68
68
Feb 4, 2015
02/15
by
ALJAZAM
tv
eye 68
favorite 0
quote 1
sac like 50 types of malware pointed at the energy. what is the serious risk. day. >> we have to live with it. inconvenience. >> when you think of new york city, the blackout. a large scale. this could impact americans and go behind inconvenience. >> health risks, absolutely. >> we are not just talking about the grid, we are talking about pipe lines, nuclear facilities, any and any critical infrastructure. they are seeking inroads. >> when you talk about infrastructure, that razes the other point. how has united states prepared itself. we talk about bridges and roads. front. >> no, we are vulnerable. we don't have regulatory infrastructure in place to demand that utilities tighten security, that is part of the problem. some don't know they have been infected, and remedying the situation is expensive. so it's almost like we are sitting back helplessly waiting for something bad to happen. >> a great vulnerability. thank you >>> next, a conflict in ukraine and the growing concern. our nations top diplomat headed to the region, why the u.s. may provide military aid
sac like 50 types of malware pointed at the energy. what is the serious risk. day. >> we have to live with it. inconvenience. >> when you think of new york city, the blackout. a large scale. this could impact americans and go behind inconvenience. >> health risks, absolutely. >> we are not just talking about the grid, we are talking about pipe lines, nuclear facilities, any and any critical infrastructure. they are seeking inroads. >> when you talk about...
485
485
Feb 16, 2015
02/15
by
KPIX
tv
eye 485
favorite 0
quote 0
hackers send e-mails containing a malware program to bank employees.lls programs that record computer keystrokes and takes screen shots of bank computers. the hackers can then figure out the bank's inner workings and eventually how to remotely control the bank's computers. the hackers can then transfer money or make e-payments into fraudulent bank accounts, or even direct atms to spit out money at whatever time and place they choose. this full report comes out tomorrow but joining us tonight is chris doggett. he is the managing director of kaspersky north america, he joins us from boston. f chris, thank you for being with us. first i want to ask you, how did you discover this? >> well, we first got involved in investigating karbanak when a bank in kiev called us up, they discovered an external connection to a the server in china, which shouldn't be there, and they knew they needed help so we sent in a forensics team. >> that is the malware you are talking about. chris, are american banks involved? >> we think that there may bee american banks involved,
hackers send e-mails containing a malware program to bank employees.lls programs that record computer keystrokes and takes screen shots of bank computers. the hackers can then figure out the bank's inner workings and eventually how to remotely control the bank's computers. the hackers can then transfer money or make e-payments into fraudulent bank accounts, or even direct atms to spit out money at whatever time and place they choose. this full report comes out tomorrow but joining us tonight is...
259
259
Feb 16, 2015
02/15
by
CNNW
tv
eye 259
favorite 0
quote 0
hackers installed spying malware able to mimic bank employee work flows and that malware was used to hack information to transfer money to the thieves' own bank accounts and the attacks are still active as we talk. we'll have more on this threat coming up in about 20 minutes. they'll have to explain to me once again how does this work and how did they let it going on for so long? >> the shooter in the weekend attacks in denmark might have had help. two men accused of helping him hide after his deadly rampage. in one of those attacks a jewish man killed outside a synagogue. now benjamin netanyahu calls on european jews to move to israel. you're driving along, having a perfectly nice day, when out of nowhere a pick-up truck slams into your brand new car. one second it wasn't there and the next second... boom! you've had your first accident. now you have to make your first claim. so you talk to your insurance company and... boom! you're blindsided for a second time. they won't give you enough money to replace your brand new car. don't those people know you're already shaken up? liberty
hackers installed spying malware able to mimic bank employee work flows and that malware was used to hack information to transfer money to the thieves' own bank accounts and the attacks are still active as we talk. we'll have more on this threat coming up in about 20 minutes. they'll have to explain to me once again how does this work and how did they let it going on for so long? >> the shooter in the weekend attacks in denmark might have had help. two men accused of helping him hide...
75
75
Feb 16, 2015
02/15
by
FBC
tv
eye 75
favorite 0
quote 0
and some of that malware i've detected spies on our bank transalaskas.e -- transactions. i'm sure they're going to modify it to spy on our wallets. liz: jim, i've done a lot offing on mobile wallets and mobile payments. >> right. liz: in some cases, it's way safer to use some of these opportunities, so far at least. >> it is. today, you know, you walk up to a point of sale and swipe your credit card. that's 1960s technology, and it actually has your credit card number embedded in that magnetic stripe. and in a mobile payment world, that process gets moved virtually, you know, to the phone. it's a tokennized transaction where your card information is not then exchanged at the point of of sale. liz: ask that's why you're investing in these, because you believe it's the future? >> absolutely. it is the future. the it's going to represent tremendous ease and convenience for consumers, and it's going to be a fantastic opportunity for the biggest brands to have a much more interactive relationship, marketing relationship with it customers. liz: gary, you're no
and some of that malware i've detected spies on our bank transalaskas.e -- transactions. i'm sure they're going to modify it to spy on our wallets. liz: jim, i've done a lot offing on mobile wallets and mobile payments. >> right. liz: in some cases, it's way safer to use some of these opportunities, so far at least. >> it is. today, you know, you walk up to a point of sale and swipe your credit card. that's 1960s technology, and it actually has your credit card number embedded in...
118
118
Feb 24, 2015
02/15
by
CNNW
tv
eye 118
favorite 0
quote 0
some people with android phones need to watch out for malware. hear how turning off your phone could lead to a virus. coming up. i am totally blind. and sometimes i struggle to sleep at night, and stay awake during the day. this is called non-24. learn more by calling 844-824-2424. or visit your24info.com. people with type 2 diabetes come from all walks of life. if you have high blood sugar, ask your doctor about farxiga. it's a different kind of medicine that works by removing some sugar from your body. along with diet and exercise farxiga helps lower blood sugar in adults with type 2 diabetes. with one pill a day, farxiga helps lower your a1c. and, although it's not a weight-loss or blood-pressure drug, farxiga may help you lose weight and may even lower blood pressure when used with certain diabetes medicines. do not take if allergic to farxiga or its ingredients. symptoms of a serious allergic reaction include rash, swelling or difficulty breathing or swallowing. if you have any of these symptoms, stop taking farxiga and seek medical help rig
some people with android phones need to watch out for malware. hear how turning off your phone could lead to a virus. coming up. i am totally blind. and sometimes i struggle to sleep at night, and stay awake during the day. this is called non-24. learn more by calling 844-824-2424. or visit your24info.com. people with type 2 diabetes come from all walks of life. if you have high blood sugar, ask your doctor about farxiga. it's a different kind of medicine that works by removing some sugar from...
