Cyber Command Lawyer Praises Stuxnet, Disses Chinese Cyber Stance

Cyber Command Lawyer Praises Stuxnet, Disses Chinese Cyber Stance
AOL Defense
By Sydney J. Freedberg Jr. The Stuxnet computer worm that damaged Iranian nuclear facilities – widely suspected to be an Israeli or even US covert action – was a model of a responsibly conducted cyber-attack, said the top lawyer for the US military's ...

19-Year-Old Wins Cyber Security Competition
RedOrbit
A 19-year-old UK student has been named the “Cyber Security Champion” after winning a competition showcasing Internet security intelligence. Jonathan Millican won the award after a six-month-long challenge designed to attract talented people to the ...

RedOrbit

Busch, Ruppersberger to attend cyber security reception, commission meeting ...
Washington Post
ANNAPOLIS, Md. — Maryland House of Delegates Speaker Michael Busch and Congressman CA Dutch Ruppersberger are scheduled to appear at cyber security reception. The pair will be the special guests of the Maryland Commission on Cyber Security Innovation ...

FBI Director Predicts Cyber Attacks Will Be Top Threat to US
IT Business Edge (blog)
Perhaps most at risk is the country's critical infrastructure, a point which the Secretary of Defense, Leon Panetta, made, saying that a well-planned and well-executed cyber attack could bring down the nation's power grid. Or the financial industry.

Drill Trains Participants for Potential Cyber Storm Front
Signal Magazine
Cyber Storm exercises have been conducted almost every two years since 2006. All have been organized and conducted under the aegis of the Department of Homeland Security's (DHS's) Office of Cybersecurity and Communications, National Cyber Security ...

UK: Cyber crime team to tackle organised tax fraud
7thSpace Interactive (press release)
The team is designed to protect both HMRC and taxpayers from organised criminals and will build on HMRC´s existing cyber counter-fraud capability and existing investigation and intelligence work and is a key element of HMRC´s Cyber Crime and Security ...

Porn site's user details compromised in cyber attack
Computer Business Review
A hacking group, which calls itself 'The Consortium,' has claimed to have stolen the details of around 73000 subscribers of the porn site DigitalPlayground.com. The group is said to have got access to credit card numbers, emails and passwords of the ...

DHS breaks down 2013 cybersecurity budget
Urgent Communications
"Terrorist tactics can be as simple as a homemade bomb and as sophisticated as a biological threat or a coordinated cyber attack." Napolitano said the funds would support efforts to secure civilian government computer systems and the nation's critical ...

Major Cyber-assaults Hit NASA During 2010-11, the Agency Admits
SPAMfighter News
The national station in USA for space research, NASA states that it actually encountered over 5000 Internet assaults causing malware installation on its PCs during 2010-11, published SCMagazineUK.com dated March 2, 2012.

Standards for cyber security testing to be introduced
MMD Newswire (press release)
Businesses want to make sure their online systems are as prepared as they can be for a cyber attack," Ms Roxon said. "CREST Australia will have the important role of establishing clear and agreed standards for cyber security testing.

Wombat Security Technologies Offers Tips to Keep Online Users Off the Hook ...
Virtual-Strategy Magazine
Many people respond with fear when receiving any communication from the Internal Revenue Service, which is making many online users easy bait for cyber criminals using phishing tactics to hook their victims this tax season. Cyber criminals use the ...

Students compete in cyber defense challenge
News@Northeastern
By Matt Collette Northeastern students competed against industry professionals and peers from 11 other schools in the Northeast Regional Collegiate Cyber Defense Competition. Courtesy photo. A new IT team takes over computing at an e-commerce firm and ...

News@Northeastern

HMRC sets up new cyber-crime team to tackle tax fraud
ComputerworldUK
Read more Funding will be provided by the National Cyber Security Programme to recruit technical experts, analysts and investigators. “As more and more of HMRC's systems move online, cybercriminals will look to exploit any opportunity to attack the ...

Research and Markets: The Global Cyber Warfare Market 2011-2021
SYS-CON Media (press release)
The global spending on cyber warfare systems is expected to remain robust over the forecast period due primarily to the increased importance of such systems in modern warfare. The formation of the US Cyber Command or USCybercom by the highest defense ...

It's Time to Take Cybersecurity Seriously
Wired News (blog)
WikiLeaks and Anonymous, once known only to a subset of cyber geeks, are now household names. The Stratfor hack poured thousands of e-mails into the public domain. Anonymous listened in on an FBI conference call whose purpose was to — crack down on ...

Wired News (blog)

Tax fraudsters to face crack team of cyber crime experts
Public Service
And the team will provide real time intelligence to security and operational risk teams. "As more and more of HMRC's systems move online, cyber criminals will look to exploit any opportunity to attack the repayment system," said exchequer secretary ...

Public Service

HMRC appoints new cyber-crime team to tackle fraud
CFO World UK
The team aims to target cyber criminals who are increasingly employing sophisticated methods toattack the Revenue's repayment systems. The government's £650 million national cyber securityprogramme will fund the new team which will look to recruit ...

