129
129
Feb 17, 2015
02/15
by
KNTV
tv
eye 129
favorite 0
quote 0
embedded spyware overseas claims a russian cyber security firm said the country target by u.s.ies include iran asia pakistan and afghanistan. the report says spyware is embedded so deeply beyond the reach of anti-virus products and security control. >>> in the dallas morning news woman to lead texas a&m corps cadets for the first time in history. she will assume command of 2400 cadets in the spring. she is expected to lead the largest a&m corps in 45 years. >>> from nbcnews.com, mars one picks 100 to compete for one-way red planet trip. the project plans to use a reality show to narrow down the competition to 24 people. winners would be expected to start up a permanent colony on mars. adventurous. >>> other stories we're following today. thousands of people gathered for a candlelight vigil in copenhagen last night to honor the victims of saturday's shooting spree. two men under arrest this morning. they are suspected of aiding the gunman in a pair of deadly terror shootings. meanwhile we've also learned president obama called danish prime minister to offer condolences after tha
embedded spyware overseas claims a russian cyber security firm said the country target by u.s.ies include iran asia pakistan and afghanistan. the report says spyware is embedded so deeply beyond the reach of anti-virus products and security control. >>> in the dallas morning news woman to lead texas a&m corps cadets for the first time in history. she will assume command of 2400 cadets in the spring. she is expected to lead the largest a&m corps in 45 years. >>> from...
37
37
Feb 22, 2015
02/15
by
BLOOMBERG
tv
eye 37
favorite 0
quote 0
nsa spyware may be hidden in hard drives around the world.earchers in moscow base kasperski found spyware made by western digital, toshiba, and ibm, would give the nsa the ability to eavesdrop on the majority of the world's computers. i spoke with stuart mcclure, the ceo of the cyber firm cylance. >> no matter what you do, even if you can find it and it's made to avoid detection, you can try to wipe it but it will come right back. that's usually planted at the manufacturers. this is not the first time the industry has seen this kind of a type of attack inside firmware. it's simply the complication and sophistication of this type of attack that gives it some merit to talk about. >> and it's also widely spread. now, getting the leading manufacturers at western digital or somewhere else -- it's right across the industry. every major manufacturer disk drive, according to this report, is infected by this software. >> we don't know the full scope quite yet, but the indications are that there are real opportunities with these hard drive manufacturer
nsa spyware may be hidden in hard drives around the world.earchers in moscow base kasperski found spyware made by western digital, toshiba, and ibm, would give the nsa the ability to eavesdrop on the majority of the world's computers. i spoke with stuart mcclure, the ceo of the cyber firm cylance. >> no matter what you do, even if you can find it and it's made to avoid detection, you can try to wipe it but it will come right back. that's usually planted at the manufacturers. this is not...
40
40
Feb 28, 2015
02/15
by
CSPAN3
tv
eye 40
favorite 0
quote 0
in fact, i worked in something that became the anti-spyware coalition.rior to that there was another group that was run and people do not trust the. we came up with our own standards of selecting who the membership was and what the roles were for it. we were not sharing threat information but discussing definitions that became the basis. it is the same type of thing, how you go about building trust and keeping it. they can pop up. you can have two or three. >> i wish i remembered. the anti-spyware coalition is coalition is a great example of what we are talking about a clear goal. we want to take spyware out of the system. who who do we need to include? and that is what i love. focus on the outcome. sharing is a supporting part of the process but doesn't necessarily drive the process. i wish we had more space to explore this. the net supplier of cyber security information and net consumers of cyber security information, and most companies are on the down stream. they have the demand for cyber security information but a lot of the companies are here, palo
in fact, i worked in something that became the anti-spyware coalition.rior to that there was another group that was run and people do not trust the. we came up with our own standards of selecting who the membership was and what the roles were for it. we were not sharing threat information but discussing definitions that became the basis. it is the same type of thing, how you go about building trust and keeping it. they can pop up. you can have two or three. >> i wish i remembered. the...