60
60
Feb 17, 2015
02/15
by
ALJAZAM
tv
eye 60
favorite 0
quote 1
what is this malware? >> yeah so tony thanks again for having me.his is a very sophisticated attack. basically what happened was -- and i'm going to speak mostly about -- i'm very familiar with what happened to the ukrainian and russia banks, and have seen the report. probably last summer a lot of what we call spear fishing attacks, emailed directed at employees of the bank were coming in and had attachment saying urgent federal mandate. so the employees opened the emails and they were word documents with known vulnerabilities, and had the malware installed. and it executed and let it move throughout the system and it's a remote access malware that allowed them to go in and learn about the environment. so these fraud servers -- i do believe you are right. this seems to be financial gain here. they basically were able to look another the entire architecture of these banks, and learn about where their atm's were where their swift networks were and looking at the video feeds. they sat on this data for about six months really figuring out how to do this
what is this malware? >> yeah so tony thanks again for having me.his is a very sophisticated attack. basically what happened was -- and i'm going to speak mostly about -- i'm very familiar with what happened to the ukrainian and russia banks, and have seen the report. probably last summer a lot of what we call spear fishing attacks, emailed directed at employees of the bank were coming in and had attachment saying urgent federal mandate. so the employees opened the emails and they were...
99
99
Feb 13, 2015
02/15
by
FBC
tv
eye 99
favorite 0
quote 0
there's more mobile malware out there than we've ever seen before. actually the last five years, we've seen an increase of mobile malware by 10,000 percent. we need to appreciate that very few members of society have anti-malware security on their mobile devices. yet they're using them for payment instruments now. highly problematic. all business leaders need to focus on their mobile security strategies and their cloud security strategies. >> we're all working on the weekends through our phone and laptop. great to have all of you. thank you so much. tom, pete, dave, thank you for getting on the phone right after that meeting. we truly appreciate it. let's take a quick look at what's happening with the markets. the s&p hit a new intraday record earlier. the russell 2000 hit a record high. the number to watch for the s&p is 2090. 2090. watch that. we're two points, three points above that at the moment. every second of the show matters. your money is at stake. the closing bell is ringing in 47 minutes. thinking about tackling your wild garden when the
there's more mobile malware out there than we've ever seen before. actually the last five years, we've seen an increase of mobile malware by 10,000 percent. we need to appreciate that very few members of society have anti-malware security on their mobile devices. yet they're using them for payment instruments now. highly problematic. all business leaders need to focus on their mobile security strategies and their cloud security strategies. >> we're all working on the weekends through our...
176
176
Feb 6, 2015
02/15
by
KQED
tv
eye 176
favorite 0
quote 0
the malware is becoming much more advanced.t just takes one vulnerability to be able to bypass those traditional perimeter defenses the fire walls and the log-in and the intrusion detection to get into the heart of these systems. once they're in there it's too late. the information can be stolen, monetized and we see victims as we've seen today. >> well, that's certainly got a lot of people's attention. mark bower with voltage security, we thank you. >> thank you very much. >> ifill: now, economics correspondent paul solman examines how viral music videos, television interviews, and good looks can boost a company's stock price. it's part of our ongoing reporting "making sense," which airs every thursday on the newshour. >> reporter: pop quizz. what do the following have in common? the 2012 hyper-viral video sensation, "gangnam style." the hottest, sexiest c.e.o.'s alive. the 2013 nobel prize in economics. to help answer that question, and a deeper one about the rationality of the stock market we went to the recent meeting of th
the malware is becoming much more advanced.t just takes one vulnerability to be able to bypass those traditional perimeter defenses the fire walls and the log-in and the intrusion detection to get into the heart of these systems. once they're in there it's too late. the information can be stolen, monetized and we see victims as we've seen today. >> well, that's certainly got a lot of people's attention. mark bower with voltage security, we thank you. >> thank you very much. >>...
141
141
Feb 17, 2015
02/15
by
KNTV
tv
eye 141
favorite 0
quote 0
the other thing we're watching, kapersky detected malware in hard drives and other computer components manufactured by a variety of companies placed there by a third party. the kind of malware that can supply on a computer right in the software dna below the operating system. kapersky, a russian firm, says it's one of the most sophisticated software malware it's seen and doesn't point fingers as a policy. it says it's similar to stuxnet used to destroy iran's nuclear centrifuges. nobody is claiming responsibility for that, but i think you can do the math to figure out who it may have been. >> some world superpower possibly. >> with three letters. >> thank you very much, scott. 6:57. >>> a final check of the day's top stories. the justice department will appeal a federal judge's ruling blocking president obama's executive order on immigration. the ruling means the first part of the president's order set to begin this week cannot go into effect. >>> bay area nurses are going to rally in sacramento today to save six hospitals operated by daughters of charity health system. they're slated
the other thing we're watching, kapersky detected malware in hard drives and other computer components manufactured by a variety of companies placed there by a third party. the kind of malware that can supply on a computer right in the software dna below the operating system. kapersky, a russian firm, says it's one of the most sophisticated software malware it's seen and doesn't point fingers as a policy. it says it's similar to stuxnet used to destroy iran's nuclear centrifuges. nobody is...
65
65
Feb 15, 2015
02/15
by
BLOOMBERG
tv
eye 65
favorite 0
quote 0
a new report says millions were , toen, including malware order atms to hand out cash. come from china, russia, ukraine, and parts of europe. haverime minister will surgery today after being diagnosed with prostate cancer. the 63-year-old will be on medical leave all weekend. he is expected to make a full recovery. we had lymphoma in mind -- he previously had lymphoma in 1992 but was cleared after treatment as.told u.s. was revealed hsbc has issued an apology over allegations it helped clients evade taxes. let's bring in yvonne man. full-page ad in several business newspapers. what do they say? >> it was pretty lengthy. they assure customers that the private bank has been completely overhauled since 2008 when these allegations surfaced. he said he had absolutely no appetite to do business with clients who were evading taxes. has come under, fire after this report by the international consortium of investigative journalists this month. they show details of how the unit handle tax evasion and accounts for criminals as well. madeys they have fundamental changes in the way
a new report says millions were , toen, including malware order atms to hand out cash. come from china, russia, ukraine, and parts of europe. haverime minister will surgery today after being diagnosed with prostate cancer. the 63-year-old will be on medical leave all weekend. he is expected to make a full recovery. we had lymphoma in mind -- he previously had lymphoma in 1992 but was cleared after treatment as.told u.s. was revealed hsbc has issued an apology over allegations it helped clients...
