Hardware imported from China could leave US open to cyber-threats

Hardware imported from China could leave US open to cyber-threats
ZDNet (blog)
By Adrian Kingsley-Hughes | March 30, 2012, 6:13am PDT Summary:Cybersecurity advisor Richard Clarke warns that imports of chips, routers and hardware from China and other foreign suppliers could leave the US open tocyber-attacks and cyber-threats.

ZDNet (blog)

FBI's Outgoing Cyber Cop Says Americans Don't See Size Of Threat
NPR (blog)
by Carrie Johnson The FBI's top cyber cop retires today after nearly a quarter century in federal law enforcement. Shawn Henry started looking into computer issues in the run up to Y2K (the arrival of the year 2000). He says that experience left him ...

China refutes cyber attack charge
Firstpost
The Chinese defence ministry, while refuting the allegations, has stressed that it is in the common interests of the world to responsibly safeguard international cyber security, the China Daily reported. A report by US Northrop Grumman for the US-China ...

Firstpost

North Korea cyber attack capabilities seen as a threat to west
domain-B
North Korea has now added cyber attack capabilities to its arsenal of threatening weapons and this year, could offer plenty of opportunities for military provocations from Pyongyang, starting with a controversial rocket launch next month, ...

FBI's Outgoing Cyber Cop Says Americans Don't See Size Of Threat
North Country Public Radio
As he retires and heads into the private sector, Shawn Henry looks back at the growth in the cyber crime problem. Republican Gov. Scott Walker ran into voter backlash last year after he signed a law stripping public employees' unions of collective ...

Cyber attack on Pak's FTO website by 'Indian' hackers
Oneindia
Islamabad, Mar 30: A section of Pakistan's Federal Tax Ombudsman (FTO) website has been hacked on Friday, Mar 30 by Indian hackers, said media reports. According to media reports, the hackers have hacked one section of the website titled 'About FTO' ...

Oneindia

Who's Responsible For Meeting The Cyber Threat?
Scientific American (blog)
By Alan Woodward | March 30, 2012 | Recently an old colleague, Dr Andrew Rogoyski, came to lecture to our MSc students on how government deals withcyber security. Dr Rogoyski has studied the interactions between government and industry and his talk ...

Scientific American (blog)

Federal Watchdog Criticizes BPA's Cyber Security
OPB News
The federal auditor is concerned BPA is not well-enough equipped to handle a cyber attack. And the years-long review also dinged BPA for security gaps. That could jeopardize the regional electricity grid and in the worst case black out customers.

Cyber attacks on India linked to a Chinese hacker: Trend Micro
Hindu Business Line
Information technology security solutions firm Trend Micro has claimed that a Chinese hacker is responsible for cyber attacks on Government of India, military research organisations and shipping companies. According to Mr Baburaj Varma, Head (Technical ...

Hindu Business Line

Expert Says US May Be Losing Cyber War
Social Barrel
A report in the Smithsonian magazine today said at least one US counter-terrorism expert has warned that America must wake up to the fact that cyber terrorism is the most persistent threat the US is facing today, and may already be losing it if waking...

Social Barrel

Is Iran using hackers to attack the foreign press?
GlobalPost (blog)
The BBC said Thursday it was targeted in an Iran-based cyber-attack on March 1. Thought to be a DDoS attack, some parts of the BBC were unable to access their email or other internet services. BBC Director General Mark Thompson said the internet attack ...

Latta to talk Cyber Crime with FBI in Perrysburg
WTOL.com
Cyber Crimes have become a top priority in national security and Latta says they want to help area businesses from getting attacked. The FBI says the challenge is detecting Cyber Crime in it networks that have been hacked and determining where the ...

China claims to be victim of rising global cyber attacks
Press TV
China has been accused of doing massive cyber espionage. However, a recent computer security report says that China becomes the victim of the global cyber attack. Some experts are in fact convinced that Chinese cyber defense is not so efficient.

Press TV

SECURING AMERICA: BRACING FOR ANOTHER CYBER ATTACK
FOX News Radio
According to investigators at Symantec, a California-based computer security firm, the discovery of a new strain of DUQU shows the attackers are still active. DUQU acts like an advance team, one that steals data to lay the foundation for a majorcyber ...

FOX News Radio

Online voting not secure, cyber experts say
Washington Times
Lulz Security has stolen mountains of personal data in about a dozen different hacks, embarrassing law enforcement on both sides of the Atlantic. (Associated Press) Thirty-three states are planning to allow some form of Internet voting in November's ...

Washington Times

FBI: 'We are losing to hackers'
RT
Henry has gone on record saying hebelieves “the cyber threat is an existential one, meaning that a major cyber-attack could potentially wipe out whole companies,” said Henry on the FBI news website. The special agent since 1989 echoed his thoughts ...

RT

M'sia loses RM2.75 billion to cyber crime in five years
The Borneo Post
To make matters worse, Malaysians have an average awareness of cyber security that leaves plenty of room for enhancement. CyberSecurity Malaysia head of business development Mohd Anwer Mohamed Yusoff said loss of information particularly that involving ...

Threat of a Bullet in the Face Keeps Cybercrooks Cautious
PCWorld
Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. But it was the head of the USCyber Consequences Unit's take on why cybercriminals are actually ...