28
28
Feb 20, 2015
02/15
by
CSPAN2
tv
eye 28
favorite 0
quote 0
we want to take spyware out of the system. who do we need to include in the alliance that we can get rid of this. and that's what i lo, it's focused -- i love, it's focused on the outcomes. sharing is a supporting part of the process, but it doesn't necessarily drive the process. and i wish we could have had more space in our paper to explore this and related concepts. you've got net suppliers of cybersecurity information and net consumers of cybersecurity information. and most of us most companies most state and locals are on the downstream. they are, they have a demand for cybersecurity expertise -- for information. but really a lot of the companies are here the companies that were out in palo alto, you know the symantecs the microsofts, i mean, they've got the overall suppliers of information, and they'd love to look at these more market-based solutions. if we've got a mismatch between supply and demand, i'm one of those people that think boy, that's a place for a market, you know? if supply and demand don't match up, then
we want to take spyware out of the system. who do we need to include in the alliance that we can get rid of this. and that's what i lo, it's focused -- i love, it's focused on the outcomes. sharing is a supporting part of the process, but it doesn't necessarily drive the process. and i wish we could have had more space in our paper to explore this and related concepts. you've got net suppliers of cybersecurity information and net consumers of cybersecurity information. and most of us most...
92
92
Feb 18, 2015
02/15
by
KYW
tv
eye 92
favorite 0
quote 0
. >>> a report suggests that the united states planted spyware on computers all over the world. the russian firm said it found the program in thousands of computers. the russians did not specifically name the u.s. as the source of the malware but it says one program similar to one reportedly developed fwi u.s. disrupted iranian nuclear facilities. >>> authorities don't know why a train was killing cars. as many as 28 tankers carried thousands of gallons of oil jumped the tracks. more than 100 residents were evacuated after losing their drinking water and electricity. there were no serious injuries. >>> this morning lawyers will mount a defense. on tuesday it rested its case against eddie ray routh. manuel bojorquez reports. >> reporter: this is the video showing eddie ray routh arrested. the jurors heard as routh told police i've been so pair noild and schizophrenic all day. i don't know what to think of the world right now. i don't know if i'm sane or insachblt officer flav owe salazar he was behind the wheel. he told jurors i noticed whenever there was a crowd around or people
. >>> a report suggests that the united states planted spyware on computers all over the world. the russian firm said it found the program in thousands of computers. the russians did not specifically name the u.s. as the source of the malware but it says one program similar to one reportedly developed fwi u.s. disrupted iranian nuclear facilities. >>> authorities don't know why a train was killing cars. as many as 28 tankers carried thousands of gallons of oil jumped the...
44
44
Feb 13, 2015
02/15
by
ALJAZAM
tv
eye 44
favorite 0
quote 0
whether it's phishing or bot nets spyware, malware, and now ransomware.e have got to be as fast and flexible and nimble in constantly evolving our defenses. and fourth and most importantly, in all of our work we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we have pursued important rereforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector wrestles with this as well. when consumers share their personal information with companies, they deserve to know that it is going to be protected. when government and industry share information about cyber threats, we have got to do so in a way that safeguards your personal information. when people go online we shouldn't have to forfeit the basic privacy we are entitled to as americans. in recent years we have worked to put these principles into practice. and we have boosted our defenses in government we're sharing more information with the private sector to help th
whether it's phishing or bot nets spyware, malware, and now ransomware.e have got to be as fast and flexible and nimble in constantly evolving our defenses. and fourth and most importantly, in all of our work we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we have pursued important rereforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector...
