33
33
May 23, 2015
05/15
by
CSPAN3
tv
eye 33
favorite 0
quote 0
constructive malware is a bomb. terroristsment mentwant bombs.logic tells me that terrorists are -- would have said two years ago -- are going to wake up, but in two years, i have seen them wake up to the idea that as hard as it is to get in the country physically, they get in as a photon at the speed of light. yes, i'm concerned. i don't see it yet in the hands of these terrorists, but it just making too much sense that it is a tool that they will eventually turn to. i see them already starting to explore the things that are concerning, critical infrastructure, things like that, but the logic of it tells me it's coming and so, of course, i'm worried about it. >> if they don't have it right now, do you see an interest among the groups in obtaining these types of tools? >> yes. >> turning to information sharing for a minute, we talked about -- you mentioned that the fbi is working to get flash messages out quicker. variety of information sharing programs across the government, what types of information sharing programs does the fbi have to offer,
constructive malware is a bomb. terroristsment mentwant bombs.logic tells me that terrorists are -- would have said two years ago -- are going to wake up, but in two years, i have seen them wake up to the idea that as hard as it is to get in the country physically, they get in as a photon at the speed of light. yes, i'm concerned. i don't see it yet in the hands of these terrorists, but it just making too much sense that it is a tool that they will eventually turn to. i see them already...
41
41
May 22, 2015
05/15
by
CSPAN2
tv
eye 41
favorite 0
quote 0
a malware investigator is this. we have long had a database of all the malware we have ever seen and our investigators when they are working a case will query it and see if the piece they are in countering in a particular place has been seen someplace else on what is known about it and cannot adopt similar to fingerprint database. we are trying to make that resource available to the private sector starting with the trusted partners and in vergard and allow them to connect directly to the malware investigator database and then put their own malware samples and get a result within seconds or minutes that says this has been seen in los angeles and it connects to this thing to help them start to connect the dots. we think that smart in their interests and we think it's in our interest too as more people enter more samples of malware we will have more dots to connect. bennister and vergard so if you are in an vergard member i hope you'll ask about that and see if your enterprise can participate in that. >> it's potential
a malware investigator is this. we have long had a database of all the malware we have ever seen and our investigators when they are working a case will query it and see if the piece they are in countering in a particular place has been seen someplace else on what is known about it and cannot adopt similar to fingerprint database. we are trying to make that resource available to the private sector starting with the trusted partners and in vergard and allow them to connect directly to the...
146
146
tv
eye 146
favorite 0
quote 0
. >> and malware remember target, malware neiman marcus sally's the list goes on and on where malwareten on point of sale systems, it got onto the point of sale systems. 4200 of 150,000 businesses no indication how many consumers went to the 4200 businesses. gerri: so this is the number of businesses affected, nothe mbe of divials >>corrct. rri i wnt t radhat haorouch sai to a big bog bsie isecuty. thiss hbor uchthe mpan in ecrosairs t inden invved t instlati ofalwar witn ursfetecinghe incent rbo tou ideifie a move the lwar fro afcted sysm. am as always, the breach happens and the trouble and the ripoffs can go on for a long time. >> absolutely. and the problem is that now they've gotten so sophisticated in the deep web or the real black market. gerri: dark web. >> dark web as well. sounds like a star trek episode. gerri: it is a star trek episode. >> they sell by zip code they sell by type of card the amount available credit. gerri: we don't know who doctor d this, right? >> no we don't. gerri: move you to another problem, you remember sally beauty, a company you might have seniors m
. >> and malware remember target, malware neiman marcus sally's the list goes on and on where malwareten on point of sale systems, it got onto the point of sale systems. 4200 of 150,000 businesses no indication how many consumers went to the 4200 businesses. gerri: so this is the number of businesses affected, nothe mbe of divials >>corrct. rri i wnt t radhat haorouch sai to a big bog bsie isecuty. thiss hbor uchthe mpan in ecrosairs t inden invved t instlati ofalwar witn...
91
91
May 22, 2015
05/15
by
CSPAN
tv
eye 91
favorite 0
quote 0
we are piloting something we call the malware investigator, which is this. inside the fbi we have long had a database of all of the marrow -- malware we have ever seen. our investigators when working on a case will query it and see if the piece they are encountering has been seen someplace else and what is known about it, and connect dots. we are trying to make that resource available to the private sector starting with the trusted partners in infragard and allow them to connect directly to the malware investigator database and input their own malware samples and get a result within seconds or minutes that says this has been seen in los angeles. it connects to this thing. to help them start to connect dots. we think that is in their interest and our interest because we will have more dots to connect. we have started that. that is through infragard. if you are a number, i hope you'll ask about that and see if your enterprise will participate in that. >> that is potentially transformational. any timeline on rolling that out? director comey: it is out now. i fo
we are piloting something we call the malware investigator, which is this. inside the fbi we have long had a database of all of the marrow -- malware we have ever seen. our investigators when working on a case will query it and see if the piece they are encountering has been seen someplace else and what is known about it, and connect dots. we are trying to make that resource available to the private sector starting with the trusted partners in infragard and allow them to connect directly to the...
