for calling my doctor. sure. pradaxa is not for people with artificial heart valves. don't stop taking pradaxa without talking to your doctor. stopping increases your risk of stroke. ask your doctor if you need to stop pradaxa before surgery or a medical or dental procedure. pradaxa can cause serious, sometimes fatal, bleeding. don't take pradaxa if you have abnormal bleeding or have had a heart valv
the most common malware forces a computer to call phone numbers that charge by the minute. >> a new player in the game of thrones and off to an impressive start. >> queen elizabeth is setting her shiites on ad has atrial fib, or afib. he has the most common kind... ...it's not caused by a heart valve problem. dad, it says your afib puts you at 5 times greater risk of a stroke. that's why i take my warfarin every day. but it looks like maybe we should ask your doctor about pradaxa....
165
165
Jun 24, 2014
06/14
by
KGO
tv
eye 165
favorite 0
quote 0
the most common form of malware in the clones would secretly force users' computer to call phone numberst charge by the minute. >> watch out. >> we will check with meteorologist mike nicco and it was warm yesterday. >> we will do the same thing today. if you are headed to the alameda county fair get fraud warm sunshine starting at 11 o'clock at 77 and topping out in the mid-80's at 3:00 and at 11 o'clock when we close it will be a cool 60 degrees. the sun will be down obviously by then. at at&t park, it will be breezy. 7:15 is 51 and dropping to 58. we have heat in the central valley mid-to-upper 90's and 78 in lake tahoe and 80 in los angeles and 108 in palm springs. leyla gulen? >> we have a rot of cardboard blocking all lanes of highway 12 in the westbound direction. at 101 if you make the trip into santa rosa watch out that it will take a few minutes clean up. over the altamont pass, it is getting busy and 23 minutes gets you from tracy to dublin and 33 miles per hour is the top speed at 2305 meets 580 and 40 miles per hour as you leave the altamont pass and you have clear conditions
the most common form of malware in the clones would secretly force users' computer to call phone numberst charge by the minute. >> watch out. >> we will check with meteorologist mike nicco and it was warm yesterday. >> we will do the same thing today. if you are headed to the alameda county fair get fraud warm sunshine starting at 11 o'clock at 77 and topping out in the mid-80's at 3:00 and at 11 o'clock when we close it will be a cool 60 degrees. the sun will be down...
48
48
tv
eye 48
favorite 0
quote 0
sophisticated malware that was created specially for law enforcement is. right now able to you know side if they inject it on the machine on the mac computer and then after that for the phones the spot forms from paul from droids and so on and so on if they will because next to this infected computers the malware would be you know jumped in these phones and then as you say the short messages e-mails even some functions like a life microphone that would allow a tech is to listen to everything what is going on around the victim will be able to that tell me what can i do to protect myself from these sorts of threats. well so. they're way off infection their fall in this is as i said through the infected computers like laptops and windows oh my base computers so that's why you would definitely need to be protected on these big you know and for me the desktop computers and then plus of course some limits for example i phones i really got the good protection from the able and that's why i talk it's you know these should jailbreak the i phone before inject them m
sophisticated malware that was created specially for law enforcement is. right now able to you know side if they inject it on the machine on the mac computer and then after that for the phones the spot forms from paul from droids and so on and so on if they will because next to this infected computers the malware would be you know jumped in these phones and then as you say the short messages e-mails even some functions like a life microphone that would allow a tech is to listen to everything...
86
86
Jun 4, 2014
06/14
by
BLOOMBERG
tv
eye 86
favorite 0
quote 0
. >> malware west develop to steal millions of dollars but how did this guy stay under the radar? the future of cyber seeds next on "bloomberg west." ♪ >> welcome back to "bloomberg west." federal agents have busted a hacking network that may have cost more than $100 million in losses in the u.s. the network is known as game over bot net. the network spread malware which hackers use to control files and demand a ransom from consumers. the justice department has charged a 30 year old russian as the mastermind. he remains at large. it raises the issue, how do hackers stay under the radar for so long and what does it tell us about other hacking groups that could be hiding? david walt joins us right now. fire eye in the cyber security business. you found the target hack, infamously. has the target changed a lot in the last year? it has. >> if you look at the last couple of years, the types of attackers out there, much like the zoos take down, we are seeing sophistication from russia. a lot of the business organizations and mafia in that market are very aggressive. high-volume, low cre
. >> malware west develop to steal millions of dollars but how did this guy stay under the radar? the future of cyber seeds next on "bloomberg west." ♪ >> welcome back to "bloomberg west." federal agents have busted a hacking network that may have cost more than $100 million in losses in the u.s. the network is known as game over bot net. the network spread malware which hackers use to control files and demand a ransom from consumers. the justice department has...
