International Business Times
By Sreeja VN: Subscribe to Sreeja's RSS feed The United States should worry more about North Korea's cyber attack capabilities than its nuclear arsenel, if the latest reports are any indication. A Bloomberg report has quoted General James Thurman, ...
International Business Times
Cyber attack on NDP election used thousands of computers
Edmonton Journal
In the world of cyber security, it's known as a distributed denial of service attack. "We deeply regret the inconvenience to NDP voters caused by this malicious, massive, orchestrated attempt to thwart democracy," general manager Susan Crutchlow said ...
Cyber attack targeted NDP voters
Calgary Herald
According to Scytl Canada, the company hired by the NDP to con-duct the vote, the attack was an at-tempt to crash or slow down the voting website by "saturating servers with bogus external communications requests" and making it difficult for legitimate ...
DoD lacks enough information to stop cyber attacks
FederalNewsRadio.com
DoD's Cyber Command needs real-time information on attacks so it can stop them before they succeed, said Army Gen. Keith Alexander, who leads both the National Security Agency and USCyber Command. But right now, the military has a very hard time ...
Bill's goal: Boost cyber-security
The Desert Sun
Mary Bono Mack on Tuesday introduced legislation to deal with the growing threat of cyberattacks against major American corporations and the federal government. It's called the Strengthening and Enhancing Cybersecurity by Using Research, Education, ...
Defense Department Needs Industry's Help to Catch Cyber Attacks
Kansas City infoZine
"When an attack occurs, we're told about it after the fact." Alexander added, though, that industry should be monitoring their own systems with help from Cyber Command and the Department of Homeland Security. "I do not believe we want the NSA or Cyber ...
U.S. considers new cyber security rules
UPI.com
WASHINGTON, March 28 (UPI) -- The head of US cyber security says presidential authorization should be required, in some cases, before the US military can attack enemy computer systems. Gen. Keith Alexander, head of US Cyber Command, has said he wants ...
Australia Bans Huawei From Web Network
CIO Today
Citing cybersecurity concerns, the Australian government cited wariness about China's cyber warfare efforts, a spate of hacking attempts aimed at Western companies and the role of Chinese equipment providers. Australia has banned Chinese technology ...
CIO Today
US Outgunned in Hacker War
Wall Street Journal
By DEVLIN BARRETT WASHINGTON—The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning," he said.
Wall Street Journal
Cyber Cop: US Outgunned in Hacker War
MyFox Chicago
(The Wall Street Journal) - The FBI's top cyber cop has offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning." Shawn Henry, who is preparing to leave the FBI after more ...
MyFox Chicago
Company IDs 10000 computers behind cyber-attack on NDP leadership vote
Canada.com
By Tobi Cohen, Postmedia News March 27, 2012 OTTAWA - A large-scale cyber-attack involving more than 10000 computers was responsible for the online polling problems during Saturday's NDP leadership vote, according to Scytl Canada, ...
House Republicans push info-sharing cyber bill
Chicago Tribune
WASHINGTON (Reuters) - US companies and the federal government would be able to share information about cybersecurity threats more easily under a bill introduced in the US House of Representatives on Tuesday. The proposed legislation and related bills ...
Turkey warned against potential cyber attacks
www.worldbulletin.net
TÜBİTAK has designated a committee to prepare for a cyber attack in Turkey. A cyber attack drill was performed last year, directed at the websites of public institutions, he added. Dikici noted that hackers also threaten the security of online media.
www.worldbulletin.net
NSA, Cybercom Lead Pushes for New Cyber Law
ExecutiveGov
The National Security Agency's director advocated for public-private sector partnerships to identify and combat cyber threats at a Tuesday congressional hearing, American Forces Press Service reports. Army Gen. Keith Alexander, also head of Cyber ...
The wild wild web: top US cyber-cop says we're losing the war against computer ...
VentureBeat
“We're not winning,” the nation's top cyber-cop told the Wall Street Journal. ”I don't see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it's an unsustainable model.
VentureBeat
Retiring FBI official says current cybersecurity strategy 'unsustainable'
Fox News
11, 2011: A computer forensic examiner looks for evidence on hard drives at the Department of Defense Cyber Crime Center in Linthicum, Md.AP Photo/Cliff Owen A retiring top deputy at the FBI has given a blunt assessment of public and private efforts to ...
FCC official endorses cybersecurity regulation
The Hill (blog)
By Brendan Sasso - 03/28/12 11:48 AM ET A top Federal Communications Commission (FCC) official on Wednesday endorsed a bill that would give the government new regulatory powers to protect against cyber attacks. James Barnett, chief of the FCC's Public ...