53
53
Feb 24, 2015
02/15
by
CSPAN
tv
eye 53
favorite 0
quote 0
how significant is spyware to the n.s.a.'s surveillance capabilities? >> well, clearly i'm not going to get into specific of allegations. the point i would make is we fully comply with the law. ppd-28 provides a very specific framework for us about what is acceptable and what is not acceptable and what are the guiding principles that we have to keep in mind when we're conducting our foreign intelligence mission. and we do that foreign intelligence mission operating within that framework. that's the commitment that i make as the director. we got a legal framework and we will follow it. we will not deviate from it. >> he's taking the microphone. >> bruce schneider, we haven't met. answer is yes, very significant. and your own question, it's not the legal framework that's hard, it's the technical framework. my question is also about encryption. it's a perception and a reality quefment we're now living in a world where everybody attacks everybody else's systems. we attack -- we attack systems. china attacks systems. and i'm having trouble with companies not
how significant is spyware to the n.s.a.'s surveillance capabilities? >> well, clearly i'm not going to get into specific of allegations. the point i would make is we fully comply with the law. ppd-28 provides a very specific framework for us about what is acceptable and what is not acceptable and what are the guiding principles that we have to keep in mind when we're conducting our foreign intelligence mission. and we do that foreign intelligence mission operating within that framework....
48
48
Feb 24, 2015
02/15
by
KYW
tv
eye 48
favorite 0
quote 0
. >> they claim that they're going to get rid of spyware.hey really don't because it's not there to begin. >> if you get a call from someone claiming from the irs hang up the phone. the same goes for calls claiming to be microsoft or apple trying to convince to you give them access to your computer. this scam will continue as long as people let down their guard. roaring for three on your side, i'm jim donovan. >>> in weather tonight, we are watching strong area of high pressure keep the skies clear. so we will be cold. it's also keeping the clouds to the south and right now places that don't usually get snow like memphis and atlanta are seeing some snow and atlanta little bit of a wintry mix and north carolina experience something snow. we stay dry because of that high bringing down the cold northerly breezes. so at least we can be thankful for that as far as the cold is concerned. our "eyewitness weather" watchers are talking about pretty cold temperatures out there right now. not much wind and that's allowing our temperatures to plunge. ri
. >> they claim that they're going to get rid of spyware.hey really don't because it's not there to begin. >> if you get a call from someone claiming from the irs hang up the phone. the same goes for calls claiming to be microsoft or apple trying to convince to you give them access to your computer. this scam will continue as long as people let down their guard. roaring for three on your side, i'm jim donovan. >>> in weather tonight, we are watching strong area of high...
51
51
Feb 21, 2015
02/15
by
BLOOMBERG
tv
eye 51
favorite 0
quote 0
is the nsa secretly installing spyware on your desktop computer?hocking new report, we would tell you about the next. ♪ ♪ researches abacus bursty say top software is using eavesdropping devices. i spoke about it with stewart. >> the matter what you do, it is made to be stealthy and avoid detection. you could try and wipe it, it will come right back. it is in the firmware, that is usually planted on the manufacturer. this is not the industry -- not the first time the industry has seen this. it is the sophistication of the attack that gives us merit to talk about it. >> it is also widely spread. it is not like they snuck it in. we spoke to western digital, it is wide across the industry. according to this report, every manufacturer is infected. >> we do not know the. yet, but the implications are that there are real problems. whether or not it was pre-or post production is a little bit up in the air, we do not know that quite yet. that needs to be fleshed out and investigated. what we do know is that the ability to get on the systems is quite trivia
is the nsa secretly installing spyware on your desktop computer?hocking new report, we would tell you about the next. ♪ ♪ researches abacus bursty say top software is using eavesdropping devices. i spoke about it with stewart. >> the matter what you do, it is made to be stealthy and avoid detection. you could try and wipe it, it will come right back. it is in the firmware, that is usually planted on the manufacturer. this is not the industry -- not the first time the industry has seen...
62
62
Feb 17, 2015
02/15
by
BLOOMBERG
tv
eye 62
favorite 0
quote 0
and it's a spyware may be hitting in hard drives around the world.rs discovered spying software in bedded into hard drives like toshiba western digital and ibm. this would give them the ability to eavesdrop on the majority of the world's is computers. i'm joined by the ceo of cyber security form -- firm "silent." this is fairly amazing stuff. even when he wiped the higher -- the hard drive, it stays there. >> that is exactly it. a matter what you do and what will you use to find it, even if you can find it you could try to wipe it but it will come back because it is in firmware. that is usually planted at the manufacturers. it is not the first time the industry has seen this tool -- this kind of virus or attack. it is simply the complication of this type of attack which gives its merits to talk about. >> ok. it is also widely spread. the manufacturers at western dinner -- western digital or somewhere else. it is right across the industry. every major manufacturer according to this report is affected by the software. >> we do not know the full scope y
and it's a spyware may be hitting in hard drives around the world.rs discovered spying software in bedded into hard drives like toshiba western digital and ibm. this would give them the ability to eavesdrop on the majority of the world's is computers. i'm joined by the ceo of cyber security form -- firm "silent." this is fairly amazing stuff. even when he wiped the higher -- the hard drive, it stays there. >> that is exactly it. a matter what you do and what will you use to find...