109
109
Jun 3, 2014
06/14
by
KRON
tv
eye 109
favorite 0
quote 0
the f-b-i says the malware was mainly spread through email or phishing messages.embers of the hacker gang come from russia, ukraine, and the united kingdom. bogachev has been added to the f-b-i's cyber's most wanted list. he's not currently in custody. >> pam:next. >> pam:she was the woman who recorded the conversation that got the clippers owner a lifetime n.b.a. ban. now -- she is apparently been the victim of serious crime. then. then. you got to make every dollar count these days. that's why they have lots of ways for you to save. real big club card deals, the safeway app and gas rewards. this week, large, red seedless grapes are just $1.99 a pound. foster farms fresh whole chickens are only 99 cents a pound. and gatorade is just $3.99 an 8-pack. there's more savings to love... at safeway. ingredients for life. teacher layoffs. and a 60 billion dollar budget deficit. that's what john perez faced when he became speaker of the california assembly. so he partnered with governor brown to pass three balanced budgets, on time. for the first time in thirty years. tod
the f-b-i says the malware was mainly spread through email or phishing messages.embers of the hacker gang come from russia, ukraine, and the united kingdom. bogachev has been added to the f-b-i's cyber's most wanted list. he's not currently in custody. >> pam:next. >> pam:she was the woman who recorded the conversation that got the clippers owner a lifetime n.b.a. ban. now -- she is apparently been the victim of serious crime. then. then. you got to make every dollar count these...
73
73
Jun 10, 2014
06/14
by
FBC
tv
eye 73
favorite 0
quote 0
it is about who is behind the malware.tradecraft and identify the bad things they're requiring to do to your computer. >> george, is it china again? >> it is china again. the reason why we put this report out was specifically because when you looked at the department of justice indictment, of the fab five as i call them, china categorically denied that they were hacking and stealing trade secrets. at crowd check we've been tracking this group since 2012. they have been around since 2007. we see first-hand when we respond to incidents in largest companies in the globe the damage that these groups are causing. and we have so much evidence that we wanted to put this intelligence out into a report. it has been available to our customers. we wanted to put it out for the public to read. liz: we already put this up. i would love to put up the graphic again of some of the very suspicious emails that may come your way. for example there was one about a yoga studio out of france. so when people clicked on it, automatically, what hap
it is about who is behind the malware.tradecraft and identify the bad things they're requiring to do to your computer. >> george, is it china again? >> it is china again. the reason why we put this report out was specifically because when you looked at the department of justice indictment, of the fab five as i call them, china categorically denied that they were hacking and stealing trade secrets. at crowd check we've been tracking this group since 2012. they have been around since...
117
117
Jun 19, 2014
06/14
by
CNBC
tv
eye 117
favorite 0
quote 0
it was deesigned to get into that trading system they say the malware was in place for months. >> on the one hand it is pretty amazing. this was designed to attack the core systems that these folks systems trade. hackers were able to get inside that insurance company and get into the underwriting system and write false insurance plans and cash out those plans and manipulate the interior working operations. that is a new wave of cyber intrusion. john ford is live with blackberry ceo. vote and we'll tally the result ares for you later. >> take it away. thanks for joining us. investors seem to be voting your way today. i want to get right to it here. so tell me, well, thank you john. >> secure messaging systems and we have qnx which is the beginning of the internet of things and then finally we have the network operating center. two years out from now. what are the odds that you are making android phones not just blackberry phones, john? >> can't comment on that. new phones coming out today. and now we solve the application problem. >> the passport phone looks interesting. i want to ask
it was deesigned to get into that trading system they say the malware was in place for months. >> on the one hand it is pretty amazing. this was designed to attack the core systems that these folks systems trade. hackers were able to get inside that insurance company and get into the underwriting system and write false insurance plans and cash out those plans and manipulate the interior working operations. that is a new wave of cyber intrusion. john ford is live with blackberry ceo. vote...
292
292
Jun 3, 2014
06/14
by
KPIX
tv
eye 292
favorite 0
quote 0
prosecutors say the alleged russian cyber-thieve used malware code name "game over zeus" to infect personal computers, steal bank account passwords and transfer cash to his criminal networks. a pennsylvania plastics company lost more than $198,000 dollars and a florida bank was ripped off for nearly $7 million. deputy attorney general james cole. >> security researchers estimate that between 500,000 and one million computers worldwide are infected with game over zeus. >> reporter: bogachev is also accused of running an on-line shakedown scream called cryptolocker. that virus infects computers and encrypts files preventing owners from accessing their own data. victims receive an on screen message saying your personal files are encrypted. the hackers then demand a ransom in exchange for releasing the information. more than 120,000 americans have been victimized by cryptolocker. a north carolina pest control company spent $80,000 trying to restore its damaged files and a massachusetts police department paid a $750 ransom to recover case files and mug shots. prosecutors say they disrupted both
prosecutors say the alleged russian cyber-thieve used malware code name "game over zeus" to infect personal computers, steal bank account passwords and transfer cash to his criminal networks. a pennsylvania plastics company lost more than $198,000 dollars and a florida bank was ripped off for nearly $7 million. deputy attorney general james cole. >> security researchers estimate that between 500,000 and one million computers worldwide are infected with game over zeus. >>...