34
34
Feb 11, 2015
02/15
by
CSPAN2
tv
eye 34
favorite 0
quote 0
the black market for malware is growing. please do not tell us precisely what you are doing about it because people will work around that but can you ensure is that you were doing all the right things in finding and getting rid of the exploits in the malware that is available for sale for cheap on the black-market? >> as you said this is something we are very focused on. this hacker for higher approach are the criminal networks that can and are behind a lot of this malicious cyber activity is something we are very focused on and it's not something people should be addressing. >> we will take to last questions together together because we are out of time. one is back there, the blue shirt. stand up. >> thanks. forbes.com today as saying its web site was hacked by apparently chinese hackers who are targeting financial services firm of forbes.com as well as u.s. defense contractors. what can you tell us about that particular event in the mite of done it in the technique of hitting third-party web sites with an eye towards captu
the black market for malware is growing. please do not tell us precisely what you are doing about it because people will work around that but can you ensure is that you were doing all the right things in finding and getting rid of the exploits in the malware that is available for sale for cheap on the black-market? >> as you said this is something we are very focused on. this hacker for higher approach are the criminal networks that can and are behind a lot of this malicious cyber...
77
77
Feb 4, 2015
02/15
by
ALJAZAM
tv
eye 77
favorite 0
quote 0
a type of malware that has innovated some of america's most critical infrastructure. >> the only way you break into this is figure out how it works so you mighted? use it to do what? to bring down the electricity grid. >> it's dubbed black energy. he's a virus huntish who has been tracking the threat. when he unleashed it inside of his portable lab he found that black energy could be remotely programmed to evolve from espionage to sabotage. >> the concerning aspect about this malware, it's modular in nature. you can take a piece of destructive code and introduce it into black energy, and use it to be destructive. >> it seems to be geared more to taking over the control of the system, and directing it to get information from it. >> which is a much more frightening thing. >> yes, it is. >> jen we'dman she hunts down hackers, who is level of sophistication is like an adversary of the u.s. >> how can you be sure these are russians? >> they are used by the underground, and they have been developed by russians in the criminal underground. and there's some sort of nexus to russia. >> no for
a type of malware that has innovated some of america's most critical infrastructure. >> the only way you break into this is figure out how it works so you mighted? use it to do what? to bring down the electricity grid. >> it's dubbed black energy. he's a virus huntish who has been tracking the threat. when he unleashed it inside of his portable lab he found that black energy could be remotely programmed to evolve from espionage to sabotage. >> the concerning aspect about this...
142
142
Feb 16, 2015
02/15
by
BLOOMBERG
tv
eye 142
favorite 0
quote 0
hackers sophisticated late inserted -- sophisticatedly inserted into the computer networks with a malware, which allowed them to go from the desktop on one particular employee into the network, infect the network, which allow them to control surveillance cameras, which allowed them overtime to watch and then mimic bank transactions. they transferred money out of the system upwards of $10 million per attack. there were other cases where atms at banks were programmed to dispense money at a particular our that somebody would be there -- paricular hour -- particular hour that somebody would be there at that time. these transfers are relatively large. >> a high level internet security conference taking place at stanford university. >> that is why it is so amazing these kinds of things can still happen. what was interesting, it didn't matter what software or what networks the banks ran. these heisters were able to go in and penetrate them. the cyber security summit hosted by stanford university is kind of trying to bring the government and the private sector together on the same page. there hav
hackers sophisticated late inserted -- sophisticatedly inserted into the computer networks with a malware, which allowed them to go from the desktop on one particular employee into the network, infect the network, which allow them to control surveillance cameras, which allowed them overtime to watch and then mimic bank transactions. they transferred money out of the system upwards of $10 million per attack. there were other cases where atms at banks were programmed to dispense money at a...
467
467
Feb 17, 2015
02/15
by
KNTV
tv
eye 467
favorite 0
quote 0
wanted to rob innocent looking emails when a bank employee clicked on the attachment it launched malware snooping on for the administrator. the criminals took a random account say one with $1,000 in it changed the balance to 10,000 then took 9,000 out doing it all by remote control like a scene in a hollywood movie. they would remotely instruct it to dispense the big pile of money. some banks targeted were in the u.s., the company won't name names. most were overseas. individual bank customers aren't out any money. their accounts are insured. as for the cyber robber so far they have gotten away with it. pete williams, nbc news washington. >> turning office where isis has spread its wave of terror to a new front libya. releasing a chilling video of christians executed in a mass beheading. now isis is threatening to go even further. we get more from our chief foreign affairs correspondent, andrea mitchell. >> reporter: 21 coptic christians marched along the waterfront before being beheaded. among thousands of egyptian migrants unable to find houses. egypt scrambled f-16s to retaliate. the
wanted to rob innocent looking emails when a bank employee clicked on the attachment it launched malware snooping on for the administrator. the criminals took a random account say one with $1,000 in it changed the balance to 10,000 then took 9,000 out doing it all by remote control like a scene in a hollywood movie. they would remotely instruct it to dispense the big pile of money. some banks targeted were in the u.s., the company won't name names. most were overseas. individual bank customers...
74
74
Feb 17, 2015
02/15
by
WJLA
tv
eye 74
favorite 0
quote 0
security experts say it's designed to place malware into your computer. >> as john matteris shows us be careful before clicking on an attachment so you don't waste your money. >> many people in the d.c. area have been receiving unexpected e-mails lately. from blue cross to agencies like the i.r. s., even the court system. some of them are downright frightening so we have the warning signs that an e-mail may be nothing more than a scam. that you should simply delete. >> big notice here in court. >> jen mire opened up her e-mail to see a frightening notice awaiting her. >> it said she had been accused of illegal downloading and needed to appear in court. >> what did i do? illegal software. i was starting to panic a little bit. >> the e-mail told her to open an attachment to learn more. >> they all had on the bottom please open this. read over. >> clerks and attorneys in general around the country are warning about this newest e-mail scam designed to place malware into your computer. it's the latest in a series of scareware e-mail scams often containing viruses or looking for your socia
security experts say it's designed to place malware into your computer. >> as john matteris shows us be careful before clicking on an attachment so you don't waste your money. >> many people in the d.c. area have been receiving unexpected e-mails lately. from blue cross to agencies like the i.r. s., even the court system. some of them are downright frightening so we have the warning signs that an e-mail may be nothing more than a scam. that you should simply delete. >> big...
