The Guardian
Interpol's website appears to have been the victim of a cyber-attack after the international police agency announced the arrests of 25 suspected members of the hacking activist group Anonymous in Europe and South America. The website went down briefly ...
The Guardian
Global Cyber Warfare Market - Spending on Systems Expected to Remain Robust ...
Sacramento Bee
By ReportsnReports ReportsnReports adds new market research report 'The Global Cyber WarfareMarket 2011-2021' to its store. The formation of the US Cyber Command or USCybercom by the highest defense spender globally, highlights the importance of cyber ...
Suspected Anonymous Hackers Arrested
Fox News
Power outage from a cyber attack? It's possible, officials say -- in as little as a year or two.AP Twenty-five suspected members of the loose-knit Anonymous hacker movement, accused of planning coordinated cyber attacks against institutions including ...
Lawmakers worry about cyber attacks on electrical grid
The Hill (blog)
By Brendan Sasso - 02/28/12 12:03 PM ET House lawmakers said at a hearing Tuesday that they are worried that the country's electrical grid is vulnerable to a crippling cyber attack. "Ask any expert in the national security field and see what keeps them ...
'Active defense' experts call for larger role for US Cyber Command
SearchSecurityChannel.com
SAN FRANCISCO – A panel of experts with intimate knowledge of the inner workings of the NationalSecurity Agency (NSA) told RSA Conference 2012 attendees that the US Cyber Command must assume a larger role in securing the Internet, despite the privacy ...
Air Force strategic plan focuses on cyber superiority
FederalNewsRadio.com
By Jolie Lee The Air Force has developed 12 master plans for each of its major priorities, and one of the strategies centers on cybersecurity superiority. The plan is more "cyber defensive-centric" than focused on attack missions, said Lt. Gen.
Sacramento security company that was hacked by Anonymous is being purchased
Sacramento Bee
By Mark Glover A Virginia firm specializing in international security technologies says it has signed a definitive agreement to acquire Sacramento's HBGary Inc., which was victimized last year by a high-profile cyber attack. Fairfax, Va.
Coviello: RSA Security Breach Could Happen To Anyone
CRN
Since cyber-criminals compromised the company's SecureID tokens, leaving customers open toattack, RSA has been rebuilding the trust customers lost in the company, Coviello said during the opening keynote at the RSA Conference in San Francisco.
Data Privacy and Network Security Alert From McDonald Hopkins Law Firm: In a ...
Sacramento Bee
28, 2012 -- /PRNewswire/ -- The Securities and Exchange Commission has put public companies on notice of the significant risks relating to cybersecurity and has indicated that unmitigated exposure to cyber incidents should not be ignored in public ...
RSA 2012 -- Coviello and Charney kickoff the RSA conference in San Francisco
Government Security News
Two of the heavy-hitters in the cyber security field – Art Coviello of RSA and Scott Charney of Microsoft – delivered opening keynote addresses at the RSA conference on Feb. 28 in which they agreed that the notion of “defending the perimeter” was ...
RSA 2012: Coviello Insists Cyber-Defences Are About Managing Risk
TechWeekEurope UK
The sheer volume of attacks against enterprises and governments in 2011 showed that security was critical, but the security industry is “in serious risk of failing” to protect organisations, said Art Coviello, executive chairman of RSA, ...
IT security industry going through hell
ITWeb
“We are not alone; an attack on one of us should be viewed as an attack on all of us,” he said. “If you are going through hell, keep going,” he added, quoting former British prime minister Winston Churchill. The RSA cyber attack last year left the ...
RSA Conference 2012: Need for a New Approach to IT Security
CSO
"An attack on one of us is an attack on all of us," he said, emphasizing the need for the securityindustry to unite to present a strong opposition to the emerging threat landscape in the cyber world. "The era of siloed line up of point products is ...
RSA Chief Rallies Industry to Improve Trust in the Digital World, After Year ...
Bradenton Herald
28, 2012 — /PRNewswire/ -- RSA Conference 2012 -- In his RSA Conference 2012 keynote address, Art Coviello, Executive Vice President of EMC and Executive Chairman of RSA, The SecurityDivision of EMC (NYSE: EMC), called on the industry to rethink ...
Fuss over cyber war distracts from real threats, security pioneer says
GCN.com
By William Jackson SAN FRANCISCO — There is a lot of talk these days about cyber war, and much of it is misguided if not downright dangerous, said cybersecurity pioneer Marcus Ranum. “In cyberspace, the rules of war do not apply,” Ranum said.