162
162
Jun 10, 2014
06/14
by
KRON
tv
eye 162
favorite 0
quote 0
swoosh >> reporter:in mobile news >> reporter:a new type of malware found on android devices can takeour mobile photos, videos and documents hostage and hold them for ransom. a trojan called simple shocker is locking user's phones, encrypting their pictures and other content and demanding ransom for restoration. >> reporter:as of now, android users in eastern europe are the main target. let's hope this hack swoosh moving on. >> reporter:the ride-share service uber has teamed up american express to let people pay for uber rides with the credit card reward points. spheresi think this is pretty cool uber rides are expensive. this offers more payment options. good stuff. swoosh >> reporter:and lastly. the idea of a flying car might seem like something out of a science fiction novel, but it may soon become a reality. the vehicle is called " the trasition" it was created by a m i t born company. it can fit in a garage. drive on the road just like ugly but functioning. it's like a transformer >> reporter:upon command the operator can transition it from a car into an airplane. >> reporter:the
swoosh >> reporter:in mobile news >> reporter:a new type of malware found on android devices can takeour mobile photos, videos and documents hostage and hold them for ransom. a trojan called simple shocker is locking user's phones, encrypting their pictures and other content and demanding ransom for restoration. >> reporter:as of now, android users in eastern europe are the main target. let's hope this hack swoosh moving on. >> reporter:the ride-share service uber has...
69
69
Jun 10, 2014
06/14
by
CSPAN3
tv
eye 69
favorite 0
quote 1
we're just beginning to see it with mobile sms forwarding malware. so i think as we kind of look aat ip addressing all over the place. we have to get ahead of that and think about it both from an innovation, effectiveness perspective but baking in as best we can risk mitigation strategies. we're still going to reactively. >> i wanted to touch on the internet of things question there. i try not to get too worked up about the latest threat and all of these trends and prefer to just stand back and study them, but that one is concerning to me kind of going back to your question just by the blend of lots of separate threads sort of converging there. so in the security defense area, i can't say that we've been highly successful yet in sort of defending just a network, like a castle. we haven't fully mastered that yet, and now we're talking about not just defending the castle but the country and then the entire empire spread out everywhere all oufver the place. it's just a different game and the devices can't run all the av and ips and all the things we loa
we're just beginning to see it with mobile sms forwarding malware. so i think as we kind of look aat ip addressing all over the place. we have to get ahead of that and think about it both from an innovation, effectiveness perspective but baking in as best we can risk mitigation strategies. we're still going to reactively. >> i wanted to touch on the internet of things question there. i try not to get too worked up about the latest threat and all of these trends and prefer to just stand...
90
90
Jun 13, 2014
06/14
by
FBC
tv
eye 90
favorite 0
quote 0
these are test runs for their malware.ey tested and fix it trust me it is coming this year. stuart: our guest agrees in says everything is in place for a fire sale of personal information. we have the cl of better qualified. do you agree that since the big one is coming? >> what do you mean? is it a hit across all platforms? >> it could be the infrastructure that we have right now are wide-open things that we don't hear about all the time. to just mention bitcoin there is a new malware that is crypto locker software that in crypts the file and the data in this has already infiltrated utility and water in the bank company's we just work with the large cpa firm that was a victim and they had to pay the hackers with bitcoin. stuart: so what does the big one been? what happens? >> kitty -- all of our data. >> my personal data? >> have been on the year before your information is id 1,000 database is right now and it is a question of when that hawkers have access. stuart: it to be closing down of all systems of wholesale theft o
these are test runs for their malware.ey tested and fix it trust me it is coming this year. stuart: our guest agrees in says everything is in place for a fire sale of personal information. we have the cl of better qualified. do you agree that since the big one is coming? >> what do you mean? is it a hit across all platforms? >> it could be the infrastructure that we have right now are wide-open things that we don't hear about all the time. to just mention bitcoin there is a new...
107
107
Jun 24, 2014
06/14
by
KGO
tv
eye 107
favorite 0
quote 0
risk for having your contact list hacked and your sms messages compromised the report says mobile malwaredevelopers are taking advantage of people's trust in names they recognize. new survey finds less than 25% of us saved for a rainy day. suggesting we save about six months worth of expenses in case of job loss or other unexpected developments in our lives well, the survey by bank rate.com found only 23% of us have that much. those 18-30 years old are most likely to have five months worth of expenses in savings accounts but those 30-49 are the least likely the results are based on a survey of a thousand people and your daily jolt of starbucks coffee is going to cost a bit more the price went up today. bagged coffee sold at grocery stores also going up a dollar. price of food will stay the same. >> thank you. >> sure. >> coming up next, a lot happening at levi stadium in santa clara. security fans will see next season. >> coming up, catching a would be thief redhanded a neighbor ends up getting daysed for it. >> plus, san jose is the largest city in the country, maybe to the for long. wha
risk for having your contact list hacked and your sms messages compromised the report says mobile malwaredevelopers are taking advantage of people's trust in names they recognize. new survey finds less than 25% of us saved for a rainy day. suggesting we save about six months worth of expenses in case of job loss or other unexpected developments in our lives well, the survey by bank rate.com found only 23% of us have that much. those 18-30 years old are most likely to have five months worth of...