Cyprus ready for any net attack by Anonymous
Cyprus Mail
Cyber-security experts tell the Mail that while crippling the 13 top-level DNS servers is theoretically possible, it's a long shot. Even if Anonymous did pull it off, the disruption would last a few hours, if that. “ISPs possess the countermeasures to ...

Co-sponsors Top 100 for the Rogers-Ruppersberger Bipartisan Cyber Bill
DirectionsMag.com (press release)
The Rogers-Ruppersberger Cyber Security Bill continues to gather broad based bipartisan support. Chairman Mike Rogers and Ranking Member CA Dutch Ruppersberger today announced that over 100 Members of Congress are supporting The Cyber Intelligence ...

Former Pentagon Official Says All US Military Electronics From China Could ...
Business Insider
Clarke recently spoke to Ron Rosenbaum at Smithsonian Magazine and told him the government is slipping up again, that while we now have the ability to coordinate a successful cyber war, like slipping the Stuxnet virus into Iran's nuclear system, ...

Business Insider

Cybersecurity a growing issue for utilities
PennEnergy- Energy News (press release)
The US has seen a growing interest in cybersecurity even over the past year, with a number of high-profile cyber attacks occurring in 2011. Risk magazine reports that the country's electric power distribution system has become an important focus of ...

House Republicans' cyber bill promotes information sharing
Federal Times (blog)
Two Republican congresswomen introduced a cybersecurity bill this week that promotes information sharing and aligns closely with legislation sponsored by Sen. John McCain, R-Ariz. Reps. Mary Bono Mack, R-Calif., and Marsha Blackburn, R-Tenn., ...

A Call to Action on cybercrime!
Finextra
While counter-fraud groups such as the NFA's 'Fighting Fraud Together' and Get Safe Online are a positive step, and while it's good to hear yesterday that the European Commission is going ahead with plans for a Cyber Crime Centre, what's striking to me ...

Chinese Grad Student Hacks Indian Military Research Firms
New York Times (blog)
Amid a raging debate about who should be blamed for leaking the letter, India's cyber security is actually under attack, from a Chinese former graduate student who now works for Tencent, China's leading internet portal company. A report released Friday ...

Global cyberattacks linked to Chinese LuckyCat hacker group
Wired.co.uk
By Mark Brown Security firm TrendMicro has linked a series of cyber attacks in Japan, India and Tibet to a Chinese hacker group called Luckycat, and revealed one of the group's members to be a Chinese university student. The LuckyCat campaign has been ...

Wired.co.uk

Chinese giant put on hold
Adelaide Now
In January ASIO director-general of security David Irvine told the Sydney Institute of the rising global threat from cyber espionage. "Espionage targets include national secrets, valuable intellectual property, commercial intelligence and information ...

Hardware imported from China could leave U.S. open to cyber ...
Cybersecurity advisor Richard Clarke warns that imports of chips, routers and hardware from China and other foreign suppliers could leave the U.S. open to cyber-attacks and cyber-threats. View full ... View full post on National Cyber Security ...
Gregory D. Evans

Batten down the hatches: Anonymous – Coming Soon to Your ...
By Dennis Usle
As security professionals facing the rising tide of threats, many of us find ourselves researching and implementing next-generation perimeter defenses. ... that has been tailored for the task. The unique offering of Radware AMS also includes a full -blown SIEM for log collection, aggregation, correlation alerting and reporting. To further enhance and differentiate, the Radware AMS offering is backed by a dedicated 24/7 Emergence Response Team with expertise in cyber attackmitigation.
Radware Blog

FBI Cyber Chief Says U.S. Losing War Against Hackers | The Hacker ...
By noreply@blogger.com (THN Reporter)
FBI Cyber Chief Says U.S. Losing War Against Hackers. THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability.
The Hacker News [ THN ] - Updates...

Commerce Seeks IT Networkers For NIST, Maryland Cyber Lab
By Katelyn Noland
Commerce Seeks IT Networkers For NIST, Maryland Cyber Lab. Site: NIST.gov. The National Institute of Standards and Technology announced in February that it will partner with the state of Maryland to establish a cybersecurity center near ...
The New New Internet

MasterCard Data Security Issue | Edmund W. Schuster
By Edmund W. Schuster
MasterCard Data Security Issue. Though details are sketchy, there seems to be another seriouscyber attack designed to gain private information. This article provides few details on what could be a major problem: Johnson, Andrew R., 2012.
Edmund W. Schuster

New Survey Reveals That Your Employees May Be Most Likely to ...
By Jordan Brown
If you have a large or small business, you might be fearful of cyber crooks hacking through your IT defense. However, a new report (by the Ponemon Institute, sponsored by Trend Micro Inc) states that's not how data thefts ... Nearly 70% surveyed (709 U.S. IT & IT security experts) either agreed or strongly agreed their current security system could not ward off a hacker attack. 56% said even if employee's mistakes are accidents, data thefts were discovered accidentally! What makes data ...
Small Business Technology

Media Review for March 30, 2012 | Africa Center for Strategic Studies
By Africa Center for Strategic Studies
2009 Security Sector Engagement Photos · Sitemap · About .... Among the Algerian institutions that faced a cyber attack early Tuesday was the Algerian Tax Department (Direction Générale des Impôts or DGI). The North Africa Journal ...
Africa Center for Strategic Studies