108
108
May 20, 2015
05/15
by
FOXNEWSW
tv
eye 108
favorite 0
quote 0
that said there has been a lot of malware spotted in other countries on their atms.s just a matter of time before it comes here. >> now, and you're right about this banks can use these computer chips on credit and debit cards. i look today, mine don't have them. >> the banks are all rolling them out. they're doing credit first, then the big banks are starting to roll out debit, but that doesn't help unless you have an atm that is also chip enabled. and the deadline is not until next year. >> all right. robin sidel, good story, learned a lot. people should check it out on the wall street journal website. thanks very much. >>> thousands of passengers on board a cruise stranded board a cruise stranded for hours after their ship steered them on to a reef bed. they got stuck. we'll have the details for you just ahead. stick around. what up wheels! mr. auto-mo-deal! hey, it's the wheel deal! hey, hey, the duke of deals! i know a few guys in the rental car biz. let's go, 'wheels'. rental car deals up to 40% off. >>> nfl commissioner roger goodell says he wants to hear direc
that said there has been a lot of malware spotted in other countries on their atms.s just a matter of time before it comes here. >> now, and you're right about this banks can use these computer chips on credit and debit cards. i look today, mine don't have them. >> the banks are all rolling them out. they're doing credit first, then the big banks are starting to roll out debit, but that doesn't help unless you have an atm that is also chip enabled. and the deadline is not until next...
136
136
May 21, 2015
05/15
by
CNNW
tv
eye 136
favorite 0
quote 0
isis is now waking up to the idea of malware. >> the threat we faced is morphed. it is invisible to us because the operational communications are happening in an encrypted channel. that consumes most of our days trying to -- i don't think it is an impossible task but it is hard. >> comey says the fbi is sending more agents and investigators around the world to build criminal cases against them. >>> months before he was taken out in a navy s.e.a.l. raid, osama bin laden wrote it may be time to move out of the compound. that letter is one of the many released documents in the operation that killed the al qaeda leader. a lot of interesting information found by the navy s.e.a.l.s. tom foreman takes a look. >> reporter: christine, this is a remarkable collection of documents. we do know from the documents that he actually sent people to great britain and russia to carry out attacks to hit american targets if possible. numerous attacks failed. when he responded to the letters to others he said it was bad luck and god wasn't on our side. beyond that though he felt a grea
isis is now waking up to the idea of malware. >> the threat we faced is morphed. it is invisible to us because the operational communications are happening in an encrypted channel. that consumes most of our days trying to -- i don't think it is an impossible task but it is hard. >> comey says the fbi is sending more agents and investigators around the world to build criminal cases against them. >>> months before he was taken out in a navy s.e.a.l. raid, osama bin laden...
41
41
May 3, 2015
05/15
by
CSPAN2
tv
eye 41
favorite 0
quote 0
and the malware worked as follows. first of all, you know as -- almost as an afterthought it stole your credit card information which sort of in a garden variety theft sort of way. but it also turned your web cam against you, and he would then take surreptitious pictures of people in various states of undress and then approach them with extortionate demands for them to produce sex tapes for him. and also use their contacts database to further distribute the malware. the fbi finally caught up with him. he's now serving time in prison. and so here's my one hypothetical change to that case. what if he was not within the territorial united states but was based -- as a lot of your spam comes from nigeria or some other ukraine, some other place where the jurisdictional reach of the fbi just doesn't go. and so i think what you would conclude from that is that you can actually be attacked at an individual level from just about anywhere. and that's also the first time in the history of the world that that's true. um, so i think
and the malware worked as follows. first of all, you know as -- almost as an afterthought it stole your credit card information which sort of in a garden variety theft sort of way. but it also turned your web cam against you, and he would then take surreptitious pictures of people in various states of undress and then approach them with extortionate demands for them to produce sex tapes for him. and also use their contacts database to further distribute the malware. the fbi finally caught up...
40
40
May 5, 2015
05/15
by
CSPAN
tv
eye 40
favorite 0
quote 0
it is decrypted in the malware does its damage. crypto at one level does not necessarily solve all the problems. we have to prevent various layers in the system using various technologies. this is an oddball answer here. it is everybody's responsibility to do this. each layer and each provider of service at those layers has responsibility just as we do a giggle. -- just as we do at google. we are in the application space and we are doing everything we can to prevent against the types of attacks that could be launched that are level of architecture. there are other layers that need to contribute to the safety of the system. >> right now, we use social and credit history to verify our legal identity. if social security numbers didn't exist, what when identity verification look like and is there a better way to do identity verification? vint cerf: the short answer is yes. social security numbers don't have any check digits in them or anything. there is no way to tell of its invalid or valid social security numbers. it's just nine digi
it is decrypted in the malware does its damage. crypto at one level does not necessarily solve all the problems. we have to prevent various layers in the system using various technologies. this is an oddball answer here. it is everybody's responsibility to do this. each layer and each provider of service at those layers has responsibility just as we do a giggle. -- just as we do at google. we are in the application space and we are doing everything we can to prevent against the types of attacks...