85
85
Jun 18, 2014
06/14
by
BLOOMBERG
tv
eye 85
favorite 0
quote 0
are there any challenges the phone is going to face we haven't talked about, security or malware?, not that we know. this is a pork version of android similar to the one on the kindle fire, which is good and bad. from the knowledge standpoint it is no worse off than any other version of android. on the other side, it would mean version,t is a another there'll be fewer apps available. that is a big part of it. in a sense this is just a reaction to steve jobs deciding years ago that he was going to charge a tax on everything sold on the iphone. reaction to bezos' a four-year program. only steve jobs can make jeff bezos this crazy. think steve jobs would say about this phone? >> i think he would be dismissive of it. it doesn't bring a lot to the table and doesn't change the iphone outlook. i think he would be as dismissive as steve jobs gets. >> all right. paul kedrosky, thank you. it is time for the bwest byte. we focus on one number that tells a whole lot. l.a.s with us from what you have today? amazon related. 20 million-ish. never believe numbers in in zero. we don't know how man
are there any challenges the phone is going to face we haven't talked about, security or malware?, not that we know. this is a pork version of android similar to the one on the kindle fire, which is good and bad. from the knowledge standpoint it is no worse off than any other version of android. on the other side, it would mean version,t is a another there'll be fewer apps available. that is a big part of it. in a sense this is just a reaction to steve jobs deciding years ago that he was going...
86
86
Jun 3, 2014
06/14
by
BLOOMBERG
tv
eye 86
favorite 0
quote 0
how did this guy stay under the radar while developing malware? we will also have a very special conversation with goldman sachs ceo lloyd blankfein. we will be talking about entrepreneurship and growing the nation's small businesses. ♪ >> welcome back to bloomberg west. federal agents have busted a hacking network that may have cost more than $100 million in losses in the u.s. it affected over a million computers, putting them in control of hackers in the russia n and ukraine countries. they would take control of files and then demand a ransom from consumers. doraises an issue, how hackers like these guys stand or the radar for so long from and what does this tell us about other hacking groups that could be hiding in the shadows? the targetunde hack. does what we know about target change a lot in the past year? >> it does. if you look at the past couple of years, the types of attackers better out there, there is a lot more sophistication from a lot of new countries like russia. the russian business network, the mafia organizations that are in tha
how did this guy stay under the radar while developing malware? we will also have a very special conversation with goldman sachs ceo lloyd blankfein. we will be talking about entrepreneurship and growing the nation's small businesses. ♪ >> welcome back to bloomberg west. federal agents have busted a hacking network that may have cost more than $100 million in losses in the u.s. it affected over a million computers, putting them in control of hackers in the russia n and ukraine...
51
51
Jun 3, 2014
06/14
by
BLOOMBERG
tv
eye 51
favorite 0
quote 0
the network spread malware which hackers use to control files and demand a ransom from consumers.he justice department has charged a 30 year old russian as the mastermind. he remains at large. it raises the issue, how do hackers stay under the radar for so long and what does it tell us about other hacking groups that could be hiding? david walt joins us right now. fire eye in the cyber security business. hack,und the target infamously. changed a lot in the last year? it has. >> if you look at the last couple of years, the types of attackers out there, much like the zoos take down, we are seeing sophistication from russia. a lot of the business organizations and russia -- mafia in that market are very aggressive. high-volume, low credit card type of activities. we are seeing attacks on debit cards, much like the target examples. a lot of changes happening. >> i have had the theory for the last year that one of the reasons we see so much hacking out of eastern europe is because during the soviet union's existence, the bloc of sending the best of computers over there, the computer ha
the network spread malware which hackers use to control files and demand a ransom from consumers.he justice department has charged a 30 year old russian as the mastermind. he remains at large. it raises the issue, how do hackers stay under the radar for so long and what does it tell us about other hacking groups that could be hiding? david walt joins us right now. fire eye in the cyber security business. hack,und the target infamously. changed a lot in the last year? it has. >> if you...
42
42
Jun 4, 2014
06/14
by
CSPAN
tv
eye 42
favorite 0
quote 0
an example of constructive malware hitting organizations. we have reactions to media. the stock price gets hit right if someone is able to get out there on twitter or something else like that. very much are impactful. those organizations that have the capability to categorize it properly, and then ensure they get the appropriate controls will handle it the best. >> another question from the audience. >> wondering if you can talk about the differences between machine to machine sharing ursus human to human sharing. occurs at different levels, different kinds of sharon's and so forth. one question you asked earlier about the sharing. federal cyber centers have been working for five years on enhancing situation awareness. where it used to be one of them looking at defense, intel and civilian agencies -- they are doing much better together. what they have done is develop information sharing architecture over the past five years. they are now in the development of the standards for data implement for public sea-based access control -- policy-based access control for pushing
an example of constructive malware hitting organizations. we have reactions to media. the stock price gets hit right if someone is able to get out there on twitter or something else like that. very much are impactful. those organizations that have the capability to categorize it properly, and then ensure they get the appropriate controls will handle it the best. >> another question from the audience. >> wondering if you can talk about the differences between machine to machine...