Oxford Uni chucks big brains at ivy-covered cybersecurity hub
Register
By John Leyden • Get more from this author Oxford University boffins launched an interdisciplinary Cyber Security Centre on Monday. The new research hub aims to boost academic research into infosecurity. The Oxford Cyber Security Centre aims to ...
NSA Chief: China Behind RSA Attacks
InformationWeek
... China is stealing a "great deal" of military-related intellectual property from the United States and was responsible for last year's attacks against cybersecurity company RSA, US CyberCommand commander and National Security Agency director Gen.
Group Claiming Anonymous Affiliation Hacks Ministry of Justice Website
AllAfrica.com
By Mischa Benoit-Lavelle, 28 March 2012 The most recent cyber-attack in Tunisia took down the website of the Ministry of Justice this morning, and a group claiming affiliation with the loose international collective Anonymous has taken credit for the ...
Pentagon devising new rules of engagement for cyber attacks as vulnerability ...
The Verge
By Bryan Bishop on March 28, 2012 07:54 am 0Comments The Pentagon made it clear last November that it saw hacking and cyber attacks as acts of aggression that merited a military response. This past Tuesday, the head of Cyber Command provided insight on ...
America is losing the cybersecurity war; China hacked every major US company
Computerworld (blog)
To begin with, the "United States government did the Stuxnet attack," Clarke claimed during an interview with Smithsonian. After dropping that bombshell, he then moved on to cyberespionage, stolen intellectual property and imported tech tainted with ...
Symantec Cuts Ties With Huawei in Wake of Australian Cyber Security Concerns
International Business Times
However, in the wake of increasing cyber security concerns piling up against Huawei, Symantec decided to exit the venture, fearing that it would prevent it from gaining access to US government classified information regarding cyber threats.
CYBERCOM lead touts partnership with DHS
FierceGovernmentIT
The nation's current cyber strategy is not stovepiped, it's integrated and it's effective, said Gen. Keith Alexander, commander of US Cyber Command and director of the National SecurityAgency, March 27 before the Senate Armed Services Committee.
Cyber attack on NDP leadership vote was 'orchestrated, professional' hit
ITBusiness.ca
A DDoS botnet was at the root of the attack. But the culprits behind it have yet to be cornered. A botnet involving over 10000 computer IP addresses was the culprit of an “orchestrated, professional” DDoS attack that caused voting delays in last ...
DOD vs. DHS: Who should mind the US' cyber defense?
Defense Systems
With $3.4 billion requested for fiscal 2013, cybersecurity is one of the few areas of expanding investment in an otherwise lean DOD budget, Army Gen. Keith Alexander, commander of the USCyber Command and director of the National Security Agency, ...
Company IDs 10000 computers behind 'malicious' cyber-attack on ...
In the world of cyber-security, it's know as a distributed denial of service attack. "We deeply regret the inconvenience to NDP voters caused by this malicious, massive, orchestrated attempt to thwart democracy," general manager Susan ...
Calgary Herald - News
Cyber Self Defense For Non-Geeks | Digital Dao
By Jeffrey Carr
They won't be sufficient for when you're in high-risk locales and they won't stop a targeted attack, but they will make it much less likely that you'll suffer a serious breach because of poor cyber security habits or an over-reliance on your antivirus ...
Digital Dao
3/27/2012: White House Cyber Priorities, Stolen Military Passwords ...
By admin
House Republicans introduced a cybersecurity bill that would encourage sharing cyber threat information with measures like protection from lawsuits. More here. Hackers stole passwords, e-mail addresses, and other information from nearly ...
CTOlist.com
Bill's goal: Boost cyber-security – Desert Sun | Blackmere Consulting
By Blackmere
Mary Bono Mack on Tuesday introduced legislation to deal with the growing threat of cyberattacks against major American corporations and the federal government. It's called the Strengthening and Enhancing Cybersecurity by Using ...
Blackmere Consulting
Company IDs 10000 computers behind 'malicious' cyber-attack on ...
By NWOTruth
The company said it has identified more than 10000 IP addresses behind the “hundreds of thousands of false voting requests to the system.” The “network of malevolent computers,” or “botnet,” behind the attack involved computers around the ...
NWOTruth
Cybersecurity: Another Reason for Smart Grid Standardization ...