36
36
Feb 18, 2015
02/15
by
BLOOMBERG
tv
eye 36
favorite 0
quote 0
spyware may be hidden in hard drives around the world.rs in a moscow based lab found spy software in hard drives made by to shea what -- toe sheba, western digital i.b.m., you name it. it would give the n.s.a. the ability to spy on the majority of the world's computers. we are joined by a representative from cybersecurity firm silent. this is fairly amazing stuff. even when you wipe the hard drive, it stays there. >> that's exactly it, system of no matter what you do, no matter what tool you use to dry o-- to try to find it, even if you can find it and it's made to be stealthy, you can try to wipe it and it will come right back, because it's in firmware, which is usually put in it at the manufacturers. this is not the first time we've seen this kind of virus in firmware, it is the sophistication of this attack that gives it merit. >> it's not like they snuck in somewhere. it's right across the industry. every major manufacturer of disk drives, according to this report, is infected by this software. >> we don't know the full scope of it qu
spyware may be hidden in hard drives around the world.rs in a moscow based lab found spy software in hard drives made by to shea what -- toe sheba, western digital i.b.m., you name it. it would give the n.s.a. the ability to spy on the majority of the world's computers. we are joined by a representative from cybersecurity firm silent. this is fairly amazing stuff. even when you wipe the hard drive, it stays there. >> that's exactly it, system of no matter what you do, no matter what tool...
70
70
Feb 17, 2015
02/15
by
BLOOMBERG
tv
eye 70
favorite 0
quote 0
and spyware reportedly installed in hard drives around the world. lots coming up for you.up now. here is a look at
and spyware reportedly installed in hard drives around the world. lots coming up for you.up now. here is a look at
89
89
Feb 13, 2015
02/15
by
BLOOMBERG
tv
eye 89
favorite 0
quote 0
whether it is phishing or botnets, spyware, malware, ran someware.ve to be nimble in constantly evolving our defenses. fourth and most importantly, in all of our work we have to make sure we are protecting the privacy and the civil liberties of the american people. we grapple with these issues as a government. we pursued important reforms to make sure we are respecting peoples right to see as well as national security. consumers deserve to know their information will be protected. when government and industry shares information about cyber threats, we have to do so in a way that safeguards your personal information. when people go online we should not have to forfeit the basic privacy we are entitled to as americans. in recent years, we have worked to put these principles into practice and as part of our conference of strategy we have boosted our defenses in government, we are sharing more information with the private sector to help those companies defend themselves. we are working with industry to use what we call a cyber security framework to preve
whether it is phishing or botnets, spyware, malware, ran someware.ve to be nimble in constantly evolving our defenses. fourth and most importantly, in all of our work we have to make sure we are protecting the privacy and the civil liberties of the american people. we grapple with these issues as a government. we pursued important reforms to make sure we are respecting peoples right to see as well as national security. consumers deserve to know their information will be protected. when...