Editorial: Cyber security shouldn't be talked to death
MassLive.com
The Homeland Security Department's Control System Security Program facilities are intended to protect the nation's power grid, water and communications systems fromcyber attacks. Cybersecurity has become a rapidly expanding priority for the government ...

MassLive.com

6th Annual SINET IT Security Entrepreneurs' Forum (ITSEF) 2012 Connects ...
EON: Enhanced Online News (press release)
SINET also announced today its final lineup of speakers featuring prominent cybersecurity leaders from CIA, NSA, DOD and DHS, Facebook, Salesforce, PG&E, Verizon, Kleiner Perkins, Goldman Sachs, Oracle, US Cyber Command and more.

LogRhythm and Solera Networks Partner to Provide SIEM 2.0 with Deep Packet ...
MarketWatch (press release)
"More than ever, organizations need to know everything that is happening on their networks and deploy effective prevention and incident response tools to combat cyber security threats. We believe that the joint solution of LogRhythm and Solera Networks ...

Porn site Digital Playground hacked, personal data stolen
Digital Spy
Porn website Digital Playground has been hit by a cyber attack with users' personal data stolen. More than 73000 subscribers' user names, email addresses and passwords were breached, as well as credit card details of some 40000 account holders.

Facebook Social Engineering Attack Strikes NATO
InformationWeek
Some security watchers ask if Chinese culprits were involved. By Mathew J. Schwartz InformationWeek The top military commander in NATO has been targeted by attackers wielding fake Facebook pages. Attackers have been creating Facebook pages under the ...

Napolitano favors Lieberman-Collins cybersecurity bill
Fierce Homeland Security
and Susan Collins (R-Maine) "is required to improve information sharing, create a base level ofsecurity throughout the nation's private cyber networks and to maximize our potential to prevent or minimize an attack," Napolitano told the Senate ...

ICANN Appoints IID's Rod Rasmussen to Its Security and Stability Advisory ...
MarketWatch (press release)
"Rod has been bringing various issues to SSAC's attention for several years in his role representing the Anti-Phishing Working Group, including but not limited to the evolving methods cybercriminals are using to disrupt the Internet's security," said ...

Anonymous spent $700000 with stolen credit cards
Neowin
On Christmas Eve 2011, Anonymous took credit for a cyber attack on the servers of the Austin, Texas-based security firm Stratfor. The company admitted that its servers had been breached and as a result "personally identifiable information and related ...

Iran's legal right to attack Israel
Asia Times Online
... cyber-warfare, not to mention Israeli political and military leaders' open declarations of intent toattack Iran in the immediate future. Second, these illegal acts combined with the declarations of intent constitute an imminent national security ...

Chinese Cyber Spies Look to Buddy up with Nato
IBTimes UK
By Alastair Stevenson: Subscribe to Alastair's RSS feed Suspicions have again fallen on China after reports emerged suggesting Nato's most senior military official was the subject of a coordinated cyber scam. The Observer reported on Sunday that cyber ...

IBTimes UK

The government needs to step up efforts to protect cyber infrastructure
SYS-CON Media (press release) (blog)
Congress is moving swiftly on legislation aimed at beefing up the nation'scybersecurity infrastructure — but even that may not be fast enough. The private sector owns or operates more than 80 percent of our critical infrastructure, including our...
SYS-CON Media (press release) (blog)

Cyberspace: The New Scene for War
The Epoch Times
The use of cyberspace as a tool of war has changed the nature of conventional warfare. This poses problems in terms not only of how to respond to those threats but also of how to develop agreements among countries to curtail the use of cyber-attacks.


Author Mark Bowden on the ongoing threat of the Conficker Worm
Wired.co.uk
By Katie Scott On 1 April 2009, at the offices of government agencies, internet giants and web security firms worldwide, people awaited a cyber attack that some believed could crash the world's online infrastructure. For months, people from around the ...

Wired.co.uk

NATO Commander Target of Facebook Scam
GovInfoSecurity.com
Cyber spies in China are suspected of launching an attack against a NATO senior military commander, US Adm. James Stavridis, using a Facebook scam to gather information about Stavridis from his friends and colleagues, according to a report in the ...

GovInfoSecurity.com

Man admits hacking abortion website
Marie Claire.co.uk
The cyber attack threatened the privacy of thousands of women who have used the service A court injunction was taken out when BPAS became aware that the security of its users had been compromised. The Met's e-Crime Unit was notified and the suspect was ...