116
116
Jun 10, 2014
06/14
by
CNBC
tv
eye 116
favorite 0
quote 0
designed to get people to click on and insert malware in their systems.86 and identified as being based in shanghai. they have traced back some of these attacks to the individual members of the chinese military. according to crowd strike, they have pulled down some of their social media postings. in the report you see pictures of chinese soldiers attending birthday parties that are posted on their own version of their own facebook-type website in chi china. they're saying these are the actual soldiers committing some of these attacks. a report going much further than what we seen before, melissa. >> thanks for that. to help us trade cyber security let's bring in senior analyst and managing director. ed, great to have you with us. this is a huge topic. we're here at the conference and talking about technology disrupting all sorts of industries. whenever you ininject technology in industries that leaves you open and vulnerable to cyber attacks. what are the best plays in your view? >> splunk is one we like. and fireeye and palo alto and fireeye is good for
designed to get people to click on and insert malware in their systems.86 and identified as being based in shanghai. they have traced back some of these attacks to the individual members of the chinese military. according to crowd strike, they have pulled down some of their social media postings. in the report you see pictures of chinese soldiers attending birthday parties that are posted on their own version of their own facebook-type website in chi china. they're saying these are the actual...
59
59
Jun 7, 2014
06/14
by
CSPAN
tv
eye 59
favorite 0
quote 0
government, as well as provide capability when directed to support others in identifying malware and other challenges associated with defense of their networks. u.s. cyber command brings a very operational capability. teams organized, equipped and spaced to operate in this identify problems on the defensive side as well as a potential offense of peace if we are directed to do so. you bring all that together with partners of the fbi and homeland security and the capabilities that many corporate entities have, i spent some of my time in this job getting to know corporate counterparts in many instances i'm incredibly impressed with the level of effort i see, by the capability those organizations have, and by the willingness to work with others. i sure would like to see us expand that to much broader .egment of industry >> the technology is pretty incredible. you alluded to this. let me ask you about new reports using facial recognition technology to monitor people. how does a program like that work? >> i am not going to get into the specifics in an open forum of what we do. that is my g
government, as well as provide capability when directed to support others in identifying malware and other challenges associated with defense of their networks. u.s. cyber command brings a very operational capability. teams organized, equipped and spaced to operate in this identify problems on the defensive side as well as a potential offense of peace if we are directed to do so. you bring all that together with partners of the fbi and homeland security and the capabilities that many corporate...
67
67
Jun 2, 2014
06/14
by
ALJAZAM
tv
eye 67
favorite 0
quote 0
investigators say they have disrupted the group and identified the malware. >> the first is game over zeus. stealing information. the justice department says it has discovered a couple of viruses. they are thought to have infected 100,000 computers. one belonged to a plastic surgeon, and he paid $500,000 to retreat 30,000 patient files. all we knew is that the internet blackmailers had to be paid in bitcoin or we'd lose the files. the person leading the ring is a russian. he is on the federal bureau of investigation's most wanted list. other pemlers come from russia, ukraine and the u.k. the department of homeland security is the up a website. it's u.s. cert-.gough. the u.s. department disrupted the gang. they are on the loose. the hackers are still out there. >> still out there and at work. >> be ware. >> thank you. >>> the talk among military men and women is focussed on the release of american soldier bowe bergdahl. some question the circumstances surrounding his disappearance. in essence, back with that story. >> it's a tough conversation to have, thinking about a prisoner of war
investigators say they have disrupted the group and identified the malware. >> the first is game over zeus. stealing information. the justice department says it has discovered a couple of viruses. they are thought to have infected 100,000 computers. one belonged to a plastic surgeon, and he paid $500,000 to retreat 30,000 patient files. all we knew is that the internet blackmailers had to be paid in bitcoin or we'd lose the files. the person leading the ring is a russian. he is on the...
91
91
Jun 10, 2014
06/14
by
CSPAN3
tv
eye 91
favorite 0
quote 0
from admiral rogers through its foreign intelligence mission has come into possession of certain malware and other information that is of use to the private sector. that alone people like to say, well, that's not very much or it's not a finite amount of information, it's going to continue to evolve, and that's absolutely true, but what congress needs to be able to do is to try and eliminate the baybay barriers to information sharing. most people have written about the antitrust problems. most of those have been debunked so far, but certainly we need to be able to give liability protection to companies. this is where we had a lot of the controversy in the house of representatives on the legislation that passed twice with bipartisan majorities, by the way, but that was before edward snowden. one of the casualties of edward snowden in addition to the tremendous foreign intelligence loss and the billions of dollars and maybe less confidence in the u.s. intelligence services is that now it's sort of the ghost in the machine. we were just getting to a point where the president was raising cybe
from admiral rogers through its foreign intelligence mission has come into possession of certain malware and other information that is of use to the private sector. that alone people like to say, well, that's not very much or it's not a finite amount of information, it's going to continue to evolve, and that's absolutely true, but what congress needs to be able to do is to try and eliminate the baybay barriers to information sharing. most people have written about the antitrust problems. most...