3/29/2012: Video game Technology, STEM Apps, and More
By AlexOlesker
More here. In a submission to the Senate Armed Services Committee, General Kieth Alexander of the NSA and U.S. Cyber Command said that China was behind last year's attack on RSA's SecureID token system. More here. Share this: Email ...
FedCyber.com

An Ethical Hackers View On The Dangers Of Mobile Malware ...
By Jaime Blasco
... to the valuable data they're carrying on their phones. Using a combination of SMS and social engineering tactics, hackers can spoof the phone number of a friend or a colleague to send an SMS asking the victim to click on a suspicious link etc, and opening up the phone to attack. ...Recently he ran a Cyber Warfare conference for the Head of Defence in Spain demonstrating attacks in real time and showing how to defend against them. He's also a regular contributor to Hakin9 and ...
Business Computing World

Expert insights 3: Cyber threats and security in the Caribbean | ICT ...
By mmarius
Aaron Manzano, of HMP Consulting in Trinidad and Tobago, and a IT/network security expert, continues our Q&A series on cyber security in the region. The only truly secure system is one that the development process is controlled from the ...
ICT Pulse

Richard Clarke: All U.S. Electronics From China Could Be Infected ...
By John Reed
Well, former U.S. counter-terrorism czar –currently running his own cybersecurity firm — Richard Clarke is coming out and saying that all electronics made in China may well have built-in trapdoors allowing Chinese malware to infect American systems ... What's to stop real parts made in China from carrying an equally dangerous cyber trapdoor? ... “My greatest fear,” Clarke says, “is that, rather than having a cyber-Pearl Harbor event, we will instead have this death of a thousand cuts.
Defense Tech

Delimiter – Huawei contract ban stokes fear of cyber cold war
By The Guardian
The company announced this week it had been banned from tendering for contracts in Australia's A$38bn (£24.7bn) National Broadband Network (NBN) because of cybersecurityconcerns. Then it emerged that ... Against that background, the New York Times says Symantec had become concerned that, as the US government shifted an information-sharing program about cyber threats to the control of the department of homeland security, it would be frozen out. For a company reliant ...
Delimiter

Cybersecurity and the Warfare State | RedState
In a small safe in my basement rests a government-issue .45 caliber pistol. When I tell friends that I inherited this piece from my father, they assume he carried it ...
www.redstate.com/.../03/.../cybersecurity-and-the-warfare-state...

Turkey warned against potential cyber attacks | Cyber Warzone
TÜBİTAK has warned Turkish authorities that the country should be ready against potentialcyber attacks and that current studies in Turkey on how to respond to ...
www.cyberwarzone.com/.../turkey-warned-against-potential-c...

Cybersecurity's 8-Step Plan for Internet Freedom | Center for ...
Cybersecurity is important to all Internet users because it can make the Internet a safer place to shop, conduct business, and communicate with others. However ...
https://www.cdt.org/.../2803cybersecuritys-8-step-plan-internet...

Increasing Cyber Threats Call for More Innovative Cybersecurity
Eric Cole, a Booz Allen Hamilton Principal, is an industry-recognized security expert with over 20 years of experience in information technology with a focus on ...
www.boozallen.com/.../cyber-threats-innovative-cybersecurity

US-CERT - About Us
US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyberinformation sharing, and proactively manage cyber risks to the nation while ...
www.us-cert.gov/about-us/

Pentagon sees North Korea cyber threat, 2012 provocations

Pentagon sees N.Korea cyber threat, 2012 provocations
Reuters
* Cyber warfare new weapon in North Korea's arsenal * April 'satellite' launch aimed at improving rocketry (Adds missile launch preparations detected in paragraphs 2, 12-14) By Paul Eckert WASHINGTON, March 28 (Reuters) - North Korea has added ...

Pentagon sees North Korea cyber threat
Times of India
WASHINGTON: North Korea has added sophisticated cyber attack capabilities to its arsenal of threatening weapons and this year is rife with opportunities for military provocations from Pyongyang, beginning with a controversial rocket launch next month, ...

Feds warn of cyber threats, seek expanded authority for DHS
ITworld.com
By Kenneth Corbin, CIO | Security Add a new comment March 28, 2012, 5:49 PM — Federalcybersecurity officials on Wednesday gave lawmakers a sobering warning about the vulnerabilities of critical information technology systems across the public and ...

Central Europe power sale body braces for cyber raid
Reuters
The German-based Central Allocation Office (CAO) said Anonymous was planning to attack its computer servers on Saturday. "Due to their development and growth in successful attacks in the last year we are taking their information seriously and with ...

Huawei contract ban stokes fear of cyber cold war
The Guardian
Against that background, the New York Times says Symantec had become concerned that, as the US government shifted an information-sharing program about cyber threats to the control of the department of homeland security, it would be frozen out.

The Guardian

US Cyber Command chief blames China for RSA SecurID attack
Techworld.com
By John E Dunn | Techworld | Published: 15:03, 29 March 2012 Last year's major attack on RSA's SecurID token system was the work of the Chinese, the US Cyber Command chief is reported to have said during a submission to the Senate Armed Services ...