102
102
Feb 16, 2015
02/15
by
KGO
tv
eye 102
favorite 0
quote 0
"new york times" say hackers hit 100 banks including some in the united states installing spyware onk computers and made illegal transfers. a hacker managed to rig an a.t.m. to spew out cash. the thieves are russian chinese, and european. >> the country could be on the verge of another partial government shut down during an appearance on fox news sunday house of representatives speaker boehner is prepared to allow funding to the department of homeland security to lapse after the house going passed a spend land if the department that would gut president obama's immigration plan. the president has vowed to veto the budget if it goes to his desk. san francisco's pelosi is calling on a clean homeland security bill with funding running out next friday. >> a scorpion stung a woman on the hand before the flight from los angeles to portland took off so the plane returned to the gate and the woman was check by permits. -- by paramedics. the members of the oregon state university men's basketball were on the flight and mike parker said and i quote "coach was two rows behind the woman." flight
"new york times" say hackers hit 100 banks including some in the united states installing spyware onk computers and made illegal transfers. a hacker managed to rig an a.t.m. to spew out cash. the thieves are russian chinese, and european. >> the country could be on the verge of another partial government shut down during an appearance on fox news sunday house of representatives speaker boehner is prepared to allow funding to the department of homeland security to lapse after the...
58
58
Feb 11, 2015
02/15
by
ALJAZAM
tv
eye 58
favorite 0
quote 0
and they were using spyware for specific users. news of those two hacks comes as the white house announced a new plan to detect and stop potential cyber attacks. it's called the cyber threat intelligence center. it's mission is to gather data from across the government and alert other agencies to potential threats. white house today called the sony pictures hack a game changer, saying that data breachers are more sophisticated and more dangerous, and with more on that, libby casey is at the white house. >> john, president obama is prioritizing cyber security this year, and hackers in recent months have launched an attack for everything from steel to personal information to cry to create fear. where media organizations and other important institutions have been compromised in some way, or at least their computer systems have been compromised in some way. >> security companies investigating the prepare of forbes.com, said that they are hacking defense contractors to hack information on their computerrers but everyone vulnerable. >> w
and they were using spyware for specific users. news of those two hacks comes as the white house announced a new plan to detect and stop potential cyber attacks. it's called the cyber threat intelligence center. it's mission is to gather data from across the government and alert other agencies to potential threats. white house today called the sony pictures hack a game changer, saying that data breachers are more sophisticated and more dangerous, and with more on that, libby casey is at the...
141
141
Feb 16, 2015
02/15
by
CNNW
tv
eye 141
favorite 0
quote 0
an employee clicked on it downloaded something they shouldn't have and downloaded spyware.ted learned a lot about the banks and credentials and acted as bank tellers, setting up fake accounts putting lots of money into their own accounts. what you mentioned, which was fascinating, they made atms spew money. they were able to remotely access it and had what we call money mules come with bags and pick up the money and run away as the atm was remotely spewing money. this was unprecedented. you talk to people they were actually able to pull this off over a two-year period. >> money mules. who are these bank robbers? where do investigators think they are from? >> you can't really put it to one hacker group but this is kind of a collective group, people from china, eastern europe russia. a lot of different people come together to do this. i spoke to a security researcher who uncovered the hack and called this the ocean 11 of hack because there were so many different masterminds behind this that made it happen. >> are they still happening? what sort of preventive measures do banks
an employee clicked on it downloaded something they shouldn't have and downloaded spyware.ted learned a lot about the banks and credentials and acted as bank tellers, setting up fake accounts putting lots of money into their own accounts. what you mentioned, which was fascinating, they made atms spew money. they were able to remotely access it and had what we call money mules come with bags and pick up the money and run away as the atm was remotely spewing money. this was unprecedented. you...
34
34
Feb 28, 2015
02/15
by
CSPAN
tv
eye 34
favorite 0
quote 0
how significant is spyware to the n.s.a.'s surveillance capabilities?well, clearly i'm not going to get into specific of allegations. the point i would make is we fully comply with the law. ppd-28 provides a very specific framework for us about what is acceptable and what is not acceptable and what are the guiding principles that we have to keep in mind when we're conducting our foreign intelligence mission. and we do that foreign intelligence mission operating within that framework. that's the commitment that i make as the director. we got a legal framework and we will follow it. we will not deviate from it. >> he's taking the microphone. >> bruce schneider, we haven't met. answer is yes, very significant. and your own question, it's not the legal framework that's hard it's the technical framework. my question is also about encryption. it's a perception and a reality quefment we're now living in a world where everybody attacks everybody else's systems. we attack -- we attack systems. china attacks systems. and i'm having trouble with companies not want
how significant is spyware to the n.s.a.'s surveillance capabilities?well, clearly i'm not going to get into specific of allegations. the point i would make is we fully comply with the law. ppd-28 provides a very specific framework for us about what is acceptable and what is not acceptable and what are the guiding principles that we have to keep in mind when we're conducting our foreign intelligence mission. and we do that foreign intelligence mission operating within that framework. that's the...