1,826
1.8K
Jun 3, 2014
06/14
by
KQED
tv
eye 1,826
favorite 0
quote 1
evgenny bogachev allegedly orchestrated a ring that infected thousands of computers with malware to get passwords and account numbers. bogachev is described as one of the world's leading cyber- criminals. he remains at large. the government may be able to force a "new york times" reporter to reveal his sources in a c.i.a. leak case. the supreme court declined today to hear james risen's appeal of a lower court order. his reporting is at the center of criminal charges against jeffrey sterling. the former c.i.a. officer is accused of leaking classified information. on wall street today, the dow jones industrial average gained 26 points to close at 16,743. the nasdaq fell five points to close at 4,237. and the s-and-p 500 added a point, to finish just under 1,925. still to come on the newshour: mounting questions over the deal that freed an american prisoner of war; the white house plan to cut down on carbon pollution; we talk with e.p.a. head gina mccarthy and a representative of the energy industry; plus, what's at stake as voters head to the polls in iowa and mississippi. >> ifill: it's
evgenny bogachev allegedly orchestrated a ring that infected thousands of computers with malware to get passwords and account numbers. bogachev is described as one of the world's leading cyber- criminals. he remains at large. the government may be able to force a "new york times" reporter to reveal his sources in a c.i.a. leak case. the supreme court declined today to hear james risen's appeal of a lower court order. his reporting is at the center of criminal charges against jeffrey...
80
80
Jun 7, 2014
06/14
by
CSPAN
tv
eye 80
favorite 0
quote 0
intellectual property and still turn over the information that's necessary to determine what the piece of malwaref it infected their networks, is it infecting other networks. i was saying that, in the wake of september 11, one of the things we had to do was develop relationships with other partners in order to be successful. principal partners, state and local law enforcement, we could not have been successful without the joint terrorism task forces. in the cyberarena, it's the private sector. we are not going to be successful in get ago head of this kmb without having mechanisms for the sharing of intelligence in the private sector, sharing it amongst the federal agencies, and then having that information shared amongst those two. >> what's your impression of how that's currently working? are private companies sharing enough information? >> episodically. most of it, i would say, is tremendously informal. there has to be a more formal process of sharing in sectors, and thanks to the department of homeland security and particular sectors, there is a growing body of capability of integrating the in
intellectual property and still turn over the information that's necessary to determine what the piece of malwaref it infected their networks, is it infecting other networks. i was saying that, in the wake of september 11, one of the things we had to do was develop relationships with other partners in order to be successful. principal partners, state and local law enforcement, we could not have been successful without the joint terrorism task forces. in the cyberarena, it's the private sector....
445
445
Jun 3, 2014
06/14
by
CNBC
tv
eye 445
favorite 0
quote 0
. >> how much do you worry about malware and viruses?ening up in an eco system. they can transfer data from other apps. do they stay impermeable? >> they are not impermeable. they don't open themselves up to as much risk as android. one of the main ways malware happens, people put out a fake version of an app, download it and it steals your information that way. all of this is still pleased. yes, there may be additional avenues of attack. when you start from a secure point it's easier to stay more secure. where if you start insecure, securing it later is hard. >> thank you now to eric hesseldahl. everyone remembers when steve jobs tried to buy dropbox. what is dropbox exactly? lock locks is where al gore keeps all his millions from his investments. >> a $10 billion company that shares your files and syncs them. >> i have too much stuff in the cloud i don't know what to do. it can't be backed up. what do you need to do? >> you need to pay more. >> right now i'm not backed out. >> make sure they put out the new plan. don't pay too much now
. >> how much do you worry about malware and viruses?ening up in an eco system. they can transfer data from other apps. do they stay impermeable? >> they are not impermeable. they don't open themselves up to as much risk as android. one of the main ways malware happens, people put out a fake version of an app, download it and it steals your information that way. all of this is still pleased. yes, there may be additional avenues of attack. when you start from a secure point it's...
46
46
Jun 3, 2014
06/14
by
CSPAN2
tv
eye 46
favorite 0
quote 0
intellectual property theft to disruptive denial of service attacks to destructive attacks through malware. it's an emerging domain that has moved very rapidly. over the past couple years, we've had destructive attacks against south korea, against saudi arabia and denial of service attacks against the u.s. financial sector as director clapper head clear in his -- made clear in his unclassified annual threat assessment. the likelihood of future destructive attacks is increasing. let's see, all right. there we go, my first test. okay. proliferation and use of wmd, the next issue for us. we continue to have concerns about the iranian and north korean nuclear missile programs. iran has made considerable progress in its ability to enrich and stockpile uranium, and it's continued to work on its missile programs. north korea, as director clapper indicated in his annual threat assessment, we assess is expanding its use, its facility for uranium enrichment and has restarted its graphite-moderated reactor and continues to develop long-range missile programs, most notably the intercontinental kno8 th
intellectual property theft to disruptive denial of service attacks to destructive attacks through malware. it's an emerging domain that has moved very rapidly. over the past couple years, we've had destructive attacks against south korea, against saudi arabia and denial of service attacks against the u.s. financial sector as director clapper head clear in his -- made clear in his unclassified annual threat assessment. the likelihood of future destructive attacks is increasing. let's see, all...