74
74
May 6, 2015
05/15
by
CSPAN3
tv
eye 74
favorite 0
quote 0
all the way through the net, nobody is see anything, it gets to the end and its decrypted and the malware does the damage. we have to put prevention in various layers in the system using various and sundry technologies. so in a very -- it's kind of an odd ball answer here but it's sort of everybody's responsibility to do this, but each layer and each provider of service at those layers has a responsibility just as we do at google. we're way up in the application space and we're doing everything we can to protect against the kinds of attacks which could be launched against our layers of the architecture, but there are other layers below us, the ones doing transport, that also need to contribute to the safety of the system. >> right now we use social and credit history to verify our legal identity. if social security numbers didn't exist, what would identity verification look like and is there a better way to do identity verification? >> the short answer is yes. would you like me to elaborate? so, first of all, social security numbers were not intended to be identifiers used in commerce rig
all the way through the net, nobody is see anything, it gets to the end and its decrypted and the malware does the damage. we have to put prevention in various layers in the system using various and sundry technologies. so in a very -- it's kind of an odd ball answer here but it's sort of everybody's responsibility to do this, but each layer and each provider of service at those layers has a responsibility just as we do at google. we're way up in the application space and we're doing everything...
76
76
May 23, 2015
05/15
by
KNTV
tv
eye 76
favorite 0
quote 0
. >> the security company malware bites points out that that companies need to have security but we can also change passwords and be at less of a risk every time we're online. >> do you guys recognize this? belvedere -- >> the blue sky. it has been a long time since we have seen any clear skies here. let's go outside to the sky camera network. clouds in the south bay, temperatures in the 60s, and that fog lingering around san francisco. most important question as we start off that three-day weekend on saturday morning, will we see things clear out? all right, let's get the answers. you will see in that morning forecast we're expecting unfortunately the clouds to come back here for the north bay, san francisco, the east bay, patchy drizzle. you're probably asking yourself you promised sunnier weather, when will it finally get here. high pleasure be building just off shore and that's what we need to get this sunny weather in here across the bay area. we think that will be happening as soon as saturday's forecast. the only hitch is that in the next few days we'll be starting with fog. we j
. >> the security company malware bites points out that that companies need to have security but we can also change passwords and be at less of a risk every time we're online. >> do you guys recognize this? belvedere -- >> the blue sky. it has been a long time since we have seen any clear skies here. let's go outside to the sky camera network. clouds in the south bay, temperatures in the 60s, and that fog lingering around san francisco. most important question as we start off...
42
42
May 16, 2015
05/15
by
CSPAN3
tv
eye 42
favorite 0
quote 0
this includes encryption tamper resistant devices, malware protection, network monitoring and more, all vital parts of the pci standards. effective security requires more than just standards for standards without supporting programs or just tools, not solutions. the training and certification programs educated tens of thousands of security professionals, making it easier for businesses to choose products that have been lab tested certified, and secured. finally, we conduct global campaigns to raise awareness of payment card security. leadership on the issue is important, and there are clear ways in which the federal government can help. for example, by leading stronger cooperationive law enforcement efforts, worldwide, and by encouraging stiff penalties for the crimes, and recent initiatives on information sharing are also proving to be invaluable. the council is an active collaborator with government we work with treasury and secret service and other entities including global law enforcement, like interpol and europol. in conclusion, payment card security is complex. silver bullet solu
this includes encryption tamper resistant devices, malware protection, network monitoring and more, all vital parts of the pci standards. effective security requires more than just standards for standards without supporting programs or just tools, not solutions. the training and certification programs educated tens of thousands of security professionals, making it easier for businesses to choose products that have been lab tested certified, and secured. finally, we conduct global campaigns to...
28
28
May 21, 2015
05/15
by
CSPAN
tv
eye 28
favorite 0
quote 0
we had a database of all the malware. our investigators created a case to see if it has been seen someplace else and connect the dots. they will input their own samples and get a result within minutes and let them start to connect the dots. i hope you will ask about that and see if your enterprise can participate. >> any timeline on rolling that out? >> i forget the number. we have got hundreds of companies participating. it allows the cheap information security officer -- it has to be somebody we know. we give them an online password and they can connect to it and carry the database. my vision is that should continue to grow. we have to make sure we know the people continuing to connect to it. >> given the fact that our digital lives are central, you have a lot of departments. if the government covers different areas of different missions, we have the department of homeland security, critical infrastructure programs, the national cyber center they run and the secret service responding to payment card data breaches of the
we had a database of all the malware. our investigators created a case to see if it has been seen someplace else and connect the dots. they will input their own samples and get a result within minutes and let them start to connect the dots. i hope you will ask about that and see if your enterprise can participate. >> any timeline on rolling that out? >> i forget the number. we have got hundreds of companies participating. it allows the cheap information security officer -- it has to...
35
35
May 15, 2015
05/15
by
CSPAN3
tv
eye 35
favorite 0
quote 0
this includes en description tamper resistant devices, malware protection and more. all are vital parts of the pci standards, effective security requires more than just standards. for standards without supporting programs are just tools, not solutions. the council's training an certification programs have educated tens of thousands of security professionals and make it easier for businesses to choose products that have been lab tested, certified and as secure. finally, we conduct global campaigns to raise appearance of payment card security. the committee's leadership on this critical issue is important and there are clearly ways in which the federal government can help. for example, by leading stronger cooperative law enforcement efforts, worldwide, by encouraging stiff penalties for these crimes and recent initiatives on information sarg are also proving to be invaluable. the council is an active collaborator with government, we work with dhs, treasury, secret service and many other government entities including global law enforcement such as inter poll and euro po
this includes en description tamper resistant devices, malware protection and more. all are vital parts of the pci standards, effective security requires more than just standards. for standards without supporting programs are just tools, not solutions. the council's training an certification programs have educated tens of thousands of security professionals and make it easier for businesses to choose products that have been lab tested, certified and as secure. finally, we conduct global...