94
94
Feb 16, 2015
02/15
by
BBCAMERICA
tv
eye 94
favorite 0
quote 0
of fireeye, a company that specializes in cybersecurity and protecting applications from advanced malware. is this right, do you think? is a group like this capable of stealing $1 billion u.s. in that period of time? >> well i believe so, yes. fire fire fireeye now follows hundreds of groups, threat actors, cybercriminal groups who perpetrate this kind of crime on a global base. the timing of the information is also consistent with our own experience with research that says that these attacks typically exist in an undetected, in an organization's network for over 228 days. >> how is this done though? is it targeting customers or is it targeting people who work for these banks and then mimicking their actions to withdraw funds and siphon them off? >> in this particular case they're targeting employees of the organizations. they do so through what's called a sphere phishing attack which is a precise approach to an individual, made easier by the fact that we're moving our lives online through social media. whether it be business social media tours or private. so these individuals are able to
of fireeye, a company that specializes in cybersecurity and protecting applications from advanced malware. is this right, do you think? is a group like this capable of stealing $1 billion u.s. in that period of time? >> well i believe so, yes. fire fire fireeye now follows hundreds of groups, threat actors, cybercriminal groups who perpetrate this kind of crime on a global base. the timing of the information is also consistent with our own experience with research that says that these...
59
59
Feb 14, 2015
02/15
by
CSPAN
tv
eye 59
favorite 0
quote 0
jane: the market for malware is a growing please do not tell us precisely what you are doing about it, because then people work around it, but can you assure us that you are doing all of the right things in a finding and getting rid of the exploits and the malware that is available for sale for cheap on the black market? lisa: as you said, this is something that we are very focused on, and the hacker for hire, the criminal networks that can and are behind a lot of these malicious cyber activities is something that we are very focused on, and is not something people should be underestimated. jane: we are going to take to last questions together because we are out of time. the one is back there in the blue shirt with your hand up wherever you are. amon: high thanks, i am amon jab bers with nbc, i heard that readers of kforce.com and u.s. defense contractors were hacked, and what can you tell us about that particular incident and hitting third-party residents with an eye towards capturing the eyeballs going towards that website. jane: and we will hold an answer for the question the front
jane: the market for malware is a growing please do not tell us precisely what you are doing about it, because then people work around it, but can you assure us that you are doing all of the right things in a finding and getting rid of the exploits and the malware that is available for sale for cheap on the black market? lisa: as you said, this is something that we are very focused on, and the hacker for hire, the criminal networks that can and are behind a lot of these malicious cyber...
54
54
Feb 16, 2015
02/15
by
KTVU
tv
eye 54
favorite 0
quote 0
the person who opens the attachment thinking it is from a coworker, unknowing ily releases malware into the system and that will record key stokes, and bank info back to the hackers and the hackers would steal the money. the report said they would limit their theft to $10 billion. they say this has been going on since 2013 because of nondisclosure agreements none of the banks have been named. the report indicates at least three dozen banks in the u.s. were targeted. the report comes on the heels of president obama's business to stanford about i've-- cybersecurity. he signed and order. as for the hackers in this case, the hackers are well- coordinated and very hard to track. >> they would change a balance in your account. your account would have $100,000 and they would then up that amount to a million dollars and then transfer the $900,000 out. >> experts also say the attacks are unusual because they target banks themselves and not individualious commerce. the report says the hackers would transfer money to fake accounts in the u.s. and china. and other times the hackers could program at
the person who opens the attachment thinking it is from a coworker, unknowing ily releases malware into the system and that will record key stokes, and bank info back to the hackers and the hackers would steal the money. the report said they would limit their theft to $10 billion. they say this has been going on since 2013 because of nondisclosure agreements none of the banks have been named. the report indicates at least three dozen banks in the u.s. were targeted. the report comes on the...
108
108
Feb 18, 2015
02/15
by
KYW
tv
eye 108
favorite 0
quote 0
as the source of the malware but it says one program similar to one reportedly developed fwi u.s. disrupted iranian nuclear facilities. >>> authorities don't know why a train was killing cars. as many as 28 tankers carried thousands of gallons of oil jumped the tracks. more than 100 residents were evacuated after losing their drinking water and electricity. there were no serious injuries. >>> this morning lawyers will mount a defense. on tuesday it rested its case against eddie ray routh. manuel bojorquez reports. >> reporter: this is the video showing eddie ray routh arrested. the jurors heard as routh told police i've been so pair noild and schizophrenic all day. i don't know what to think of the world right now. i don't know if i'm sane or insachblt officer flav owe salazar he was behind the wheel. he told jurors i noticed whenever there was a crowd around or people talking to him, he seemed to be distraught. but whenever we closed doors he seemed to be laid back and relaxed. at one point routh laid down. just hours before he had shot and killed navy s.e.a.l. chris kyle, who wa
as the source of the malware but it says one program similar to one reportedly developed fwi u.s. disrupted iranian nuclear facilities. >>> authorities don't know why a train was killing cars. as many as 28 tankers carried thousands of gallons of oil jumped the tracks. more than 100 residents were evacuated after losing their drinking water and electricity. there were no serious injuries. >>> this morning lawyers will mount a defense. on tuesday it rested its case against...
92
92
Feb 16, 2015
02/15
by
KTVU
tv
eye 92
favorite 0
quote 0
the malware can record key strokes and send back attackers camera still shots or video of how key bank employees would make money transfers. hackers would follow the same procedures so it would look like nothing was unusual. hackers would limit their theft to $10 million before moving onto noer bank. report said this has been going on since 2013. and because of nondisclosure agreements, the banks were not named. the report comes on the heels of president obama's visit to stanford talking about cybersecurity. he signed an order on sharing cyber threats. the president says internet security remains a top priority. >> when consumers share their information with companies they desoifn to know it will be protected -- deserve to mow it to know it -- to know it it is protected. >> the report says the hackers would transfer money to fake accounts in the u.s. and china and other times, the hackers could access atms to dispense cash for others to pick up. according to the report, most of the banks targeted are in russia, the u.s., germany and china and the ukraine. >> very interesting. >> brian
the malware can record key strokes and send back attackers camera still shots or video of how key bank employees would make money transfers. hackers would follow the same procedures so it would look like nothing was unusual. hackers would limit their theft to $10 million before moving onto noer bank. report said this has been going on since 2013. and because of nondisclosure agreements, the banks were not named. the report comes on the heels of president obama's visit to stanford talking about...
121
121
Feb 10, 2015
02/15
by
KTVU
tv
eye 121
favorite 0
quote 0
it may be tasked with communicating about new viruses and malware with businesses. and president obama will be in the bay area this friday to attend a summit on cybersecurity at stanford university. today we learned apple's ceo tim cook will be at the summit. hackers were able to hack celebrity slubts' nude photos from the accounts. >>> a fire that shut down a 4- hour safeway in san rafael does not appear suspicious. the fire started around 11:30 in a trailer in the back loading dock of the supermarket. the fire department tweeted out the photos and say it appears a diesel motor sparked the fire. crews were able to keep the flames from spreading in the store. the store was closed for six hours while the smoke dissipated. >>> police in sunnyvale are searching for a suspected car thief who they say tried to hit an officer with his car. it started when a sclafer police officer in an unmarked suv along with another officer tried to pull ovaller a white mercedes in sunnyvale around 6:00 p.m. that car matched the description of one involved in several car burglaries nearb
it may be tasked with communicating about new viruses and malware with businesses. and president obama will be in the bay area this friday to attend a summit on cybersecurity at stanford university. today we learned apple's ceo tim cook will be at the summit. hackers were able to hack celebrity slubts' nude photos from the accounts. >>> a fire that shut down a 4- hour safeway in san rafael does not appear suspicious. the fire started around 11:30 in a trailer in the back loading dock...
