Cybereye

CyberEye

  • Cybersecurity

    When reforming FISMA, don't throw out what works

    After more than a decade, the Federal Information Security Management Act could use some updating, but Congress should take the time to look at what really has worked.

  • Man in a downpour

    Denial-of-service attacks: It's a problem, bro

    Distributed denial-of-service attacks are becoming more common, more powerful and the botnets that support them more resilient.

  • Dirty coffee cups in sink

    Disable Java? For agencies, the real question is: Why not?

    Once again admins are being advised to disable Java in the wake of a new vulnerability. It's time to decide how important this plug-in is to your enterprise and when -- if ever -- it should be used.

    Comments: 2
  • Chain with string as center link

    An emerging target for cyber attacks: Trust

    A new study of the evolving cyber threat landscape identifies a half-dozen areas likely to be high-profile targets in the immediate future, including something called "trust infrastructure."

  • PIV card and reader

    Agencies need to put the "I" into security

    Today's systems, policies and procedures were developed to lock information down, not to share it securely. Interoperable credentials could be the key.

  • Businessmen looking back toward a storm

    Cyber threats of 2013: Look back, not forward

    New technology doesn't define the cyber threat landscape, say researchers crunching numbers from eight years of Verizon Data Breach Investigation Reports.

    Comments: 2
  • User with computer mouse

    New malware waits for a mouse click before executing

    The Trojan Upclicker evades automated detection tools by monitoring mouse activity to make sure it is dealing with a human before jumping into action.

  • Bill Jackson bats 500 on 2012 threat predictions

    Threat predictions for 2012: The hits and misses

    Despite taking the safe road by predicting that threats for 2012 would be a lot like those of 2011, the CyberEye still managed to only bat about .500.

    Comments: 1
  • https signals a secure site

    Mobile users get no clue they're visiting malicious sites

    With security information limited by screen size, even experts can't tell when they're visiting malicious sites, according to a Georgia Tech study.

  • Three signs saying "No"

    BlackBerry’s blacklist: 106 passwords you can't use

    RIM's long-awaited BlackBerry 10 OS contains a blacklist of passwords that users will not be allowed to use. Maybe it's not a great idea, but it's a good one.

    Comments: 4