30
30
May 11, 2015
05/15
by
CSPAN2
tv
eye 30
favorite 0
quote 0
between bits of malware detected in the system so that you can stop it from happening again.omeone wants to invest in that malware, you can do it once and you have got it and you can move forward, and that is the kind of stuff there coming up with for cyber defense. we we want more of that awareness command for the practitioners to not laugh it off. modern warfare. picture of that right next to an airplane and a rocket. everyone needs to be linked. public-private funding is that is where the really great ideas coming from and we are going missing conjunction with space command as well. can of like the equivalent of our airfield so that all of our cadets can get a feel for it and realize anyone who has a computer laptop, smart phone is a soft.for someone to get in and a weapon system as well. >> you mentioned sexual assault, sexual harassment. this question announce that senator question joe brand in the context of the military's come out in support of the policy the put sexual harassment cases in the hands of a a private prosecutor in the commander or the persons direct chain
between bits of malware detected in the system so that you can stop it from happening again.omeone wants to invest in that malware, you can do it once and you have got it and you can move forward, and that is the kind of stuff there coming up with for cyber defense. we we want more of that awareness command for the practitioners to not laugh it off. modern warfare. picture of that right next to an airplane and a rocket. everyone needs to be linked. public-private funding is that is where the...
44
44
May 29, 2015
05/15
by
CSPAN2
tv
eye 44
favorite 0
quote 0
extortion to produce sex tapes for him and also used their contact database to further distribute the malware. the fbi caught up with him he is serving time in prison. here is my one hypothetical change. what if he was not within the territory of the united states but based from nigeria or ukraine or another place where the jurisdictional reach of the fbi does not go? what you would conclude is that you can actually be attacked from just about anywhere at the individual level that is also the first time in history of the world that is true. so we started with the idea we wanted to unpack the connected tissues that would link the debates over cyprus security with the debates of bio security or drones and robotics. what we found is there is a cybersecurity debate that i am sure a lot if you are familiar with which people talk about the uniqueness of that environment and the things they say that make it different from anything else before is that you can attack remotely with great distance with limited capacity to rich tribute the attack. it is difficult as one said has disseminated down to the
extortion to produce sex tapes for him and also used their contact database to further distribute the malware. the fbi caught up with him he is serving time in prison. here is my one hypothetical change. what if he was not within the territory of the united states but based from nigeria or ukraine or another place where the jurisdictional reach of the fbi does not go? what you would conclude is that you can actually be attacked from just about anywhere at the individual level that is also the...
50
50
May 29, 2015
05/15
by
CSPAN2
tv
eye 50
favorite 0
quote 0
their contacts database would be used to further distribute the malware. the fbi finally caught up with them and he spending time in prison. what if he was not within the territory of the united states? that's where a lot of your spam comes from some other place where the jurisdiction reach of the fbi just doesn't go. so i would preclude from that you can actually be attacked at an individual level. that's that's also the first time in the history of the world that that's true. so i think we started with the idea that we wanted to unpack some of the connective tissue that linked the debate over cyber security and bio security and drones and robotics. how are they linked. what we found is that there is a a cyber security debate which i'm sure many of you are very familiar with. talks about the uniqueness of the cyber environment and it's different than anything that's ever come before. you can attack remotely over great distances with limited capacity to diss to distribute. it has equalized in a way and the earth has got much flatter in a way. they say well
their contacts database would be used to further distribute the malware. the fbi finally caught up with them and he spending time in prison. what if he was not within the territory of the united states? that's where a lot of your spam comes from some other place where the jurisdiction reach of the fbi just doesn't go. so i would preclude from that you can actually be attacked at an individual level. that's that's also the first time in the history of the world that that's true. so i think we...
149
149
May 21, 2015
05/15
by
CNNW
tv
eye 149
favorite 0
quote 0
comey says isis is waking up to the idea of malware to attack computer systems in the u.s.agents around the world to gather evidence on terrorists and build criminal cases against them. let's bring in arwa damon this morning. arwa has been following the isis con quest of the city in syria palmyra palmyra. tell us about the victory from isis. the assad regime is saying about it and what it means for u.s. strategy. >> reporter: a number of organizations claiming that palmyra has fallen to isis. it did say that during the intense fighting, they were only obliged only move the artifacts. the concern being the absolutely spectacular testament to just how marvelous ancient civilization is with the city of palmyra. we have seen what the organize says has done to the other historical sites in iraq. also the humanitarian cost. the fighting was centralized around the city of palmyra. one cannot begin to imagine what the horrors people have had to endure. and the capture of palmyra in it would open new routes for isis to the city of damascus. this comes under the heels of another vict
comey says isis is waking up to the idea of malware to attack computer systems in the u.s.agents around the world to gather evidence on terrorists and build criminal cases against them. let's bring in arwa damon this morning. arwa has been following the isis con quest of the city in syria palmyra palmyra. tell us about the victory from isis. the assad regime is saying about it and what it means for u.s. strategy. >> reporter: a number of organizations claiming that palmyra has fallen to...
