Cybercrime

  • Pell Center Lecture Explores Central Issues and Characters of Cybersecurity

    NEWPORT, R.I. — Last night, Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, Peter W. Singer, discussed his latest book “Cybersecurity and Cyberwar: What Everyone Needs to Know” and took his captivated audience on a fascinating tour of the central issues and characters of cybersecurity. The event was part of the ongoing Pell Center lecture series on Cyber Leadership. “A generation ago, ‘cyberspace’ was … Read More

  • National Cybersecurity Framework — Can Standards of Best Practices Drive Organizational Decision-Making with Regards to Cybersecurity?

    Critical systems–the majority of which are owned and operated by the private sector–are increasingly vulnerable to cyber attacks that could cause large-scale disruption or economic loss. Amid Congress’ inability to pass comprehensive cybersecurity legislation, the National Cybersecurity Framework published by the National Institute of Standards and Technology (NIST) marks an important step forward in a national effort to combat cybercrime and protect our critical infrastructure. The blueprint for the Framework … Read More

  • Dozens of Senior Private Sector Leaders Gather at the Pell Center for Rhode Island’s first major Corporate Cybersecurity Exercise

    Newport, RI—Over three dozen senior private sector executives gathered at the Pell Center on October 9, 2013 to participate in a six-hour, discussion-based cybersecurity table top exercise. The event marked the start of the Pell Center’s Rhode Island Corporate Cybersecurity Initiative, which aims to bring together senior leaders from various industries—defense, financial services, technology, health care, etc.—who can affect change and make Rhode Island’s corporate community a national model of cybersecurity leadership. … Read More

  • The Human Side of Cybercrime (OpEd)

    What do cyber criminals, Greek gods, and Facebook have in common? They are all connected to “Zeus,” a Trojan horse malware program first identified in 2007, when it was used to steal information from the U.S. Department of Transportation, and that now may be lurking in a link on rigged Facebook pages. Along with phishing campaigns, Trojans are the principal method chosen by cyber criminals to attack users, allowing them … Read More

  • This week in a Nutshell: Celebrities Get Hacked as Government Puts Cybersecurity on the Spotlight

    The vulnerability of the nation’s cyber networks were made clear on Tuesday after a website claimed it had stolen the financial information of high-profile Americans, including first lady Michelle Obama, Vice President Biden, and rapper Jay-Z. The website, hosted from a “.su” URL, posted the individuals’ names, addresses, and other sensitive information including credit reports and Social Security numbers. Other targets whose information has been posted on the site include … Read More

  • State of the Union Address and Cybersecurity Executive Order: President Obama Takes Action to Protect America’s Critical Infrastructure

    In his first State of the Union address since the election, President Obama warned: “We know hackers steal people’s identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems.” The President then added: “we cannot look back years from now and wonder why we did … Read More

  • Department of Homeland Security to Java Users: Beware of Cyber Attacks!

    Over the weekend, the Department of Homeland Security’s cyber division, called US-CERT (Computer Emergency Readiness Team) issued a warning to users of the popular Java programming language—a coding platform that has existed for decades—because of vital security holes it may create. The alert said that Java 7 Update 10 and earlier versions of the software contain a critical vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary commands … Read More

  • New Year’s Resolutions for Cybersecurity

      2013—as the Champagne hangover fades, the New Year’s resolution begins. For many, January marks the opportunity to start fresh and improve on the previous year by setting goals—“resolutions”—and striving to achieve them. Weight loss, exercise, and money management are among the most common of all resolutions. After a season of too many cookies and cakes, not to mention holiday parties and gift-purchases, it’s only natural that a vow to … Read More

  • Online Holiday Shopping & Cyber-Security: How to Stop a Digital Grinch

    With only two weeks remaining in the holiday season, online shopping sales—which have already reached new records this year—may peak even higher as consumers rush to complete their online shopping in time for shipments to arrive before the holidays are over. In early October, the National Retail Federation projected that more than 52% of consumers would purchase a holiday gift online. Shoppers, however, appear intent on making Santa’s Elves work … Read More

  • Status Update: I’ve been Hacked!

    Chances are high that, at some point today, either you or someone you know has posted an online message through one of the many social media platforms available. Hundreds of millions of users flocked to social networks this year to do precisely that, and they are doing it in record numbers though smart-phones, tablets, or desktop computers. The problem, however, is that this development has been noticed by one group … Read More