US firm posts PLC hacking methods online
AsiaOne
Japan's Economy Trade and Industry Ministry has also begun alerting PLC users about potential cyber-attack risks through relevant industrial organizations. Digital Bond stated the firm posted the hacking method to "inform the public of the risks" of ...
AsiaOne
Deception and the art of cyber security
SC Magazine
Even the famed hacker, Kevin Mitnick, wrote a book called “The Art of Deception.” If deception can be used to attack, can it also be used in cyber defense? Today, it's not clear how thoroughly cyber security professionals embrace this well-established ...
Cybersecurity firm buys Sacramento's HBGary
Sacramento Bee
In February last year, the local maker of network-security software and its sister consulting company, HBGary Federal of Washington, DC, were targeted in a cyberattack by the group Anonymous. Hackers broke into the sister company's website and ...
Symantec Report Finds New Wave of Cyber-Attacks Impersonating Business ...
Broadcast Newsroom
(NASDAQ: SYMC) today announced the findings of its February Symantec Intelligence Report, which shows a new wave of cyber-attacks designed to impersonate a well-known business mediation and arbitration service in North America.
Major update to governmentwide cyber manual takes on WikiLeaks
Nextgov
The draft edition of a biennial catalog of federal information security standards advises agencies on how to spot conduct that may signal an employee plans to spill sensitive information to the public. The last time the National Institute of Standards ...
RSA: Experts debate role of government in cyber security
V3.co.uk
by Shaun Nichols A group of US and Canadian security experts at RSA conference found themselves at odds when discussing the role government agencies should take in helping private businesses prevent cyber attacks. The panel, which included former...
V3.co.uk
SMART GRID SECURITY; COMMITTEE: HOUSE ENERGY AND COMMERCE; SUBCOMMITTEE ...
Power Engineering Magazine
These standards include critical infrastructure protection standards for protecting electric utility-critical and cyber-critical assets. The Energy Independence and Security Act of 2007 (EISA)6 established federal support for the modernization of the ...
Cyber-threat Boogeyman: Props to White House for Standing up to NSA
Government Accountability Project (blog)
The NSA-fueled hysteria about cyber-threats has yielded several privacy-threatening legislative proposals, some which would legalize massive real-time domestic surveillance by NSA. The White House deserves credit for its rejection of this latest ...
House Subcommittee Questions Cybersecurity At Power Networks
National Journal
By Josh Smith AP Photo/Mark J. Terrill Cyber security analysts work in the "watch and warning center" during the first tour of the governmentĂs secretive cyber defense lab Thursday, Sept. 29, 2011, in Idaho Falls, Idaho. The Homeland Security ...
Op-Ed: Anonymous Vatican attack analysis shows how to miss the message
DigitalJournal.com
Sydney - An attack by Anonymous on the Vatican in August designed to highlight the church's position on the endless child abuse scandals has been analyzed by a security company called Imperva. The company watched for 25 days as the attack took place.
RSA Conference: Art Coviello calls on industry to collaborate in fight against ...
SC Magazine UK
He claimed that trust in the digital world is in jeopardy despite public advances as "new breeds of cyber criminals, hacktivists and rogue nation states have become as adept at exploiting the vulnerabilities of our digital world as our customers have ...
SC Magazine UK
Threat intensity of cyber aggression to rise in 2012
Defense Systems
Looking at a healthy cross section of cybersecurity reports, it appears almost everyone is in agreement that 2012 will be a banner year when it comes to the threat of cyberattacks. Technolytics began tracking acts of cyber aggression in 2007.
Interpol website hacked after arrest of 25 suspected Anonymous members
thejournal.ie
INTERPOL'S WEBSITE APPEARS to have been the target of a cyber attack following the arrests of 25 members of the hacking activist group Anonymous. The international police agency said that 25 suspected members of the movement were arrested in a sweep ...
Cyber Criminals took over billion dollar of Brazilian companies | The ...
By noreply@blogger.com (THN Reporter)
Cyber Criminals took over billion dollar of Brazilian companies. THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability. ... The defense against this type of attack requires the use of remote management services, as the company's IT administrator can not monitor all securityincidents at the same time. ☛ Let us know what you think, learn, and hope for! Connect ...
The Hacker News [ THN ] - Updates...
By noreply@blogger.com (THN Reporter)
Cyber Criminals took over billion dollar of Brazilian companies. THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability. ... The defense against this type of attack requires the use of remote management services, as the company's IT administrator can not monitor all securityincidents at the same time. ☛ Let us know what you think, learn, and hope for! Connect ...
The Hacker News [ THN ] - Updates...