70
70
May 23, 2015
05/15
by
CSPAN
tv
eye 70
favorite 0
quote 0
but the government is going in and in a nefarious way into the code of facebook and then inserting malware into other people's facebook and spreading it throughout the internet. the government also is looking at communication between two modes. so let's say you communicate with google and it's encrypted but when google has a data center that talks to another data center, there is a place that is nonencrypted and the government is just simply hooking up to the cable and siphoning off records. there is a danger that you'll have no privacy left in the end of this. the fourth amendment's very specific. the fourth amendment says you have to individualize a warrant, you have to put a name on the warrant. you have to say specifically what records you want. you have to say where they're located, and then you have to ask a judge for permission. the sneak and peek warrants that i was talking about before is section 213. it's now permanent law. we don't even get a chance to talk about it. we could repeal it, and i will have an amendment to repeal it. this is where the government goes in secretly, and
but the government is going in and in a nefarious way into the code of facebook and then inserting malware into other people's facebook and spreading it throughout the internet. the government also is looking at communication between two modes. so let's say you communicate with google and it's encrypted but when google has a data center that talks to another data center, there is a place that is nonencrypted and the government is just simply hooking up to the cable and siphoning off records....
27
27
May 8, 2015
05/15
by
CSPAN3
tv
eye 27
favorite 0
quote 0
one of the things they have done is come up with a way to map the incidents of malware in a particular network. i have a picture outside my office that looks like flowers from laugh in set with crazy flowers from the 60s. if you look at it it's the links between bits of malware that are detected in a system so you can stop it from happening again. if someone wants to invest in that they can do it once and you've got it and you can move forward. that's the kind of stuff they're coming up with for cyber defense and we want to have more of that kind of awareness and just also for the practictioners to not laugh that off. that's the modern warfare i want a picture of that next to an airplane and rocket because that's where we're going. everybody needs to be linked. that's where the really great ideas come from. we're doing this in conjunction with space command. we like that to be like the equivalent of our airfield so our cadets can get a fill for this. it's part of a weapon system that we have as well. >> you mentioned sexual assault, sexual harassment. this questioner notes that they ha
one of the things they have done is come up with a way to map the incidents of malware in a particular network. i have a picture outside my office that looks like flowers from laugh in set with crazy flowers from the 60s. if you look at it it's the links between bits of malware that are detected in a system so you can stop it from happening again. if someone wants to invest in that they can do it once and you've got it and you can move forward. that's the kind of stuff they're coming up with...
43
43
May 14, 2015
05/15
by
CSPAN3
tv
eye 43
favorite 0
quote 0
it denies cyber criminals the access they need to install malware and other cyber hacking tools. as we deploy all these technologies, i want to affirm our strong support for legislation that creates uniform national data standards and data protection breach standards as well. such standards must be industry neutral, preemptive of state law and this is the approach set out in hr 2205 which eta strongly supports. we applaud chairman naugabar and mr. karn fore engaging in important dialogue for this legislation. we support legislation to promote information sharing sharing of information across government and technology and manufacturing companies will support prevention of and investigation of breaches and ensure against cyber attacks. cyber criminals are increasingly sophisticated. they are global in scope and we're working proactively to address every threat. we must not forget that these data breaches of merchants and consumers make them victims of crime. we share a desire to stamp out fraud and we take seriously our responsibility all of our customers to do so. thank you for th
it denies cyber criminals the access they need to install malware and other cyber hacking tools. as we deploy all these technologies, i want to affirm our strong support for legislation that creates uniform national data standards and data protection breach standards as well. such standards must be industry neutral, preemptive of state law and this is the approach set out in hr 2205 which eta strongly supports. we applaud chairman naugabar and mr. karn fore engaging in important dialogue for...
39
39
May 22, 2015
05/15
by
CSPAN3
tv
eye 39
favorite 0
quote 0
this includes encryption, tamper resistant devices, malware protection, network monitoring and more, all vital parts of the pci standards. effective security requires more than just standards for standards without supporting programs or just tools, not solutions. the training and certification programs educated tens of thousands of security professionals, making it easier for businesses to choose products that have been lab tested, certified, and secured. finally, we conduct global campaigns to raise awareness of payment card security. leadership on the issue is important, and there are clear ways in which the federal government can help. for example, by leading stronger cooperationive law enforcement efforts, worldwide, and by encouraging stiff penalties for the crimes, and recent initiatives on information sharing are also proving to be invaluable. the council is an active collaborator with government, we work with treasury and secret service and other entities including global law enforcement, like interpol and europol. in conclusion, payment card security is complex. silver bulle
this includes encryption, tamper resistant devices, malware protection, network monitoring and more, all vital parts of the pci standards. effective security requires more than just standards for standards without supporting programs or just tools, not solutions. the training and certification programs educated tens of thousands of security professionals, making it easier for businesses to choose products that have been lab tested, certified, and secured. finally, we conduct global campaigns to...