55
55
Feb 8, 2015
02/15
by
CSPAN2
tv
eye 55
favorite 0
quote 0
so in the past we would see malware that would steal passwords and credit card numbers but we've never seemed something designed to physically destroy a century leap out of the digital world into the physical realm and have kinetic activity. that was the first thing that made stuxnet unique. other than that it was sophisticated. it was designed to increase and slow the speed of the centrifuges. while it was doing that it also did this remarkable trick which was to make the operators of the plant think that the operations were perfectly normal for so what it did was it recorded normal activity on the computers first and then a playback that normal activity to the monitoring machines when stuxnet was actually going to sabotage. that was something remarkable about it. one more thing was that stuxnet used what are called zero days, five and zero days to spread. is a vulnerability that is unknown to the software vendor so, therefore, no path exists. zero days didn't be fairly rare and they are also time-consuming and expensive to find for the vulnerabilities and also develop exploits for th
so in the past we would see malware that would steal passwords and credit card numbers but we've never seemed something designed to physically destroy a century leap out of the digital world into the physical realm and have kinetic activity. that was the first thing that made stuxnet unique. other than that it was sophisticated. it was designed to increase and slow the speed of the centrifuges. while it was doing that it also did this remarkable trick which was to make the operators of the...
44
44
Feb 13, 2015
02/15
by
ALJAZAM
tv
eye 44
favorite 0
quote 0
whether it's phishing or bot nets spyware, malware, and now ransomware.e have got to be as fast and flexible and nimble in constantly evolving our defenses. and fourth and most importantly, in all of our work we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we have pursued important rereforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector wrestles with this as well. when consumers share their personal information with companies, they deserve to know that it is going to be protected. when government and industry share information about cyber threats, we have got to do so in a way that safeguards your personal information. when people go online we shouldn't have to forfeit the basic privacy we are entitled to as americans. in recent years we have worked to put these principles into practice. and we have boosted our defenses in government we're sharing more information with the private sector to help th
whether it's phishing or bot nets spyware, malware, and now ransomware.e have got to be as fast and flexible and nimble in constantly evolving our defenses. and fourth and most importantly, in all of our work we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we have pursued important rereforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector...
74
74
Feb 17, 2015
02/15
by
CSPAN3
tv
eye 74
favorite 0
quote 0
whether it's phishing or botnets, spy ware or malware and now ransom ware, these attacks are getting more and more sophisticated every day. so we've got to be just as fast and flexible and nimble and constantly evolving our defenses. and fourth and most importantly in all our work, we have to make sure we are protecting the privacy and civil liberties of the american people. we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector on wrestles with this as well. when consumers share their personal information with companies, they deserve to know that it's going to be protected. when government and industry share information about cyber threats we've got to do so in a way that safeguards your personal information. when people go online, we shouldn't have to forfeit the basic privacy we're entitled to as americans. in recent years we've worked to put these principles into practice. and as part of our comprehensive strategy, we boosted our defenses in governme
whether it's phishing or botnets, spy ware or malware and now ransom ware, these attacks are getting more and more sophisticated every day. so we've got to be just as fast and flexible and nimble and constantly evolving our defenses. and fourth and most importantly in all our work, we have to make sure we are protecting the privacy and civil liberties of the american people. we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy...
101
101
tv
eye 101
favorite 0
quote 0
. >> reporter: sources tell cbs news this attack involved custom malware and sources also say the f.b.i. is looking into the possibility of attack came from overseas, possibly china. >> pelley: kris van cleave with the news tonight. kris, thank you very much. we were surprised to see this today, the eight biggest hack attacks ever in the united states have all occurred in the last two years. jeff pegues now on the cyber crime wave. >> reporter: as this map from cyber-security firm fire eyes shows, every second there is a cyber crime attempt somewhere in the world. the the anthem attack is the latest in a string of cyber assaults on large corporations. sony target, neiman marcus, e-bay, home depot, and j.p.morgan chase are among the companies who have had employee and customer data stolen. some of those data include credit and debit card information and social security numbers. in just those cases alone, more than 300 million people may have been affected, and the breaches could lead to financial losses and identity theft. the average annual cost of cyber crime to a u.s. organization is
. >> reporter: sources tell cbs news this attack involved custom malware and sources also say the f.b.i. is looking into the possibility of attack came from overseas, possibly china. >> pelley: kris van cleave with the news tonight. kris, thank you very much. we were surprised to see this today, the eight biggest hack attacks ever in the united states have all occurred in the last two years. jeff pegues now on the cyber crime wave. >> reporter: as this map from cyber-security...
37
37
Feb 16, 2015
02/15
by
KYW
tv
eye 37
favorite 0
quote 0
the hackers injected malware into more than 100 banks and 30 countries starting back in 2013, then used to steel money a little at a time. in some cases they even programmed atm's to spit out cash at specific intervals. no word yet on which banks were hit. >>> well, before you walk out the door, we want to update today's stories including the latest on breaking news, fire burning in west fell. >> i also talk about the will to finish. that will runner crawls across the finish line. hear her inspirational story that is now going viral. also: >> ♪ ♪ happy birthday ♪ ♪ >> it is a star studded tribute to stevie wonder. i want to take you behind the scenes of tonight's big special. meet the philly native helped create stevie wonder's legendary music. be right back. >> ♪ ♪ compromise? middle ground? does it really look like we're holding anything back? longhorn's dinner for two for $29.99. choose two of 7 entrees. like the grilled portabella sirloin or the parmesan crusted chicken. plus two sides, two salads & a shared appetizer or a dessert. it's a deal without a single concession. longhorn s
the hackers injected malware into more than 100 banks and 30 countries starting back in 2013, then used to steel money a little at a time. in some cases they even programmed atm's to spit out cash at specific intervals. no word yet on which banks were hit. >>> well, before you walk out the door, we want to update today's stories including the latest on breaking news, fire burning in west fell. >> i also talk about the will to finish. that will runner crawls across the finish...