280
280
Feb 17, 2015
02/15
by
CNNW
tv
eye 280
favorite 0
quote 0
hackers sent malware, and e-mails clicked on it and installed spyware onto their computers. >> trojanning. i still have the image of what if they forgot to send the mule to the atm and you were standing there. would you give the money back? >>> seems "snl" legends had to let out a little in the waist here and a little tucking there. nothing wrong with that it's up to you. jeanne moos with what everybody's talking about. for fastidious librarian emily skinner, each day was fueled by thorough preparation for events to come. well somewhere along the way emily went right on living. but you see, with the help of her raymond james financial advisor, she had planned for every eventuality. ...which meant she continued to have the means to live on... ...even at the ripe old age of 187. life well planned. see what a raymond james advisor can do for you. when the moment's spontaneous, why pause to take a pill? or stop to find a bathroom? cialis for daily use is approved to treat both erectile dysfunction and the urinary symptoms of bph, like needing to go frequently, day or night. tell your doct
hackers sent malware, and e-mails clicked on it and installed spyware onto their computers. >> trojanning. i still have the image of what if they forgot to send the mule to the atm and you were standing there. would you give the money back? >>> seems "snl" legends had to let out a little in the waist here and a little tucking there. nothing wrong with that it's up to you. jeanne moos with what everybody's talking about. for fastidious librarian emily skinner, each day...
140
140
Feb 17, 2015
02/15
by
CNNW
tv
eye 140
favorite 0
quote 0
a russian cybersecurity firm claims the spyware was placed by a group called the equation group thought to be a veiled reference to the national security agency. sounds like a spy novel. >>> new secretary of defense ash carter reported to work earlier this morning at the pentagon despite snowy conditions in the washington area. the senate confirmed carter last week. he's the fourth secretary of defense to serve during the obama administration. he succeeds chuck hagel as you well know. vice president biden swore carter in just a few moments ago. >>> state of emergency in west virginia. thousands at risk of losing water service today after a train derails and explodes spilling crude oil. >>> also coming up cars out of control as ice blankets the south and dumps even more snow up north. what is next? you just got a big bump in miles. so this is a great opportunity for an upgrade. sound good? great. because you're not you you're a whole airline... and it's not a ticket you're upgrading it's your entire operations, from domestic to international... which means you need help from a whole team
a russian cybersecurity firm claims the spyware was placed by a group called the equation group thought to be a veiled reference to the national security agency. sounds like a spy novel. >>> new secretary of defense ash carter reported to work earlier this morning at the pentagon despite snowy conditions in the washington area. the senate confirmed carter last week. he's the fourth secretary of defense to serve during the obama administration. he succeeds chuck hagel as you well know....
50
50
Feb 23, 2015
02/15
by
CSPAN2
tv
eye 50
favorite 0
quote 0
how significant is spyware to the nsa's surveillance capabilities? >> well, clearly i'm not going to get into validation. the point i would make is we fully comply with the law. it is provide a very specific framework about what is acceptable and what is not acceptable your want of a guiding principles which keep in mind when we're conducting our foreign intelligence mission and we do the foreign intelligence mission operating within that framework. that's the commandment i make as director and with a legal frame and we will follow it. we will not deviate from it. >> bruce schneider, we haven't met, hi. your other question is not a legal framework that's hard as technical primer. that's what makes the problem hard. my question is also about encryption. it's a perception and unreality question. we are now living in the world where everybody attacks everybody else's systems. we attacked systems. china tax systems and i'm having trouble with companies not wanting to use u.s. encryption because of the fear that nsa, fbi, different types of legal and surr
how significant is spyware to the nsa's surveillance capabilities? >> well, clearly i'm not going to get into validation. the point i would make is we fully comply with the law. it is provide a very specific framework about what is acceptable and what is not acceptable your want of a guiding principles which keep in mind when we're conducting our foreign intelligence mission and we do the foreign intelligence mission operating within that framework. that's the commandment i make as...