66
66
May 20, 2015
05/15
by
FBC
tv
eye 66
favorite 0
quote 0
it hasn't happened as much in the united states as overseas but it is relative to malware.get nervous because i pull up to the atm, and i see that the bank itself has cameras. aren't they supposed to be monitoring all of this? greg, who is going to pay me if my money is stolen? >> well that is the thing. if you report it to your financial institution you don't have any liability. the that liability rests with somebody else. but, we're talking about something like atm or debit card attached to your checking account, that is where the problem lies because you have a hassle of basically getting the horseback into the barn. money is gone. now you have to get it back. even if you don't have any liability, there is still going to be hassle in the interim until the money is replenished. liz: monitor online mobile accounts. go on websites, sam, make sure you don't see a couple dollars missing here and there? as i understand they take a few as not to flag people, what is this $200 expenditure that i didn't authorize? >> right. i mean i think that the key is, and as greg pointed out,
it hasn't happened as much in the united states as overseas but it is relative to malware.get nervous because i pull up to the atm, and i see that the bank itself has cameras. aren't they supposed to be monitoring all of this? greg, who is going to pay me if my money is stolen? >> well that is the thing. if you report it to your financial institution you don't have any liability. the that liability rests with somebody else. but, we're talking about something like atm or debit card...
248
248
May 17, 2015
05/15
by
CNNW
tv
eye 248
favorite 0
quote 0
ipads and what he says according to the fbi, are thumb drives that have nasty, what he called nasty malwarebe used to take over the computer controls. according to roberts, the way he does this is simply by connecting with a cable from his laptop to a box that's right underneath the seat and that controls in-flight entertainment system the stuff that you watch movies on on the back of the seat. so that's how he says he is able to do this. i should say that chris roberts in the last day or so has tweeted that this is all a misunderstanding. he says we have a tweet from him that says he is not able to address it all but says there is a whole five years of stuff that the affidavit incorrectly compressed into one paragraph, lots to untangle. we reached out to him. he's not been able to respond to us. >> look this isn't the first time we are hearing this could happen, right? the ga. >> on the government accountability office came out with a report just a few weeks ago warning about this. so it makes me obviously want to ask, what is boeing saying airbus saying? are they saying this is possible?
ipads and what he says according to the fbi, are thumb drives that have nasty, what he called nasty malwarebe used to take over the computer controls. according to roberts, the way he does this is simply by connecting with a cable from his laptop to a box that's right underneath the seat and that controls in-flight entertainment system the stuff that you watch movies on on the back of the seat. so that's how he says he is able to do this. i should say that chris roberts in the last day or so...
42
42
May 28, 2015
05/15
by
CSPAN3
tv
eye 42
favorite 0
quote 0
we faced an extremely sophist kalted type of malware that was designed to steal banking and other credentials from the computers that it infected. unknown to the rightful owners of the computers the infected computers became part of a global network or a boughttnet of compromised computers and they were used by the cybercriminals for various purposes but in this instance mainly stealing confidential information and gaining access to financial information such as bank accounts. it was a network somewhere between 500,000 and a million computers worldwide. most of those were in the united states. the network was used to steal hundreds of millions of dollars from mostly relatively small businesses and individuals. a lot of those small businesses were -- had their entire bank accounts wiped out and because their business accounts, they weren't insured. so that's all their money. we saw that over and over again. it's really serious. so it was also a distribution mechanism for the crypto locker ransom ware, which is a form of safety ware which would encrypt files on user's computers until they paid
we faced an extremely sophist kalted type of malware that was designed to steal banking and other credentials from the computers that it infected. unknown to the rightful owners of the computers the infected computers became part of a global network or a boughttnet of compromised computers and they were used by the cybercriminals for various purposes but in this instance mainly stealing confidential information and gaining access to financial information such as bank accounts. it was a network...
112
112
May 5, 2015
05/15
by
CSPAN2
tv
eye 112
favorite 0
quote 0
affected somehow maybe they went to of web site with now where so this composes eight men that has malwaret is great. nobody can see it then is decrypt did then it has so that does not necessarily solve the problem we have to put prevention into various layers of technology so it is sort of the report is responsibility but each layer and provider of service has a responsibility just as we do in the application space as we protect poughkeepsie layers of architecture that contribute to the safety of. >> right now we use social and credit history to verify the legal identity as social security numbers did not exist what would verification of look-alike is there a better way? >> the short answer is yes. would you like me to elaborate? first of all, social security the embers were not intended to be identifiers used but they are. or the last four digits which is almost worse. second there is no way to tell if it is valid court invalidated is just nine digits we could do a lot better with today's technology one would be to issue a certificate that identifies a public key that belongs to you alon
affected somehow maybe they went to of web site with now where so this composes eight men that has malwaret is great. nobody can see it then is decrypt did then it has so that does not necessarily solve the problem we have to put prevention into various layers of technology so it is sort of the report is responsibility but each layer and provider of service has a responsibility just as we do in the application space as we protect poughkeepsie layers of architecture that contribute to the safety...
60
60
May 2, 2015
05/15
by
CSPAN2
tv
eye 60
favorite 0
quote 0
in the background is bill malware and me a picture in my office and was so hot in there you could seeis black casket. it was incredible. he worked on it and they finally agreed. it was fantastic. he got the bill passed and john mccormack, speaker of the house, said hold the bill up. if you get a bill and don't sign it within ten days it is up pocket veto. told the bill for a month. mccormick said why? johnsen said because i want to sign it on you kerry's birthday. we would not have the bill without him and he did sign it on his birthday. that kind of thing. >> host: how did he know so much about so many people? i am told that he had the phone number and name of every member of congress on his desk in the oval office with little notes about what they might need or want. how did he assemble all this? where did he get all this information? >> guest: he accumulated it. it was absolutely stunning and it was invaluable to him. he loved politicians. spent time with them. he knew when their wives were sick or their kids were sick or when they had a problem or didn't. and he knew what would mo
in the background is bill malware and me a picture in my office and was so hot in there you could seeis black casket. it was incredible. he worked on it and they finally agreed. it was fantastic. he got the bill passed and john mccormack, speaker of the house, said hold the bill up. if you get a bill and don't sign it within ten days it is up pocket veto. told the bill for a month. mccormick said why? johnsen said because i want to sign it on you kerry's birthday. we would not have the bill...