42
42
Feb 6, 2015
02/15
by
BLOOMBERG
tv
eye 42
favorite 0
quote 0
and the picture is laced with malware. the attacker has the ability to cover my cell phone and the computer. >> were they after a specific battle plan? >> that was the core of their report. everything from munition lists and weaponry to went to bring stretches down to the battlefield down to humanitarian information, and of course the conversations that are really the key military intelligence. what supply route to they need to look at? it changes the dynamics of the conflict. >> it is incredible it is actually happening. we really appreciate it, what it -- what an amazing story. twitter has not figured out how to answer the problems of user growth of the company's cofounders are sending tweets in support of the ceo. what are -- what is the story of the really interesting quarterly results? that story is next on "bloomberg west." ♪ month -- >> the video is incredible, showing the plane just after takeoff. one engine wasn't working and maybe they shut down the other engine. pilots undergo new training. 35 people were killed
and the picture is laced with malware. the attacker has the ability to cover my cell phone and the computer. >> were they after a specific battle plan? >> that was the core of their report. everything from munition lists and weaponry to went to bring stretches down to the battlefield down to humanitarian information, and of course the conversations that are really the key military intelligence. what supply route to they need to look at? it changes the dynamics of the conflict....
166
166
Feb 16, 2015
02/15
by
BLOOMBERG
tv
eye 166
favorite 0
quote 0
they put in malware and it takes control of employees and transferring funds. they mimic the actions and it is upwards of $10 million a raid. they are able to control atms and distribute money to a thief standing there at a particular time of the day. this is sophisticated. >> incredible. let's get back to the markets. david is here. >> i am watching the composite. there is little to trade on with the exception of the data. that is what you have. it has been around here and there. i think this quote sums it up well. he says there is relatively little activity in the market and the market is less efficient and unpredictable as we move towards the holiday. that is what we have. the volume is quite light. let's show you what is moving things. oil and gas turned upside down. the prices are lower in financials and limit the game. i will leave it there. >> is apple about to transform itself into an automaker? they may have tesla in their sites. profits are surging over 180%. asia edge returns. >> the minister starts his day on the job after being sworn in before tens
they put in malware and it takes control of employees and transferring funds. they mimic the actions and it is upwards of $10 million a raid. they are able to control atms and distribute money to a thief standing there at a particular time of the day. this is sophisticated. >> incredible. let's get back to the markets. david is here. >> i am watching the composite. there is little to trade on with the exception of the data. that is what you have. it has been around here and there. i...
279
279
Feb 6, 2015
02/15
by
WUSA
tv
eye 279
favorite 0
quote 0
. >> custom malware has been used in state-sponsored attacks. security analysts say the street value of a health record is 20 to 40 times higher than that of a credit card. >> i was spending all my free time trying to stay ahead of the perpetrators. >> william luts has been trying to battle the thieves. he said it was stolen when hackers broke into his medical provider's database last year. >> there would be a couple of days and a credit card would have to be changed because they figured out my password. >> now others could be subject to the same kind of nightmare. the company believes a sophisticated group compromised records. >> there's an arms race going on between cyber criminals and those of us in the medical industry. >> reporter: last year 42 cyber attacks compares to five in 2010 prompting fbi to issue two warnings to the medical sector in 2014. also they'll pay more for personal health information sometimes called phi. >> credit cards could be for $5 where health records could go for $60 to $70 per record. >> this type of data can't be
. >> custom malware has been used in state-sponsored attacks. security analysts say the street value of a health record is 20 to 40 times higher than that of a credit card. >> i was spending all my free time trying to stay ahead of the perpetrators. >> william luts has been trying to battle the thieves. he said it was stolen when hackers broke into his medical provider's database last year. >> there would be a couple of days and a credit card would have to be changed...
249
249
Feb 17, 2015
02/15
by
BLOOMBERG
tv
eye 249
favorite 0
quote 0
if you look at where most of the malware is based, they found in places that were targets of the nsafghanistan, yemen, places where al qaeda is operating. but all over the world and places that have been targets of the u.s. government, you see these attacks again. everything the equation group is doing is similar to the nsa. >> i know you will be keeping your eye on it. cory johnson with us from san francisco. >> "market makers" will be back in just a moment. ♪ >> welcome back. i'm alix steel. we want to look at the action out of europe -- not a lot of panic in the market. we see the euro continuing to climb today. extending three weekly gains. we are seeing a little panic out of the athens bank index and a index, but both of them are off their session lows, sort of hearing their losses. the grease index fell most among 18 western european markets. a quick look on the yield -- the german yield is rising slightly. the greek 10 year about 10%. more "market makers" after the break. ♪ >> live from bloomberg headquarters in new york, this is "market makers" with erik schatzker and stephan
if you look at where most of the malware is based, they found in places that were targets of the nsafghanistan, yemen, places where al qaeda is operating. but all over the world and places that have been targets of the u.s. government, you see these attacks again. everything the equation group is doing is similar to the nsa. >> i know you will be keeping your eye on it. cory johnson with us from san francisco. >> "market makers" will be back in just a moment. ♪ >>...
155
155
Feb 20, 2015
02/15
by
CNBC
tv
eye 155
favorite 0
quote 0
. >>> coming up next we're going to talk about malware that attacks your phone.l. is it crazy that your soccer trophy is talking to you right now? it kinda is. it's as crazy as you not rolling over your old 401k. cue the horns... just harness the confidence it took you to win me and call td ameritrade's rollover consultants. they'll help with the hassle by guiding you through the whole process step by step. and they'll even call your old provider. it's easy. even she could do it. whatever, janet. for all the confidence you need td ameritrade. you got this. these days, the most important person in your business could be a software developer. so, how's the app coming? we've got to make something great. how's the app coming? we've got to do it fast. let's do this on bluemix. you can build apps with analytics, big data, even ibm watson. that could give us the edge. let's do this on bluemix. it can provide code for you. we could be first to market. because being best is priority one. being first is priority one. there's a new way to work and it's made with ibm. doug,
. >>> coming up next we're going to talk about malware that attacks your phone.l. is it crazy that your soccer trophy is talking to you right now? it kinda is. it's as crazy as you not rolling over your old 401k. cue the horns... just harness the confidence it took you to win me and call td ameritrade's rollover consultants. they'll help with the hassle by guiding you through the whole process step by step. and they'll even call your old provider. it's easy. even she could do it....