65
65
Feb 17, 2015
02/15
by
LINKTV
tv
eye 65
favorite 0
quote 0
the russian firm kaspersky lab says it uncovered the spyware in personal computers across 30 countries from iran, russia pakistan and libya to china, belgium, ecuador, and the united states. the targets include government institutions, oil and gas firms, islamic activists and scholars and the media. hundreds of people gathered at the danish embassy in paris to express solidarity with denmark. over the week and attacks on a free speech event and a synagogue. the danish ambassador said the feelings are similar to those that followed last month's attacks on charlie hebdo magazine in paris. >> it is really moving, because what i feel is that everyone feels danish, like, we all felt french. and the solidarity that is a must physical is very, very important for my country, my people, because today, we are in mourning. >> danish authorities have arrested two people accused of assisting the copenhagen dedmon who was shot dead by police. in the u.s., a north carolina grand jury has indicted craig hicks on three counts of murder for killing three muslim students in chapel hill. police have claim
the russian firm kaspersky lab says it uncovered the spyware in personal computers across 30 countries from iran, russia pakistan and libya to china, belgium, ecuador, and the united states. the targets include government institutions, oil and gas firms, islamic activists and scholars and the media. hundreds of people gathered at the danish embassy in paris to express solidarity with denmark. over the week and attacks on a free speech event and a synagogue. the danish ambassador said the...
62
62
Feb 13, 2015
02/15
by
FBC
tv
eye 62
favorite 0
quote 0
whether it's phishing or botnets, spyware now ransom ware.ng more sophisticated every day. we have to be as fast and nimble in constantly evolving our defenses. and fourth, and most importantly, in all our work, we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector wrestles with this as well. when consumers share their personal information with companies, they deserve to know that it will be protected. when government and industry share information about cyber threats, we have to do so in a way that safeguards your personal information. when people go online, we shouldn't have to forfeit the basic privacy that we're entitled to as americans. in recent years we've worked to put these principles into practice. as part of our comprehensive strategy, we've boosted our defenses in government, we're sharing more information
whether it's phishing or botnets, spyware now ransom ware.ng more sophisticated every day. we have to be as fast and nimble in constantly evolving our defenses. and fourth, and most importantly, in all our work, we have to make sure we're protecting the privacy and civil liberty of the american people. and we grapple with these issues in government. we pursued important reforms to make sure we are respecting people's privacy as well as ensuring our national security. and the private sector...
249
249
Feb 17, 2015
02/15
by
BLOOMBERG
tv
eye 249
favorite 0
quote 0
the report from russia says the united a test on a way to criminally embedded spyware into machinery world's top manufacturers, including seagate and toshiba. our bloomberg west cory johnson -- our bloomberg west editor-at-large, cory johnson joins us from san francisco. this is startling, and expose from the russian cyber security firm. they are drawing a direct line to the nsa, but they are going almost all the way. >> they have written for a while about something they call the equation group and have documented for a long time a lot of hacks that have taken place that they credit back to this group they call the equation group and track them next to the nsa and aligned with nsa projects. they've come just short of calling it nsa. but this terrific story in reuters did get somebody from the nsa to confirm it is an nsa program and from x nsa people as well. this is malware that attaches itself to the hard drive and survives a military grade really wipe of the disc. no matter what you do to the physical disk, this software tends to survive. >> is there any true defense we can have a
the report from russia says the united a test on a way to criminally embedded spyware into machinery world's top manufacturers, including seagate and toshiba. our bloomberg west cory johnson -- our bloomberg west editor-at-large, cory johnson joins us from san francisco. this is startling, and expose from the russian cyber security firm. they are drawing a direct line to the nsa, but they are going almost all the way. >> they have written for a while about something they call the equation...