23
23
May 22, 2015
05/15
by
CSPAN2
tv
eye 23
favorite 0
quote 0
so it is schaede distribution mechanism for the up malware it would encrypt the files on the computer and tell day paid our rand some. it affected more than two 1000's of computers in the short run a time and in the same time businesses paid more than 27 million to get their computer files uncorrected if you know, each victim only paid rose $750 though that adds up in a short period of time in those are the people who paid the ransom. that operation and was of success and was course supervised as all operations are. we could not have done it without law-enforcement partners overseas are without technical assistance from companies like dell and microsoft and shadow server. we did not stop dead day we announced to take down the botnet rehab warrants for people's arrests the state department announced a $3 million reward for information in the dingy to a reward of five rushes nationalism is the mastermind of the botnet. is a long winter in russia and other people may want that $3 million we hope that reward will help us to get him. there are not hundreds of thousands of people who live e
so it is schaede distribution mechanism for the up malware it would encrypt the files on the computer and tell day paid our rand some. it affected more than two 1000's of computers in the short run a time and in the same time businesses paid more than 27 million to get their computer files uncorrected if you know, each victim only paid rose $750 though that adds up in a short period of time in those are the people who paid the ransom. that operation and was of success and was course supervised...
48
48
May 9, 2015
05/15
by
CSPAN2
tv
eye 48
favorite 0
quote 0
they have done is come up with a way to map command this is for cyber defense math the incidence of malwarein a particular network cyber forensics. it looks like flowers from -- crazy flowers from the 60s. .. >> >> how is the victim doing? what type of care are they getting? not to have reprisal but what type of help does this person in need? at the same time lawyers try to work with investigators to prosecute if we oh the eric jurisdiction which we normally do to see if we can take it to court and because that is also linked wish that we can account for our choices and in our case it is disciplinary militarily and it does not rise to the level of the of crime we're still disciplines. i feel we have then accountable more transparent as we get best practices that we are inspected and and surveyed the commander of was it to that organization but i don't know if that is a panacea to have commanders be responsible for that. >> if you have the cadet for your experience what would you do know that you didn't do that and? anger and what wasn't like in the late '70s as a woman? how was that treatme
they have done is come up with a way to map command this is for cyber defense math the incidence of malwarein a particular network cyber forensics. it looks like flowers from -- crazy flowers from the 60s. .. >> >> how is the victim doing? what type of care are they getting? not to have reprisal but what type of help does this person in need? at the same time lawyers try to work with investigators to prosecute if we oh the eric jurisdiction which we normally do to see if we can take...
141
141
May 5, 2015
05/15
by
CSPAN2
tv
eye 141
favorite 0
quote 0
be so this computer and doesn't know it's affected composes a bill that has malware that we in cryptic. great than nobody can see anything. then it does this not solve the problem. so it is everybody's responsibility but each layer and provider has a responsibility with the application space and we're doing everything we can with the attacks with the layers of architecture that also need to contribute. >> to use social and credit history to verify of the golden age. what does an identification and verified look like? >> the short answer is yes. would you like me to elaborate? [laughter] so first of all, social security numbers are not intended to be a defiers used in commerce but they are. or the last four digits which is almost worse. second they don't check the digits it is just nine digits we can do a lot better. and a certificate that identifies the key so this is a weird thing it is late the door with two keys one locks the door but does not allow it. so you have these two different cryptographic key is that work together to create security. from the authority that would identify
be so this computer and doesn't know it's affected composes a bill that has malware that we in cryptic. great than nobody can see anything. then it does this not solve the problem. so it is everybody's responsibility but each layer and provider has a responsibility with the application space and we're doing everything we can with the attacks with the layers of architecture that also need to contribute. >> to use social and credit history to verify of the golden age. what does an...
245
245
May 19, 2015
05/15
by
CNBC
tv
eye 245
favorite 0
quote 0
they may have been subject to malware and fishing attacks.y include the files as well as stats and geographical maps. >> investment banks are raising their starting salaries for college grads for the first time in five years according to the new york times. it's risen to $85,000 after hovering near $75,000 since the start of the decade. interesting. all right. coming up on worldwide exchange starbucks may have given up on selling cds in the stores but the coffee giant is not giving up on music. details on the company's new play list is coming up next. ist is coming up next. >>> european equities are firmly in the green and auto stocks among the best performers here in europe as fresh data showed regional car sales rising for the 20th straight month. april new car registrations were up nearly 7% across the euro zone. fiat chrysler as sales outpace the rest of the european market up nearly 14% from the same month last year. in response auto stocks in the green. up 2.6%. folks wagon in germany. renault up about 3.5%. auto showing a lot of leader
they may have been subject to malware and fishing attacks.y include the files as well as stats and geographical maps. >> investment banks are raising their starting salaries for college grads for the first time in five years according to the new york times. it's risen to $85,000 after hovering near $75,000 since the start of the decade. interesting. all right. coming up on worldwide exchange starbucks may have given up on selling cds in the stores but the coffee giant is not giving up on...