FCC Official: Cybersecurity Shouldn't Curtail Privacy
National Journal
AP Photo/Mark J. Terrill Cyber security analysts work in the "watch and warning center" during the first tour of the governmentís secretive cyber defense lab Thursday, Sept. 29, 2011, in Idaho Falls, Idaho. The Homeland Security Department's Control ...

Military's cyber chief backs increased oversight of critical infrastructure
Federal Times
Operators of the most critical systems also should be required to report cyber attacks to the government, Alexander said. Both of those measures are included in a bipartisan cybersecuritybill introduced in February by Sen. Joe Lieberman, I-Conn.

Eurocrats versus the cyber criminals
IT PRO
The EU already has a cyber security body, in the form of Crete-based ENISA, which aims to support businesses and governments from cyber attack at the systems and network level. ENISA works with the EU's national CERTs, or computer emergency response ...

IT PRO

Over RM2bil lost to cyber crime in five years
Malaysia Star
"The cyber security awareness among organisations and individuals in the country is still low. "Admittedly, the more developed we are in terms of the cyber world, the higher the risk of cybercrimes," he told reporters here. He earlier witnessed the ...

'Not winning' war on hackers: FBI cyber chief
msnbc.com
At a security conference, Mueller said he expects cyber threats to pass terrorism as the nation's top threat. Henry, who will be leaving the bureau after more than 20 years and will work for a cybersecurity firm, told the Journal that more and more, ...

msnbc.com

Philippines ranks 13th in list of countries launching cyber-attacks
Inquirer.net
MANILA, Philippines—The Philippines has been tagged as one of the world's biggest sources of a dangerous kind of cyber “attack” designed to take down entire computer networks and shut down key consumer services. The latest report by Russian Internet ...

North Korea's cyber warfare capability grows, U.S. general says
Honolulu Star-Advertiser
Sharp didn't cite cyber attacks as part of the North Korean arsenal, and Thurman spoke of continued improvements in conventional weaponry. North Korea can attack Seoul “and can deliver both high explosive and chemical munitions with little or no ...

Pentagon wants civilian help to thwart hackers
TG Daily
The head of US Cyber Command says the Pentagon needs private-sector cooperation in reporting computer network attacks to stop the "greatest [unauthorized] transfer of wealth in history." "If we can't see the attack, we can't stop it.

The Militarization of Cyber Security as a Source of Global Tension
ISN
The diffuse nature of the threat, coupled with a heightened sense of vulnerability, has brought about a growing militarization of cyber security. This has resulted in too much attention on the low probability of a large scale cyber-attack, ...

ISN

Peek at rules of engagement in cyber battle
CNN (blog)
by Suzanne Kelly General Keith Alexander, who serves as both Director of the National SecurityAgency as well as Commander of Cyber Command had some interesting things to say before the Senate Armed Services Committee on Tuesday.

AACC Cyber Facility Set To Open in August
Patch.com
He spent time outlining the college's recent expansion of cyber offerings, which are designed to leverage the proximity to the US Cyber Command, National Security Agency and other agencies. “Our students are going to be able to work in any industry,” ...

Algerians and Moroccans Use Cyber Attacks to Settle their Political Feuds
North Africa Journal
The North Africa Journal | In the evening of November 8, 2011, nearly 200 Moroccan companies and other institutions were the targets of cyber attacks. The exact figure was not confirmed but the event led to the defacing of corporate and institutional ...

How the US may already be losing the cyberwar
Digitaltrends.com
In a sobering interview with Smithsonian Magazine recently, Richard “Dick” Clarke — the former head of US counterterrorism under three Presidents — spoke candidly about the weakness of America's cyber-warfare defenses. A chief counterterrorism ...

Digitaltrends.com

Cybersecurity: Are we ready?
Financial Times
We believe there's a slightly different question that boards and senior business leaders should be asking the technology team about cyber-security: “Are we ready?” An ill-thought-out response to an attack can be far more damaging than the attack itself ...

Australia bars Huawei from bid as Chinese cybersecurity fears grow
Independent Online
... but said they originated from the Australian Security Intelligence Organisation, which has become increasingly verbal about the problem of internet-based espionage. In its latest annual report to parliament it said: “Espionage by cybermeans… is ...

Independent Online

NDP vote disruption worries experts
TheChronicleHerald.ca
Questions about e-voting were raised after the NDP leadership convention was disrupted by acyber attack. Not all of them have been answered satisfactorily, say software experts, despite reassurances from Scytl, the software company that handled the ...

House Republicans introduce new cybersecurity bill
Chicago Tribune
That bill would allow the National Security Agency, for example, to tell internet service providers about different cyber threats the intelligence agency has detected so the ISP can then block traffic to its customers from anything with that signature.

Cyber Security Company Lunarline Wins FAA Privacy Contract
Sacramento Bee
About LunarlineLunarline is a leading provider of cyber security solutions, specialized IA services, and certified security training to all US Federal Government (Civilian, DoD, and IC), as well as to customers in selected commercial markets.

Cyber criminals launch their latest bogus Microsoft security alert
ComputerActive.co.uk
Computeractive has uncovered a sophisticated phishing attack that fools people into downloading malicious software by mimicking a genuine Microsoft Windows security alert. A variation on rogue anti virus software, the email includes a link to a ...