Cong. Michael McCaul talks Border, Terrorism & Cyber Security
By admin
Michael McCaul talks Border, Terrorism & Cyber Security. Texas Insider Report: AUSTIN, Texas –. “The area that I think the nation's top military officials will tell you is the one that keeps them up at night, is the idea of a Cyber Warefare attack.
Texas Insider
RSA Conference | RSA Conference Blog | RSA Conference 2012 ...
By rsa365@hosted.jivesoftware.com
Senior leadership does not view IT security as a strategic priority and that more resources are needed to invest in security technologies. They also felt that a cyber attack affecting the critical infrastructure in their industry is imminent or highly ...
RSA Conference Blog
Technion LIVE: Hacking the top networks. Technion thinks ahead in ...
By VeReCreations
Technion thinks ahead in cyber space. Technion Students Hack OSPF, the Most Popular Routing Protocol on the Internet. The attack was part of a student project in the Computer Science Department and has attracted substantial interest in two scientific conferences; the students will be awarded the Technion Amdocs Prize. Alex Kirshon and Dima Gonikman, ... Accordingly, stringentsecurity measures are in place for the protocols of network routers. One of the important defenses is...
Technion LIVE
Global Cyber Warfare Market - Spending on Systems Expected to ...
ICTs can be used to attack these battlefield systems directly, to capture sensitive data from defense contractors and governments or disrupt national infrastructure. Equally, defense systems must be built to detect and counter these attacks, making cyber warfare systems essential tools for maintaining an advantage in modern conflicts. Request A ... Nextreaming and Verimatrix Announce the Release of NexPlayer Integrated with Verimatrix Content Security for Android Devices (02/ 29/12)...
ITbriefing.net
25 suspected Anonymous hackers arrested by Interpol ...
By Moign Khawaja
According to a media statement from Interpol, arrests were made in Spain, Argentina, Colombia and Chile by the national intelligence agencies of respective countries, with assistance provided by Interpol's cyber crime specialists working in Latin America. The arrested suspects ... There is no word from the Paris-based agency if their website has been taken down by Anonymous as a revengeattack or not. Anonymous is ... Tags: Anonymous, Cyber security, Internet Security, interpol ...
arabiangazette.com
European Smart Grid Cyber Security 2012 updates: Nation State ...
By SMi Group Ltd Utilities Division
We are please to announce the closing key note presentation for the London based European Smart Grid Cyber Security Forum March 12th and 13th will be given by Chief Cyber Security Strategist, LTCOL (RET)William Hagestad II, ... the People's Republic of China electronic and informationwarfare is available from either IT Governance @
http://www.itgovernance.co.uk/products/3697 or @ Amazon.com via http://www.amazon.com/21st-Century-Chinese-Cyberwarfare- Governance/ ...
European Smart Grid Cyber Security...
European Smart Grid Cyber Security...
Terrorism Watch: DOD spending $500B on 6 preparations for cyber ...
By FACT INDIA
Developing and preparing to use weapons of cyber warfare. Preparing the U.S. ... Creating technology using the DOD's and the NSA's “weight and resources” and distributing them to Homeland Security, law enforcement agencies, and partners. Protecting these ..... 7/7 bomber's widow sought over Kenya terror plot - Kenyan police investigate whether wife of Germaine Lindsay was part of unit planning Mombasa attack The wife of one of the 7 July 2005 suicide bombers is... 32 minutes ...
Terrorism Watch
Japan's Cyber Security May Be in the Hands of Patriotic Geeks ...
“The attacker has the upper hand in cyber war. The defender must be prepared for an attack that could come from anywhere, at any moment,” he added.
cyberwarzone.com/.../japan’s-cyber-security-may-be-hands-pa...
Senators sharply divided over bill to regulate cybersecurity ...
Senate lawmakers were sharply divided Thursday over how far cybersecurity ... The 2012Cybersecurity Act, S 2105, would authorize the Department of ...
www.federaltimes.com/article/20120217/IT01/202170301
Senate Cyber Bill Gets Mixed Reviews « Cybersecurity News
The Senate's new Cybersecurity Act of 2012 received mixed reviews at a hearing held Friday by the Committee on Homeland Security and Government Affairs.
cybersecuritynews.org/.../senate-cyber-bill-gets-mixed-reviews...
Ca: Police chiefs' website suffers cyber attack | Office of Inadequate ...
A cyber attack on the Ontario Association of Chiefs of Police's website has only bolstered the organization's support for the government's controversial online ...
www.databreaches.net/?p=23426
Is cyberwar hype fuelling a cybersecurity-industrial complex ...
U.S. officials say that a cyberwar is looming -- a catastrophic attack that would bring down power ...
www.youtube.com/watch?v=8mrhSO3o538
Follow @sobeqorg