74
74
May 20, 2015
05/15
by
CSPAN2
tv
eye 74
favorite 0
quote 0
these are these backdoor things where they can snart -- insert malware.this makes the government less safe by making us vulnerable to terrorists and spies who want to harm the u.s. 81% were concerned with this and thought we should have more privacy. i think it's clear that the american people are concerned about what we're doing. what isn't yet clear is whether the message has been transmitted to washington, whether or not there's enough of a majority growing in washington to actually do something about this i think the numbers are growing. over 300 people acknowledge that there's a problem in the house by passing legislation. i have mixed feelings on the legislation. i think that without question, i agree with those who voted for it that bulk collection of records is wrong and that it should end. i've been a little more in the camp though, that we should just end the bulk collection of records and replace it not with a new program but with the constitution. i personally think that we could survive with the constitution. i think that we could also surviv
these are these backdoor things where they can snart -- insert malware.this makes the government less safe by making us vulnerable to terrorists and spies who want to harm the u.s. 81% were concerned with this and thought we should have more privacy. i think it's clear that the american people are concerned about what we're doing. what isn't yet clear is whether the message has been transmitted to washington, whether or not there's enough of a majority growing in washington to actually do...
176
176
May 15, 2015
05/15
by
CNBC
tv
eye 176
favorite 0
quote 0
clicking on suspicious e-mails so you don't have an infection on your computer or mobile device with malwarecks and these other organizations saying will you turn on two factor authentication? if the users demand it the corporations will follow. >> that's exactly it. jean you work in i.t. correct. >> it was a secure password that i didn't use anywhere else. i'm almost certain -- all my computers are secure. my phone is secure. there's nothing really that would lead me to lose that password on my own. >> how can it be that sharon says that -- how many 16 million accounts and we have poor jean here. am i missing something here? if this was a sustained -- if this was a systemic problem, causing aggravation to hundreds or thousands of starbucks customers, you would think they would make the tradeoff on the two-step identification and they would go that way. >> it sounds to me like they're making a commercial decision not to do it. >> have you gotten money back? >> yes. i got my money back because i was protected by my paypal account, not because of starbucks. it's not only me that this happened
clicking on suspicious e-mails so you don't have an infection on your computer or mobile device with malwarecks and these other organizations saying will you turn on two factor authentication? if the users demand it the corporations will follow. >> that's exactly it. jean you work in i.t. correct. >> it was a secure password that i didn't use anywhere else. i'm almost certain -- all my computers are secure. my phone is secure. there's nothing really that would lead me to lose that...
33
33
May 7, 2015
05/15
by
CSPAN3
tv
eye 33
favorite 0
quote 0
attack which is sending somebody an e-mail and duping them into clicking on something and then the malware gets installed on their machine. at that point the fbi agent hacker, is in control of the machine. something like a phishing attack for instance might violate the fourth amendment's requirement for particularlity. and that is because you are sending, essentially your identifier is not the actual computer, it is somebody's e-mail address. and that e-mail address can be accessed from any computer, so if i were at a public library or if i were on your computer and i was the target i got a phishing attack and it, your computer gets infected and then they find some sort of criminal activity that you're up to. i think that would be a great challenge. i think the, the international issues and the territorial issues are not as easy to challenge, obviously because we've just heard throughout the day that privacy rights abroad exist evenless than that do in the -- even less than they do in the united states. i would be hard pressed to find a judge that would actually register an argument that a
attack which is sending somebody an e-mail and duping them into clicking on something and then the malware gets installed on their machine. at that point the fbi agent hacker, is in control of the machine. something like a phishing attack for instance might violate the fourth amendment's requirement for particularlity. and that is because you are sending, essentially your identifier is not the actual computer, it is somebody's e-mail address. and that e-mail address can be accessed from any...
290
290
May 21, 2015
05/15
by
FOXNEWSW
tv
eye 290
favorite 0
quote 0
our indication is they're going to attack us with malware.ou have to ask yourself does the cia, nsa, fbi have our interest at heart. general jack keane weighs in on this yesterday. >> i trust the national security agency. i think they've done tremendous work. i knew general alexander on a personal and professional basis for years. man of incredible integrity and dealt this issue under snowden. i'm convinced they've got the united states' interest at heart. >> he trusts the nsa. there are a lot of people who do not trust the federal government. >> patriot act was actually put in place days after we were attacked on 9/11. >> sure. >> theat's how this came to be. >> to track foreigners but it has become something that tracks all of us. if it worked the people that support it say it stopped this and this. boston bomber, didn't stop them. should the patriot act be renewed as it is so you can spy on everybody with a warrant, or would you like to see it changes? >> e-mail us, tweet us facebook us. >> he did get heb from senator rubio, manchin, and m
our indication is they're going to attack us with malware.ou have to ask yourself does the cia, nsa, fbi have our interest at heart. general jack keane weighs in on this yesterday. >> i trust the national security agency. i think they've done tremendous work. i knew general alexander on a personal and professional basis for years. man of incredible integrity and dealt this issue under snowden. i'm convinced they've got the united states' interest at heart. >> he trusts the nsa....