ComputerActive.co.uk

China Has Hacked Every US Major Company, Claims Richard Clarke
WebProNews
If you listen to people talk about cyber security long enough, you'll hear a hundred subtle variations of that statement. Another version goes: “There are two kinds of companies: those that know they've been hacked, and those that don't,” implying that ...

A Mother's Message: Cyber-bullying is Serious
fox4kc.com
A mother is sharing her powerful story about how an extreme case of cyber-bullying destroyed her daughter. In 2006, 13-year-old Megan Meier killed herself in her home in O'Fallon, Missouri, after a boy she was flirting with online turned against her ...

fox4kc.com

Cybercom Head Addresses Attack Authority Questions With Lawmakers
ExecutiveGov
The National Security Agency's director told lawmakers Tuesday that the government should not launch cyber attacks at the discretion of individual military leaders, the Washington Post reports. Army Gen. Keith Alexander, also head of the US Cyber ...

Duqu – Cyber weapons factory still operating … it's ... - Security Affairs
By paganinip
The security application will be distribute for free during the next weeks, some experts even believe that some instances of malware can still be present in the systems of the nuclear site of Natanz in Iran. If Stuxnet seem to be beaten, ... Duqu is quite different from its relative, it has a modular structure like Stuxnet but it isn't equipped with modules for SCADA systems attack. It is only able to steal information .... From → Cyber warfare, Malware, Security. No comments yet. Click here to ...
Security Affairs

Mobile Market Boom Leads To Increasing Cyber Threats ...
By Mellisa Tolentino
Increase in cyber threats. During the launch of the new Cyber Security Centre at Oxford University, Martin Sadler, director of the Cloud and Security Lab at HP in Bristol, England, expressed his concerns regarding the mobile market boom. Sadler stated that by the end of this decade, ... The problem is, most people won't even have a clue about what cybersecurity is, let alone how to fend off malicious attacks. “If you talk about four billion people going online by 2020, a large number of ...
SiliconANGLE

FBI's top cyber cop admits that hackers are winning | The Raw Story
By Stephen C. Webster
His comments were first carried by The Wall Street Journal, which keyed in to the ongoing debate over new cybersecurity policies. Some in government believe that new regulations may be needed to help ... Ultimately for Henry, who is preparing to leave the FBI to work on cyber security matters in the private sector, the bottom line is that the Internet's current status quo simply is not working for business anymore. “…[You] never get ahead, never become more secure, never have a ...
The Raw Story

POSSCON 2012 Day 2 – Breakout Sessions 1 | POSSCON 2012
By Grizz
Dr. Douglas Maughan of the DHS S&T Cyber Security Division will discuss how open source software fits into the federal cybersecurity strategy and highlight the Homeland Open SecurityTechnology (HOST) program which leverages open ...
POSSCON 2012

Iran continues its campaign against the press - Committee to Protect ...
By Committee to Protect Journalists
Security forces arrested Tahmineh Monzavi, an award-winning freelance photographer, at her workplace in the capital, Tehran, on February 19, and searched her home, reformist news websites said. The journalist has documented sensitive social issues in the ... Also this month, the BBC was targeted by a "sophisticated cyber-attack" that caused disruptions in its email and Internet services, the broadcaster reported. The BBC's director general, Mark Thompson, said the Internet attack ...
Committee to Protect Journalists

In Wake Of Cyber Attacks, Pentagon Plans New Rules Of ...
By Salman
A number of US companies as well as government-related organizations have been targeted through cyber attacks and sensitive data has been either stolen or leaked to the web. So far, the role of Pentagon has been fairly limited when it came to cyber warfare. But now, this ... According to the new proposed rules, if an attack is launched domestically, Department of HomelandSecurity will work to protect the domestic networks, in collaboration with private companies. However, if it is ...
TheTechJournal

Hacktivist Group Anonymous Achieved Goal | AFCEA SIGNAL Scape
By George I. Seffers
During the initial investigation, however, the company did not know it was not a malware attack.... The company's response included disclosing the security breach to their customers and turning to the country's cyber centers for assistance.
AFCEA SIGNAL Scape

David Skillicorn Weighs in on NDP Cyber Attack - Computing News
By belloa
David was interviewed about the cyber attack on the NDP leadership convention that used more than 10000 computers, on Global TV National, Toronto Star, Edmonton Journal, Winnipeg Free Press, Halifax Chronicle-Herald, Ottawa Citizen, ...
Computing News

World News - US: North Korea using hackers; food aid suspended ...
By msnbc.com news services
WASHINGTON -- North Korea has added sophisticated cyber attack capabilities to its arsenal of threatening weapons and this year is rife with opportunities for military provocations from Pyongyang, senior U.S. defense officials said on Wednesday. ... The officials told the House of Representatives Armed Services Committee that North Korea's large conventional military, nuclear weapons programs, ballistic missiles and newer capabilities in cyber warfare were all threats to the United ...
Newsvine - World News - Articles

EU legislation – Digging below the FUD line « Cатсн²² (in)sесuяitу ...
By ChrisJohnRiley
Cyber-attack tools. The proposal also targets tools used to commit offences: the production or sale of devices such as computer programs designed for cyber-attacks, or which find a computer password by which an information system can be accessed, would ... Those reading this article without further context would have little choice but to think back to the poor decisions made in Germany (see 202(c) ) that resulted in many security researchers from upping sticks and moving out.
Cатсн²² (in)sесuяitу...