187
187
Jun 3, 2014
06/14
by
KRON
tv
eye 187
favorite 0
quote 0
investigators say hackers used the malware to extract ransom payments from computer owners. it's estimated gameover zeus was responsible for more than 100 million dollars in losses among american victims alone. and this just in. video of protests across spain.calling for king juan carlos to not only step down and hand over the throne to his son.but to dissolve the country's monarchy all-together. the king announced he's abdicating the thrown monday after 40 years. and that his son.crown prince filipe will succeed him. demonstrators took to the streets in madrid at the news.chanting slogans like "the monarchy is garbage". and collecting more than 100-thousand signatures on a petition. the n-t-s-b is investigating a deadly plane crash in bedford, massachusetts. a gulfstream jet carrying seven people crashed on take-off saturday. killing everyone on board. authorities are still trying to figure out what happened. but say they are having trouble accessing the airplane. the airplane landed in a canyon filled with water 2- thousand feet from the runway. the n-t-s-b says the invest
investigators say hackers used the malware to extract ransom payments from computer owners. it's estimated gameover zeus was responsible for more than 100 million dollars in losses among american victims alone. and this just in. video of protests across spain.calling for king juan carlos to not only step down and hand over the throne to his son.but to dissolve the country's monarchy all-together. the king announced he's abdicating the thrown monday after 40 years. and that his son.crown prince...
157
157
Jun 5, 2014
06/14
by
BLOOMBERG
tv
eye 157
favorite 0
quote 0
last week there was a very big piece of of a prolific malware designed to steal financials.ffort focused by the fbi and others. you see a lot of activity coming .ut of iran, south america it is a global problem. i think each country has its own specialty. as an example, russia is probably the best at creating tools to cipher information and money out of peoples accounts. >> this is why i only operate in cash. thank you so much. >> folks, you have heard of apple, no doubt, but have you xiaomi.f shall me -- they are being called the apple of china. >> their phones are about half the price of apple phones in china which is why they are doing so much better than apple in china. this is one of the fastest growing technology companies in the world right now. they did not even exist four years ago. then the founder got together with seven other chinese tech titans, all people who could have been ceos in their own right, all people who could have retired 10 times over, and they got together to form a smart phone company, a company that was trying to crack a very mature market. a lot
last week there was a very big piece of of a prolific malware designed to steal financials.ffort focused by the fbi and others. you see a lot of activity coming .ut of iran, south america it is a global problem. i think each country has its own specialty. as an example, russia is probably the best at creating tools to cipher information and money out of peoples accounts. >> this is why i only operate in cash. thank you so much. >> folks, you have heard of apple, no doubt, but have...
41
41
Jun 4, 2014
06/14
by
CSPAN2
tv
eye 41
favorite 0
quote 0
these plan from property theft to disruptive denial of service attack to destruction attacks through malware that is an emerging domain that has move quickly. we have had disinstru instructor: i proliferation and use of wnd's is the next issue for us. we continue to have concerns about the iranian and north korea missile programs. iran has made progress in the ability to enrich and stock pile urrani urranium, and it is working on missile programs. north korea is expanding it's facilities for uranium, and continues to develop other items that have been displayed publically a few times. i already eluded to this about the voltility in southeast asia and africa that will be with us for a long time to come. this is one of the key enduring challenges i think we face along with a couple others on this slide or on this slide and the previous one. all right. transition in afghanistan. the president announced right before the west point speech that we will maintain 9800 troops in afghanistan and by the end of calendar 2015 we will reduce that in half approximately and consolidate the force on kabul an
these plan from property theft to disruptive denial of service attack to destruction attacks through malware that is an emerging domain that has move quickly. we have had disinstru instructor: i proliferation and use of wnd's is the next issue for us. we continue to have concerns about the iranian and north korea missile programs. iran has made progress in the ability to enrich and stock pile urrani urranium, and it is working on missile programs. north korea is expanding it's facilities for...
116
116
tv
eye 116
favorite 0
quote 0
>> they have been testing all of their malware. target, for example. neiman marcus. are test runs. they run beta software. they test it. they fix it. trust me, it is coming this year. stuart: you come back soon, john. john mcafee, everyone. we have lebron james delivering a solid performance in game two. find out what power it is saying about all of this. getting a last laugh over gatorade, by the way. we will deal with that next. ♪ peace of mind is important when you're running a business. century link provides reliable it services like multi-layered security solution to keep your information safe & secure. century link. your link with what's next. stick with innovation. stick with power. stick with technology. get the flexcare platinum from philips sonicare and save now. philips sonicare stuart: it seems to me recently the older generation of our viewers have been rather harsh on the younger generation is a whole. role it. stuart: amateur sorority called the state department it's even hard to watch. the self absorbed women they send it to represent it cannot be mor
>> they have been testing all of their malware. target, for example. neiman marcus. are test runs. they run beta software. they test it. they fix it. trust me, it is coming this year. stuart: you come back soon, john. john mcafee, everyone. we have lebron james delivering a solid performance in game two. find out what power it is saying about all of this. getting a last laugh over gatorade, by the way. we will deal with that next. ♪ peace of mind is important when you're running a...