55
55
Feb 6, 2015
02/15
by
BLOOMBERG
tv
eye 55
favorite 0
quote 0
that picture is laced with malware. then the attacker has the ability to compromise the phone, the computer and the military battle plan behind it. >> they were after specific battle plans? can you do -- when you do your post-threat assessmenttell? >> that is the core of our report. when to bring the stretcher bearers to a battlefield down to humanitarian information, and then of course the conversations that are the key military intelligence, how do you plan a battle, where are we going next, what supply route do we need to look at. the core was military details that would thwart and change the dynamics of the conflict. >> i would say it's right out of a spy novel. fireeye threat intelligence manager, we really appreciate it. amazing story. twitter has not figured out how to answer the question of user growth, but the company posco founders are defending managers. what is the real story behind twitter and it's really interesting quarterly results? we will have that story next. ♪ >> this is "bloomberg west." time for a
that picture is laced with malware. then the attacker has the ability to compromise the phone, the computer and the military battle plan behind it. >> they were after specific battle plans? can you do -- when you do your post-threat assessmenttell? >> that is the core of our report. when to bring the stretcher bearers to a battlefield down to humanitarian information, and then of course the conversations that are the key military intelligence, how do you plan a battle, where are we...
89
89
Feb 11, 2015
02/15
by
FBC
tv
eye 89
favorite 0
quote 0
they targeted it by planting through that link malware on your computer.ed to be in china. they could be watching what you're reading and what you're looking at on the internet. >> they cleaned it up, i think. >> they cleaned it up, but that doesn't mean the malware is not on your computer. forbes is a big news organization. i was an editor there. so it's pretty interesting that the hackers are now going after news organizations because of the big readership. stuart: there isn't a day that goes by without a big hack story. in 2008, hillary clinton makes comments about coming under sniper fire during a visit to bosnia. listen to this. >> i remember landing under sniper fire. there was supposed to be some kind of a greeting ceremony at the airport but we ran with our heads down to get to the vehicles to get to our base. >> however, video of your arrival. tells a different story. she was greeted by journalists. she walked calmly across the runway. no sign of sniper fire. later, she said she had misspoke when she first told the story. liz, does hillary clinton
they targeted it by planting through that link malware on your computer.ed to be in china. they could be watching what you're reading and what you're looking at on the internet. >> they cleaned it up, i think. >> they cleaned it up, but that doesn't mean the malware is not on your computer. forbes is a big news organization. i was an editor there. so it's pretty interesting that the hackers are now going after news organizations because of the big readership. stuart: there isn't a...
80
80
Feb 17, 2015
02/15
by
KTVU
tv
eye 80
favorite 0
quote 0
the person who opens it unleashes malware into the bank computer system, it records key strokes, screen shots and other bank information and sends it back to the hackers and they use that information to steal money from the bank. they would limit the theft to $10 million before move on to another -- moving on to another bank. >> they would change balance so -- change the balance in the account. they would up the amount and transfer it out. >> because of non-disclosure agreements the banks have not been named although the report indicates 30 of the banks are in the united states. >>> 2 investigates uncovers holes in a safety net for the poor people. they are supposed to help keep the lights and the heat on but ktvu's eric rasmussen reports not everyone is getting the help. >> 2 investigates discovered there are some parts of the state that did not use all of the money they received last year. two month ago we -- months ago we heard from a man who was approved for assistance. a retired engineer who tell on -- fell on hard times. he acted 2 investigates after he received a frustrating foll
the person who opens it unleashes malware into the bank computer system, it records key strokes, screen shots and other bank information and sends it back to the hackers and they use that information to steal money from the bank. they would limit the theft to $10 million before move on to another -- moving on to another bank. >> they would change balance so -- change the balance in the account. they would up the amount and transfer it out. >> because of non-disclosure agreements the...
140
140
Feb 13, 2015
02/15
by
FOXNEWSW
tv
eye 140
favorite 0
quote 0
. >> this guy says the porn files are often written with viruses and malware.t's a good reason, right? >> it is a good reason. having seeing sam's night browser he has a fascination with asians. a couple things. first of all you sarcastically said eliminating pornography was an inspired name. it is. its initials are epa and it is aimed at the people from the environmental protection agency. it is actually props to who ever on the congressman's staff came up with that. >> you don't think it is a coincidence? >> i think it is possible that these employees are misunderstanding the of the treys "hard at work." >> do you have that video at home on dvd? >> i don't, actually. i sort of agree with lisa. the entire text of the bill, all it does is tell the office of management and budget to issue guidelines to every agency that prohibits the access of porn. i would kind of like to think how are they doing that but apparently they are wrong. >> do you have to tell people not to look at porn at work? >> of course we need guidelines. i see these videos nsfw. no video is sa
. >> this guy says the porn files are often written with viruses and malware.t's a good reason, right? >> it is a good reason. having seeing sam's night browser he has a fascination with asians. a couple things. first of all you sarcastically said eliminating pornography was an inspired name. it is. its initials are epa and it is aimed at the people from the environmental protection agency. it is actually props to who ever on the congressman's staff came up with that. >> you...
94
94
Feb 17, 2015
02/15
by
KTVU
tv
eye 94
favorite 0
quote 0
person who opened up the attachment unleashed mall ware into the bank's computer system and that malwarecorded strokes, screen shots and other bank information and sent it to the hackers who then used the information to steal all that money. >> and they would go change the balance in an account so your account might have $100,000 and they would then up that amount to $1 million and then transfer the $900,000 out. >> reporter: keperski labs refused to reveal which banks were hit. out of 100 banks of financial institutions 30 of them were locate in the united states. >>> final preparations are under way for the bay area's first ever outdoor prohockey game. on saturday the san sharks host the kings for 70,000 fans at levi's stadium in santa clara. claudine wong join us. >> reporter: go to levi's stadium and you will find niner fans dreaming of a season that's months away. >> they were born and raised there. >> you were born and raised in football. do you know anything about hockey? >> a little bit. >> thank you sir. >> when these fans peaked inside the stadium, they couldn't find the footba
person who opened up the attachment unleashed mall ware into the bank's computer system and that malwarecorded strokes, screen shots and other bank information and sent it to the hackers who then used the information to steal all that money. >> and they would go change the balance in an account so your account might have $100,000 and they would then up that amount to $1 million and then transfer the $900,000 out. >> reporter: keperski labs refused to reveal which banks were hit. out...