Cyber Espionage: Attend SC Congress World eSymposium ...
By Continuity_Compliance
Filed Under: Cybersecurity, Information Security, Webinars Tagged With: classified documents, critical information, cyber espionage, cyber security, cybersecurity, Information Security, network control, proprietary documents, risk management ...
Continuity Compliance

Foreign Confidential ™: US General Warns of Growing N. Korea ...
By Confidential Reporter
The top commander of U.S. forces in South Korea says he is concerned about North Korea's growing capability to carry out attacks through nonconventional means, such as cyber warfareand chemical weapons. Speaking to the U.S. House Armed ... missile and cyber," Thurman said. "The development of these asymmetric capabilities and the forward stationing of its conventional forces provide North Korea the ability to attack or provoke the Republic of Korea with little warning.” ...
Foreign Confidential ™

Government Information » Cybersecurity: Selected Legal Issues
By alan zoellner
This report discusses selected legal issues related to recent legislation about vulnerabilities of critical infrastructure to cyber threats and proposals to share cyber threat information among private sector and government entities. From the ...
Government Information
DOD Needs Industry's Help to Catch Cyber Attacks, Commander ...
The Defense Department needs private-sector cooperation in reporting computer networkattacks in real time to stop what has been the "greatest transfer of ...
www.defencetalk.com/dod-industry-cyber-attack-security-help...

Rwanda: Institutions Fight Cyber Attacks | Cyber Warzone
Following recent cyber-attacks that have been targeting East African companies, several institutions in the country have put in place security policies to counter ...
www.cyberwarzone.com/.../rwanda-institutions-fight-cyber-att...

Increasing Cyber Threats Call for More Innovative Cybersecurity
Booz Allen is helping the FAA take a more proactive stance on ensuring safety through the use of Safety Management Systems (SMS)
www.boozallen.com/insights/insight-detail/49683481

Should US Worry About North Korea's Cyber Attack Capability?

Should US Worry About North Korea's Cyber Attack Capability?
International Business Times
By Sreeja VN: Subscribe to Sreeja's RSS feed The United States should worry more about North Korea's cyber attack capabilities than its nuclear arsenel, if the latest reports are any indication. A Bloomberg report has quoted General James Thurman, ...

International Business Times

Cyber attack on NDP election used thousands of computers
Edmonton Journal
In the world of cyber security, it's known as a distributed denial of service attack. "We deeply regret the inconvenience to NDP voters caused by this malicious, massive, orchestrated attempt to thwart democracy," general manager Susan Crutchlow said ...

Cyber attack targeted NDP voters
Calgary Herald
According to Scytl Canada, the company hired by the NDP to con-duct the vote, the attack was an at-tempt to crash or slow down the voting website by "saturating servers with bogus external communications requests" and making it difficult for legitimate ...

DoD lacks enough information to stop cyber attacks
FederalNewsRadio.com
DoD's Cyber Command needs real-time information on attacks so it can stop them before they succeed, said Army Gen. Keith Alexander, who leads both the National Security Agency and USCyber Command. But right now, the military has a very hard time ...

Bill's goal: Boost cyber-security
The Desert Sun
Mary Bono Mack on Tuesday introduced legislation to deal with the growing threat of cyberattacks against major American corporations and the federal government. It's called the Strengthening and Enhancing Cybersecurity by Using Research, Education, ...

Defense Department Needs Industry's Help to Catch Cyber Attacks
Kansas City infoZine
"When an attack occurs, we're told about it after the fact." Alexander added, though, that industry should be monitoring their own systems with help from Cyber Command and the Department of Homeland Security. "I do not believe we want the NSA or Cyber ...

U.S. considers new cyber security rules
UPI.com
WASHINGTON, March 28 (UPI) -- The head of US cyber security says presidential authorization should be required, in some cases, before the US military can attack enemy computer systems. Gen. Keith Alexander, head of US Cyber Command, has said he wants ...

Australia Bans Huawei From Web Network
CIO Today
Citing cybersecurity concerns, the Australian government cited wariness about China's cyber warfare efforts, a spate of hacking attempts aimed at Western companies and the role of Chinese equipment providers. Australia has banned Chinese technology ...

CIO Today

US Outgunned in Hacker War
Wall Street Journal
By DEVLIN BARRETT WASHINGTON—The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning," he said.

Wall Street Journal

Cyber Cop: US Outgunned in Hacker War
MyFox Chicago
(The Wall Street Journal) - The FBI's top cyber cop has offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning." Shawn Henry, who is preparing to leave the FBI after more ...

MyFox Chicago

Company IDs 10000 computers behind cyber-attack on NDP leadership vote
Canada.com
By Tobi Cohen, Postmedia News March 27, 2012 OTTAWA - A large-scale cyber-attack involving more than 10000 computers was responsible for the online polling problems during Saturday's NDP leadership vote, according to Scytl Canada, ...