176
176
Jun 19, 2014
06/14
by
CNBC
tv
eye 176
favorite 0
quote 0
the malware was in place for months before va systems found it and able to eliminate it. what we don't know here is the name of the hedge fund involved. va systems says they will protect the identity of the client here. we talked to paul, va systems implied intelligence, about the reaction to the brazen attack. >> on the one hand, it's pretty amazing. we have certainly seen incidents where people penetrated hedge fund systems, rooting around for information about trading strategies, but this was the first time we saw someone design software explicitly designed to attack, you know, the core systems that these folks use to trade, ie, the order entry system. >> paul said a few weeks ago they spotted an attack against a large insurance company in which hackers were able to get inside the insurance policy company's underwriting system, generate false insurance coverage for false clients, and then cash claims against those false insurance plans. that's the kind of damage that we're seeing now, and what they describe as a new way of cyber attacks designed to attack the business
the malware was in place for months before va systems found it and able to eliminate it. what we don't know here is the name of the hedge fund involved. va systems says they will protect the identity of the client here. we talked to paul, va systems implied intelligence, about the reaction to the brazen attack. >> on the one hand, it's pretty amazing. we have certainly seen incidents where people penetrated hedge fund systems, rooting around for information about trading strategies, but...
75
75
Jun 24, 2014
06/14
by
CSPAN3
tv
eye 75
favorite 0
quote 0
that cross telecom switches and pull certain things, certain e-mails, certain phone numbers, certain malware signatures, that stuff collects in a year at least 56,000 communications of americans that are completely unrelated or completely innocent. domestic communication, yet they do not consider that bulk collection. the original internet dragnet program was targeted at certain switches where presumably ones that serve the middle east and that wasn't considered bulk collection because they use discriminators, these switches where more potential terrorists traffic will cross. so the current bill ends bulk collection by requiring a specific collection term to be used before you collect anything. it applies to section 215, which is used for the phone dragnet. it applies to pen register, internet dragnet and it applies to national security letters. that's not going to work. and it's not going to work because of the way they define specific collection terms that includes things like entity. al qaeda is an entity. so you could say i'm targeting al qaeda and pick and say what they said in 2004. al
that cross telecom switches and pull certain things, certain e-mails, certain phone numbers, certain malware signatures, that stuff collects in a year at least 56,000 communications of americans that are completely unrelated or completely innocent. domestic communication, yet they do not consider that bulk collection. the original internet dragnet program was targeted at certain switches where presumably ones that serve the middle east and that wasn't considered bulk collection because they use...
75
75
Jun 19, 2014
06/14
by
CSPAN3
tv
eye 75
favorite 0
quote 0
examine behavior, not yesterday's behavior, malware, virus signatures and have a collaborative effort that means if you suffer a threat, i don't need to because you're going to share it with me and vice versa. and frankly, if you could tell nsa and this isn't a government policy, this is just a crazy idea, you could tell nsa i am being vexed by something from a foreign corridor, that might put nsa in a position where it could use its appropriate international abilities to learn more about that and to tee that up for the nation, right, the national apparatus to do something about it. but that exchange doesn't occur freely today, so it's essentially every man for himself and a boat with a huge hole in it and they're saying it's not my hole. it's on your side of the boat. >> that exchange doesn't happen in part business says, because the government is very cautious about what information it is willing to share. and business is quite concerned that if it shares too much with government, the liability that it then faces for customer complaints about sharing their data with somebody outside
examine behavior, not yesterday's behavior, malware, virus signatures and have a collaborative effort that means if you suffer a threat, i don't need to because you're going to share it with me and vice versa. and frankly, if you could tell nsa and this isn't a government policy, this is just a crazy idea, you could tell nsa i am being vexed by something from a foreign corridor, that might put nsa in a position where it could use its appropriate international abilities to learn more about that...
43
43
Jun 6, 2014
06/14
by
CSPAN2
tv
eye 43
favorite 0
quote 0
we're just beginning to see it with the mobile sms-40 malware. so i think as we kind of look at ip addressing all over the place, we have got to try to get ahead of that and think about it both from an innovation, efficiency/effectiveness perspective, but baking in as best we can risk mitigation activities. we're still doing it reactively. >> i just wanted to touch on the internet of things question there. i try not to get too worked up about the latest threat and all of these trends and prefer to just stand back and study them, but that one, that one is concerning to me kind of going back to your question just by the blend of lots of separate threads sort of converging there. so in the security defense area, i can't say that we've been highly successful yet in sort of defending just a network, you know? like our castle. we haven't fully mastered that yet. and thousand we're talking about not just -- now we're talking about not just defending the castle, but the country, and then the entire empire spread out everywhere all over the place, and it'
we're just beginning to see it with the mobile sms-40 malware. so i think as we kind of look at ip addressing all over the place, we have got to try to get ahead of that and think about it both from an innovation, efficiency/effectiveness perspective, but baking in as best we can risk mitigation activities. we're still doing it reactively. >> i just wanted to touch on the internet of things question there. i try not to get too worked up about the latest threat and all of these trends and...