SecurityOracle.com - Latest Security News, Cyber Crime Team To ...
Recruitment of high calibre technical experts, analysts and investigators will protect HMRC and its customers from fraud using technology funded by the National Cyber Security Programme. The newcyber team will provide HMRC with a better awareness of the nature of ... “As more and more of HMRC's systems move online, cyber criminals will look to exploit any opportunity to attack the repayment system. HMRC is getting ahead of the curve – taking forward what it is already doing in ...
Security News Feed

Cybersecurity Tips From an IBM Security Expert | Cyber Security ...
By Thai Ton
In an era when our lives are connected to the Web, more and more cases are emerging where people have fallen victim to cybercrime—from stolen identities to unauthorized money transfers. Adi Shaharabani, a senior expert for data security ...
Epoch Times

Def/Sec Plus | Wings Over Iraq
By Courtney Messerschmidt
The Stuxnet computer worm that damaged Iranian nuclear facilities – widely suspected to be an Israeli or even U.S. covert action – was a model of a responsibly conducted cyber-attack, said the top lawyer for the U.S. military's Cyber ...
Wings Over Iraq

Is This What Robert Mueller Meant by Cyber Expertise? | emptywheel
By emptywheel
Is This What Robert Mueller Meant by Cyber Expertise? Posted on March 13, 2012 by emptywheel. Back on February 3, I noted what I thought was the irony that, four days after FBI Director Robert Mueller bragged about FBI's cybersecurity ...
emptywheel

Why consider an enemy Iran and not Russia? | Security Affairs
By paganinip
There is no doubt that through the analysis of the operations of a State in cyber space it is possible to create a political profile of the country itself, discover the level of technology available and design covenants and relations with other countries. Not a day passes ... Still on the subject of Syria and the possibility that an international resolution providing for an attack to overthrow the murderous regime, Russian experts recently upgraded Syria's long-range radar systems. The Russian ...
Security Affairs

Prison Planet.com » Department Of Justice Wants Court To Keep ...
By admin
The Department of Justice will ask a federal court to uphold the secrecy that surrounds the working relationship between Google and the National Security Agency in a hearing that is scheduled for next week. Privacy watchdog group The Electronic ... The issue rose to prominencein January 2010 following a highly sophisticated and targeted cyber attack on the corporate infrastructure of Google and some twenty other large US companies. The attack was blamed on the Chinese ...
Prison Planet.com

Tunisia: Paying Tribute to Cyber Dissident Zouhair Yahyaoui ...
By Afef Abrougui
Today marks the seventh death anniversary of Zouhair Yahyaoui, an award winning Tunisian cyberactivist who was detained during the regime of Zeine El Abidin Ben Ali. ... On March, 13, 2005, he passed away following a heart attack.
Global Voices

Research and Markets: The Global Cyber Warfare Market 2011 ...
The global spending on cyber warfare systems is expected to remain robust over the forecast period due primarily to the increased importance of such systems in modern warfare. The formation of the US Cyber ... ICTs can be used to attack these battlefield systems directly, to capture sensitive data from defense contractors and governments or disrupt national infrastructure. Equally, defense systems must ... Other related articles, tagged News: Threats & security · CorDEX Instruments ...
ITbriefing.net

Chinese Spies Steal F-35 Joint Strike Fighter Data from BAE ...
By Craig Scanlan
But they were disclosed by a senior BAE executive during a private dinner in London for cyber security experts late last year. One of those present said: “The BAE man said that for 18 months, Chinese cyber attacks had taken place against ...
Asia Security WatchAsia Security...

Balancing security and open government in the cyber age | Guest ...
By Patrick Leahy
Today, when cyber threats can be transmitted over the Internet in an instant, maintaining the proper balance between security and openness for critical infrastructure information is more important than ever before. We are often reminded ... As Congress considers new exemptions to FOIA in connection with comprehensive cybersecurity legislation, we must remain vigilant and ensure that the public's access to essential health and safety information is protected. Securing our nation's ...
All Headlines | TucsonSentinel.com

Thank God Obama is Running the Israel-Iran Show. « The Same ...
By Brian Lambert
... and giving the Afghanis one serious last shot at controlling their own security), the latter, the home front, is a constant grinding misery fueled by rhetorical buffoonery, shrill and nonsensical demagoguery and ceaseless Republican obstruction. ... there is no reason (that I have ever read) to believe the Bushie-era neo-cons ever considered anything like a sophisticated cyber-attack on him rather than all out warfare … after of course, first cooking the intelligence through Rummy's DIA.
The Same Rowdy Crowd

The Case of The Curious INSCOM Cyber Warrior Site: You've Been ...
By Krypt3ia
The link, purports to be for INSCOM the Army Intelligence and Security Command's new CyberBrigade. Now, I am a bastard by nature as well as a paranoid so I decided to take a .... suspicion, I don't know what will. Tom Ryan says: 2012/03/12 at 21:23. Pre-Dating Robin Sage, Shawn Moyer and Nathan Hamiel did this same type of attack on LinkedIn and gained some success. ....chucklingabit on Asymmetric Warfare and Tu… From the Listening P… on Asymmetric Warfare and Tu…
Krypt3ia

Conn. InfraGard Chapter Stands Against Cybersecurity Threats
Connecticut's energy, finance, and defense industries put the state on the front lines in the growing threat of cyber-attack against critical U.S. government and ...
www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com