House Republicans push info-sharing cyber bill
Chicago Tribune
WASHINGTON (Reuters) - US companies and the federal government would be able to share information about cybersecurity threats more easily under a bill introduced in the US House of Representatives on Tuesday. The proposed legislation and related bills ...

Turkey warned against potential cyber attacks
www.worldbulletin.net
TÜBİTAK has designated a committee to prepare for a cyber attack in Turkey. A cyber attack drill was performed last year, directed at the websites of public institutions, he added. Dikici noted that hackers also threaten the security of online media.

www.worldbulletin.net

NSA, Cybercom Lead Pushes for New Cyber Law
ExecutiveGov
The National Security Agency's director advocated for public-private sector partnerships to identify and combat cyber threats at a Tuesday congressional hearing, American Forces Press Service reports. Army Gen. Keith Alexander, also head of Cyber ...

The wild wild web: top US cyber-cop says we're losing the war against computer ...
VentureBeat
“We're not winning,” the nation's top cyber-cop told the Wall Street Journal. ”I don't see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it's an unsustainable model.

VentureBeat

Retiring FBI official says current cybersecurity strategy 'unsustainable'
Fox News
11, 2011: A computer forensic examiner looks for evidence on hard drives at the Department of Defense Cyber Crime Center in Linthicum, Md.AP Photo/Cliff Owen A retiring top deputy at the FBI has given a blunt assessment of public and private efforts to ...

FCC official endorses cybersecurity regulation
The Hill (blog)
By Brendan Sasso - 03/28/12 11:48 AM ET A top Federal Communications Commission (FCC) official on Wednesday endorsed a bill that would give the government new regulatory powers to protect against cyber attacks. James Barnett, chief of the FCC's Public ...

Oxford Uni chucks big brains at ivy-covered cybersecurity hub
Register
By John Leyden • Get more from this author Oxford University boffins launched an interdisciplinary Cyber Security Centre on Monday. The new research hub aims to boost academic research into infosecurity. The Oxford Cyber Security Centre aims to ...

NSA Chief: China Behind RSA Attacks
InformationWeek
... China is stealing a "great deal" of military-related intellectual property from the United States and was responsible for last year's attacks against cybersecurity company RSA, US CyberCommand commander and National Security Agency director Gen.

Group Claiming Anonymous Affiliation Hacks Ministry of Justice Website
AllAfrica.com
By Mischa Benoit-Lavelle, 28 March 2012 The most recent cyber-attack in Tunisia took down the website of the Ministry of Justice this morning, and a group claiming affiliation with the loose international collective Anonymous has taken credit for the ...

Pentagon devising new rules of engagement for cyber attacks as vulnerability ...
The Verge
By Bryan Bishop on March 28, 2012 07:54 am 0Comments The Pentagon made it clear last November that it saw hacking and cyber attacks as acts of aggression that merited a military response. This past Tuesday, the head of Cyber Command provided insight on ...

America is losing the cybersecurity war; China hacked every major US company
Computerworld (blog)
To begin with, the "United States government did the Stuxnet attack," Clarke claimed during an interview with Smithsonian. After dropping that bombshell, he then moved on to cyberespionage, stolen intellectual property and imported tech tainted with ...

Symantec Cuts Ties With Huawei in Wake of Australian Cyber Security Concerns
International Business Times
However, in the wake of increasing cyber security concerns piling up against Huawei, Symantec decided to exit the venture, fearing that it would prevent it from gaining access to US government classified information regarding cyber threats.

CYBERCOM lead touts partnership with DHS
FierceGovernmentIT
The nation's current cyber strategy is not stovepiped, it's integrated and it's effective, said Gen. Keith Alexander, commander of US Cyber Command and director of the National SecurityAgency, March 27 before the Senate Armed Services Committee.

Cyber attack on NDP leadership vote was 'orchestrated, professional' hit
ITBusiness.ca
A DDoS botnet was at the root of the attack. But the culprits behind it have yet to be cornered. A botnet involving over 10000 computer IP addresses was the culprit of an “orchestrated, professional” DDoS attack that caused voting delays in last ...

DOD vs. DHS: Who should mind the US' cyber defense?
Defense Systems
With $3.4 billion requested for fiscal 2013, cybersecurity is one of the few areas of expanding investment in an otherwise lean DOD budget, Army Gen. Keith Alexander, commander of the USCyber Command and director of the National Security Agency, ...

Company IDs 10000 computers behind 'malicious' cyber-attack on ...
In the world of cyber-security, it's know as a distributed denial of service attack. "We deeply regret the inconvenience to NDP voters caused by this malicious, massive, orchestrated attempt to thwart democracy," general manager Susan ...
Calgary Herald - News

Cyber Self Defense For Non-Geeks | Digital Dao
By Jeffrey Carr
They won't be sufficient for when you're in high-risk locales and they won't stop a targeted attack, but they will make it much less likely that you'll suffer a serious breach because of poor cyber security habits or an over-reliance on your antivirus ...
Digital Dao

3/27/2012: White House Cyber Priorities, Stolen Military Passwords ...
By admin
House Republicans introduced a cybersecurity bill that would encourage sharing cyber threat information with measures like protection from lawsuits. More here. Hackers stole passwords, e-mail addresses, and other information from nearly ...
CTOlist.com