By Rohit Khera
Cybersecurity Utilities today are faced with the daunting task of securing their electronic and computer systems from potential cyber threats of increasing sophistication. Indeed, there is growing recognition among government officials and policymakers about the ... In the realm ofsecurity applied to technology, the industry approach is to leverage existing standards to the greatest extent possible, and to incorporate security standards from the IETF, NIST and IEC/ISO to name but a few.
GridTalk
The Grim State Of Caribbean Cybersecurity | SiliconANGLE
By Mellisa Tolentino
Harper also added that the most common misconceptions of organizations about cyber security is that technology alone can provide adequate, effective and sustainable protection for information assets. He also gave some tips as to how ...
SiliconANGLE
FBI Top Cyber Cop: U.S. Outgunned in Hacker War « Federal ...
By McNabb Associates, P.C.
“U.S. Outgunned in Hacker War. By DEVLIN BARRETT. WASHINGTON—The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: ... Mr . Henry, who is leaving government to take a cybersecurity job with an undisclosed firm in Washington, said companies need to make major changes in the way they use computer networks to avoid further damage to national security and the ...
Federal Criminal Defense Lawyers
Lawfare › Bono Mack and Blackburn Introduce Cyber Bill in House
By Paul Rosenzweig
Bono Mack and Blackburn Introduce Cyber Bill in House. by Paul Rosenzweig. Representatives Mary Bono Mack (R-CA) and Marsha Blackburn (R-TN) have introduced a companioncybersecurity bill in the House of Representatives that is ...
Lawfare
NSA Science of Security 'Lablet' Established - Institute for Advanced ...
By editor
It is widely understood that critical cyber systems must inspire trust and confidence, protect the privacy and integrity of data resources, and perform reliably. To tackle the ongoing challenges of securing tomorrow's systems, the NSA concluded that ... Some ideas from fault-tolerant computing can be adapted to the context of security. Strategies from control theory will be extended to account for the high variation and uncertainty that may be present in systems when they are under attack.
Institute for Advanced Analytics...
US govt is searching your Facebook and Twitter for these keywords ...
By facthai
Cyber security; Botnet; DDOS (dedicated denial of service); Denial of service; Malware; Virus; Trojan; Keylogger; Cyber Command; 2600; Spammer; Phishing; Rootkit; Phreaking; Cain and abel; Brute forcing; Mysql injection; Cyber attack; Cyber ... ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, ...
FACT - Freedom Against Censorship...
`Malicious' cyber-attack on NPD traced to 10000 computers
OTTAWA - A ``sophisticated'' Internet attack that threw the NDP's weekend leadership convention into turmoil was caused by a professional who used more than ...
www.vancouversun.com/news/Malicious.../story.html
Hong Kong 'mock vote' under cyber attack: university - Yahoo! News
From Yahoo! News: A website offering Hong Kongers a chance to vote for their next leader ahead of this weekend's official election is under "systematic attack" ...
news.yahoo.com/hong-kong-mock-vote-under-cyber-attack-u...
Inside NIST's cybersecurity strategy -- Washington Technology
NIST's Kevin Stine explains the agency's priorities and the power of automated reporting.
washingtontechnology.com/articles/.../tech-trends-cyber.aspx
Irishman who deciphered the cyber-virus attack on Iran | Cyber ...
He became the cyber sleuth who deciphered the Stuxnet virus that sabotaged the Iranian nuclear programme. Ó Murchú first became aware of Stuxnet in June ...
www.cyberwarzone.com/.../irishman-who-deciphered-cyber-v...
Should US Worry About North Korea's Cyber Attack Capability ...
There are limited seats available for the conference on 24th & 25th of May. Register before 1st of May and save EUR300!
news.hitb.org/.../should-us-worry-about-north-koreas-cyber-at...
Cybersecurity for Attorneys: Understanding the Ethical Obligations
As attorneys continue to embrace the latest technology, it is critical to understand and address the ethical obligations that go with it—from SmartPhones and ...
www.americanbar.org/.../cyber-security-for-attorneys-understa...
NDP convention hit by cyber attack; voting delayed - Topix
NDP leadership candidate Thomas Mulcair, left, and his wife Catherine Pinhas, right, react to the second ballot results during the NDP leadership convention in ...
www.topix.com/forum/tech/computer.../TN4N7RQ622JISV0B...
Cyber-Attack - To Small to Assail? Cartoon | fearlessweb
On one hand, I'm grateful that we've never been targeted for a cyber-attack. On the other...
fearlessweb.trendmicro.com/.../cyber-attack-to-small-to-assail-...
Follow @sobeqorg