47
47
Feb 14, 2015
02/15
by
CSPAN2
tv
eye 47
favorite 0
quote 0
whether it's fishing or botnets, spyware or malware and now rent somewhere these attacks are getting more and more sophisticated everyday. we have to be just as flaxen -- fast and flexible and nimble. fourth and most importantly we have to make sure we are protecting the privacy and civil liberties. we grapple with these issues and government. we pursued important reforms to make sure we're respecting peoples privacy as well as ensuring our national security. the private sector wrestles with this as well. when consumers share their personal information with companies they deserve to know it's going to be protected by government and industry share information about cyber threats we have to do so in a way that safeguard your personal information. when people go online we shouldn't have to forfeit the basic privacy that we are entitled to us americans we have worked to put these principles into practice. we boosted our defenses and government sharing more information with the private sector to help those companies defend themselves working with industry to use what we call a cyber secur
whether it's fishing or botnets, spyware or malware and now rent somewhere these attacks are getting more and more sophisticated everyday. we have to be just as flaxen -- fast and flexible and nimble. fourth and most importantly we have to make sure we are protecting the privacy and civil liberties. we grapple with these issues and government. we pursued important reforms to make sure we're respecting peoples privacy as well as ensuring our national security. the private sector wrestles with...
153
153
Feb 23, 2015
02/15
by
CNBC
tv
eye 153
favorite 0
quote 0
the head of the national security agency refused comment on reports the government emplants spyware onrveillance purposes. u.s. navy admiral michael rogers said "we fully comply with the law." am announced plans to open two new data southwest wrshz the biggest european project to date. they will power the company's on-line services. apple stock hitting a record high today. >>> a massive fire burning on a new jersey highway this morning. a tanker truck carrying nearly 9,000 gallons of fuel overturned and burst into flames on a -- the driver was able to get out thank goodness. nearby homes, though were evacuated. that's the cnbc news update for this hour. brian, back to you. >> all right, sue. thank you very much. >>> we had a brief blip in the price of oil, but we're giving much of that back as we settle into the close. let's if to the floor of the nymex for the final trades. it was a pretty wild final 60 minutes for you. it definitely was. we're looking at brent crude under 60 now. just about $59 at the close here. it's interesting, brian, the traders are saying they sort of die just j
the head of the national security agency refused comment on reports the government emplants spyware onrveillance purposes. u.s. navy admiral michael rogers said "we fully comply with the law." am announced plans to open two new data southwest wrshz the biggest european project to date. they will power the company's on-line services. apple stock hitting a record high today. >>> a massive fire burning on a new jersey highway this morning. a tanker truck carrying nearly 9,000...
311
311
Feb 17, 2015
02/15
by
CNNW
tv
eye 311
favorite 0
quote 0
software maker said it discovered a series of american spying operations including the hiding of spyware in the networks of 30 countries, including iran and china. it's supposedly been going on for two decades and the software is beyond the reach of anti-virus programs the software maker involved is called kaspersky and it appears to suggest the nsa is behind the program. >> hmmmm. >>> bizarre to have the russians telling us about the u.s. spy program. and then reporting it on american television as the source. >> it's hard to follow the bouncing ball know. >> we know that the blame goes like this an odd way to learn about it. >>> a pair of blasts in western virginia after a train derails. look at this explosion. what went wrong here and what's the damage? >> you know plus it's one thing for it to be cold -- the problem with the cold is that things freeze and and then we see this horrible. we've all seen it before. siphon it on you've seen it on the road and you hope to god it's not you. the outcome is worth seeing. i've smoked a lot and quit a lot but ended up nowhere. now...i use this.
software maker said it discovered a series of american spying operations including the hiding of spyware in the networks of 30 countries, including iran and china. it's supposedly been going on for two decades and the software is beyond the reach of anti-virus programs the software maker involved is called kaspersky and it appears to suggest the nsa is behind the program. >> hmmmm. >>> bizarre to have the russians telling us about the u.s. spy program. and then reporting it on...