Bill's goal: Boost cyber-security – Desert Sun | Blackmere Consulting
By Blackmere
Mary Bono Mack on Tuesday introduced legislation to deal with the growing threat of cyberattacks against major American corporations and the federal government. It's called the Strengthening and Enhancing Cybersecurity by Using ...
Blackmere Consulting

Company IDs 10000 computers behind 'malicious' cyber-attack on ...
By NWOTruth
The company said it has identified more than 10000 IP addresses behind the “hundreds of thousands of false voting requests to the system.” The “network of malevolent computers,” or “botnet,” behind the attack involved computers around the ...
NWOTruth

Cybersecurity: Another Reason for Smart Grid Standardization ...
By Rohit Khera
Cybersecurity Utilities today are faced with the daunting task of securing their electronic and computer systems from potential cyber threats of increasing sophistication. Indeed, there is growing recognition among government officials and policymakers about the ... In the realm ofsecurity applied to technology, the industry approach is to leverage existing standards to the greatest extent possible, and to incorporate security standards from the IETF, NIST and IEC/ISO to name but a few.
GridTalk

The Grim State Of Caribbean Cybersecurity | SiliconANGLE
By Mellisa Tolentino
Harper also added that the most common misconceptions of organizations about cyber security is that technology alone can provide adequate, effective and sustainable protection for information assets. He also gave some tips as to how ...
SiliconANGLE

FBI Top Cyber Cop: U.S. Outgunned in Hacker War « Federal ...
By McNabb Associates, P.C.
“U.S. Outgunned in Hacker War. By DEVLIN BARRETT. WASHINGTON—The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: ... Mr . Henry, who is leaving government to take a cybersecurity job with an undisclosed firm in Washington, said companies need to make major changes in the way they use computer networks to avoid further damage to national security and the ...
Federal Criminal Defense Lawyers

Lawfare › Bono Mack and Blackburn Introduce Cyber Bill in House
By Paul Rosenzweig
Bono Mack and Blackburn Introduce Cyber Bill in House. by Paul Rosenzweig. Representatives Mary Bono Mack (R-CA) and Marsha Blackburn (R-TN) have introduced a companioncybersecurity bill in the House of Representatives that is ...
Lawfare

NSA Science of Security 'Lablet' Established - Institute for Advanced ...
By editor
It is widely understood that critical cyber systems must inspire trust and confidence, protect the privacy and integrity of data resources, and perform reliably. To tackle the ongoing challenges of securing tomorrow's systems, the NSA concluded that ... Some ideas from fault-tolerant computing can be adapted to the context of security. Strategies from control theory will be extended to account for the high variation and uncertainty that may be present in systems when they are under attack.
Institute for Advanced Analytics...

US govt is searching your Facebook and Twitter for these keywords ...
By facthai
Cyber security; Botnet; DDOS (dedicated denial of service); Denial of service; Malware; Virus; Trojan; Keylogger; Cyber Command; 2600; Spammer; Phishing; Rootkit; Phreaking; Cain and abel; Brute forcing; Mysql injection; Cyber attack; Cyber ... ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, ...
FACT - Freedom Against Censorship...

`Malicious' cyber-attack on NPD traced to 10000 computers
OTTAWA - A ``sophisticated'' Internet attack that threw the NDP's weekend leadership convention into turmoil was caused by a professional who used more than ...
www.vancouversun.com/news/Malicious.../story.html

Hong Kong 'mock vote' under cyber attack: university - Yahoo! News
From Yahoo! News: A website offering Hong Kongers a chance to vote for their next leader ahead of this weekend's official election is under "systematic attack" ...
news.yahoo.com/hong-kong-mock-vote-under-cyber-attack-u...

Inside NIST's cybersecurity strategy -- Washington Technology
NIST's Kevin Stine explains the agency's priorities and the power of automated reporting.
washingtontechnology.com/articles/.../tech-trends-cyber.aspx

Irishman who deciphered the cyber-virus attack on Iran | Cyber ...
He became the cyber sleuth who deciphered the Stuxnet virus that sabotaged the Iranian nuclear programme. Ó Murchú first became aware of Stuxnet in June ...
www.cyberwarzone.com/.../irishman-who-deciphered-cyber-v...

Should US Worry About North Korea's Cyber Attack Capability ...
There are limited seats available for the conference on 24th & 25th of May. Register before 1st of May and save EUR300!
news.hitb.org/.../should-us-worry-about-north-koreas-cyber-at...

Cybersecurity for Attorneys: Understanding the Ethical Obligations
As attorneys continue to embrace the latest technology, it is critical to understand and address the ethical obligations that go with it—from SmartPhones and ...
www.americanbar.org/.../cyber-security-for-attorneys-understa...

NDP convention hit by cyber attack; voting delayed - Topix
NDP leadership candidate Thomas Mulcair, left, and his wife Catherine Pinhas, right, react to the second ballot results during the NDP leadership convention in ...
www.topix.com/forum/tech/computer.../TN4N7RQ622JISV0B...

Cyber-Attack - To Small to Assail? Cartoon | fearlessweb
On one hand, I'm grateful that we've never been targeted for a cyber-attack. On the other...
fearlessweb.trendmicro.com/.../cyber-attack-to-small-to-assail-...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com