199
199
Feb 11, 2015
02/15
by
CNBC
tv
eye 199
favorite 0
quote 0
it's one of those malware akounlts akounlta accounts that takes control of the local system. >> we'recloser to stopping any of the hack attacks than we were six months ago, a year -- whatever. it seems like we have no control whatsoever over this issue. forbes newsweek twitter, someone else today, someone else tomorrow. >> sony delta anthem. in the case of twitter and facebook those are low damage accounts. nothing really happened and nobody cared because there was nothing serious going on there but if you're sending sensitive messages -- >> here's what i'm trying to to figure out. the hackers that went after, for example, twitter, they weren't going specifically after him but he just made the mistake of clicking on the wrong thing. >> probably targeting million of people on twitter. >> newsweek different story. somebody decided they wanted that account. >> they wanted to get control of that account. >> when they hack that account they have to figure out the password. >> they do. some other means. usually malware. >> but that was a very specific attack. >> sony obviously a very specif
it's one of those malware akounlts akounlta accounts that takes control of the local system. >> we'recloser to stopping any of the hack attacks than we were six months ago, a year -- whatever. it seems like we have no control whatsoever over this issue. forbes newsweek twitter, someone else today, someone else tomorrow. >> sony delta anthem. in the case of twitter and facebook those are low damage accounts. nothing really happened and nobody cared because there was nothing serious...
84
84
Feb 16, 2015
02/15
by
KTVU
tv
eye 84
favorite 0
quote 0
within the bank but unknowingly the person who opens the e-mail whatever is in there would release malware. it can record key strokes and send back to hackers camera still shots or video of key bank employees of how they make transfers. according to the time's article the hackers would limit their theft at $10 million before moving onto another bank and because of nondisclosure agreements, the banks were not named. the report comes on the heals of president obama's visit to stanford university talking about cyber security, he signed an order meant to have better collaboration between private companies on cyber threats. the president says internet security remains a priority. >> when they share their personal information with companies they should know it is going to be protected. >> when government and industries share information about cyber threats, we have to do so in a way that safeguards personal information. >> now experts say the attacks are unusual because they target banks themselves and not individual customers. also according to the report, most of the targets are banks in russi
within the bank but unknowingly the person who opens the e-mail whatever is in there would release malware. it can record key strokes and send back to hackers camera still shots or video of key bank employees of how they make transfers. according to the time's article the hackers would limit their theft at $10 million before moving onto another bank and because of nondisclosure agreements, the banks were not named. the report comes on the heals of president obama's visit to stanford university...
56
56
Feb 28, 2015
02/15
by
FBC
tv
eye 56
favorite 0
quote 0
russia or china looking at developing malware for some future use or doing theft of property absolutely truth. but it's a matter of i've never seen a cyberevent shoot somebody or behead somebody. i wouldn't put it up that high. lori: appreciate that perspective from you. we have been talking for months here about cyberthreats and how they're increasing, and they are out there from some of these international, you know some of the countries that aren't exactly friendly towards the united states. yet it seems we can't get on the same page in the united states between the government and corporations to come up with a thorough plan to combat the cyberthreats. what do you think? >> interesting, because president clinton signed a presidential decision directive number 63 and with all the thousands of words in it, the bottom line was private sector government, create information sharing analysis center. i.t. has a lot of good eye sacks out there. president bush trust of information the ability to trust government in the private sector, making sure we had liability coverage in there. absolutely
russia or china looking at developing malware for some future use or doing theft of property absolutely truth. but it's a matter of i've never seen a cyberevent shoot somebody or behead somebody. i wouldn't put it up that high. lori: appreciate that perspective from you. we have been talking for months here about cyberthreats and how they're increasing, and they are out there from some of these international, you know some of the countries that aren't exactly friendly towards the united states....
48
48
Feb 17, 2015
02/15
by
ALJAZAM
tv
eye 48
favorite 0
quote 0
the cyber criminals used malware and other methods to gain access to the bank systems, and then usedhe knowledge to wire out money. >>> the federal aviation administration is proposing new rules on using drone aircraft. the obama administration is ordering federal agencies to disclose where their drones are being used in the united states. >>> libby casey reports. >> reporter: david, it's getting easier and cheaper to get your hands on a drone, and a growing number of companies are eager to explore their use for commercial purposes. to deliver is pizza, to photograph your house from the air to help it sell in the real estate market. regulators have been working on these proposed rules for years. the head of the faa saying: the rules would affect commercially operated drones weighing up to 55 pounds. users would have to earn a certificate, a type of drone pilot license. the rules would ban flying at night or near airports. drones would have to stay below 500 people and under 5 miles per hour. the proposals pose a challenge to companies like amazon who want to use drones to deliver pac
the cyber criminals used malware and other methods to gain access to the bank systems, and then usedhe knowledge to wire out money. >>> the federal aviation administration is proposing new rules on using drone aircraft. the obama administration is ordering federal agencies to disclose where their drones are being used in the united states. >>> libby casey reports. >> reporter: david, it's getting easier and cheaper to get your hands on a drone, and a growing number of...
143
143
Feb 28, 2015
02/15
by
FBC
tv
eye 143
favorite 0
quote 0
russia or china looking at developing malware for some future use or doing theft of property absolutelyter of i've never seen a cyberevent shoot somebody or behead somebody. i wouldn't put it up that high. lori: appreciate that perspective from you. we have been talking for months here about cyberthreats and how they're increasing, and they are out there from some of these international, you know some of the countries that aren't exactly friendly towards the united states. yet it seems we can't get on the same page in the united states between the government and corporations to come up with a thorough plan to combat the cyberthreats. what do you think? >> interesting, because president clinton signed a presidential decision directive number 63 and with all the thousands of words in it, the bottom line was private sector government, create information sharing analysis center. i.t. has a lot of good eye sacks out there. president bush trust of information the ability to trust government in the private sector, making sure we had liability coverage in there. absolutely done. and here we are
russia or china looking at developing malware for some future use or doing theft of property absolutelyter of i've never seen a cyberevent shoot somebody or behead somebody. i wouldn't put it up that high. lori: appreciate that perspective from you. we have been talking for months here about cyberthreats and how they're increasing, and they are out there from some of these international, you know some of the countries that aren't exactly friendly towards the united states. yet it seems we can't...
45
45
Feb 14, 2015
02/15
by
CSPAN2
tv
eye 45
favorite 0
quote 0
fishing or sky where or malware and now ransomwhere. these attacks are more sophisticated every day so we have to be as fast and flexible and nimble and constantly evolve in our defenses. fourth and most importantly in all our work we have to make sure we are protecting the privacy and civil liberty of the american people. we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy as well as our national security. the private sector wrestles with this as well. when consumers share their personal information with companies they deserve to know that it is going to be protected. when government and industry share information about cyber threats we have got to do so in a way that safeguard your personal information. when people go on line we shouldn't have to forfeit the basic privacy we are entitled to as americans. in recent years we have worked to put these principles into practice and part of our comprehensive strategy we boosted our defenses in government, sharing more infor
fishing or sky where or malware and now ransomwhere. these attacks are more sophisticated every day so we have to be as fast and flexible and nimble and constantly evolve in our defenses. fourth and most importantly in all our work we have to make sure we are protecting the privacy and civil liberty of the american people. we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy as well as our national security. the private sector...