Commerce Dept. bureau hit by virus, unplugs from network

For agency, a loss of technology has had down- and upsides
Washington Post
The virus struck in an e-mail 80 days ago, flagged by a federal team that monitors cyber threats. The target was a small job-development bureau in the Commerce Department. The infiltration was so vicious it put Commerce's entire computer network at ...

State-Sponsored Cyber Spies Want Your Facebook Status, Researchers Say
Mashable
Facebook frequently takes flack for privacy invasions, but the next controversial byproduct of the social network may be cyber espionage, according to security researchers. Status updates on Facebook posted by friends and family of government officials ...

Could CISPA Be the Next SOPA?
Mashable
It's called the Cyber Intelligence Sharing and Protection Act (or CISPA, for short). CISPA would alter the existing National Security Act of 1947 to allow private businesses and the government to share information about cyberthreats — including ...

Web Attacks Use Smart Redirection to Evade URL Security Scanners
PCWorld
The purpose of the mouse movement detection is to filter out URL scanners and Web crawlers used by security companies or search engines to detect infected websites. It is a simple technique, but it suggests that cyber criminals are looking for more ...

CISPA: The internet finds a new enemy
GlobalPost (blog)
A piece of cyber security legislation passed in the house intelligence committee during last December's anti-SOPA clamor may soon become the internet's next arch enemy. Protesters demonstrate against the proposed Stop Online Piracy Act (SOPA) and ...

GOP Candidates' Official Websites Pretty Hackable
WebProNews
An aspect of this that should be included in the dialogue is most certainly nationalcybersecurity. President Obama himself has said that cyber threats are “one of the most serious economic and national security threats our nation faces.

34% of IRS servers not monitored for cyber threats
FierceGovernmentIT
To ensure that data on the IRS network is not at risk, auditors recommend the agency develop itscybersecurity data warehouse so it can correlate and reconcile the network's active servers with those monitored by the intrusion detection system.

Threat from cyber criminals sees new hike
Arab Times Kuwait English Daily
As the security technology in operating systems like Windows 7 becomes more sophisticated, we are likely to see cyber criminals develop more complex malwareto try and defeat this security. The unwanted attention that the Android platform has received ...

Arab Times Kuwait English Daily

Internet thieves piggyback on legitimate users
USA TODAY
By Jack Gruber, USA TODAY Federal Communications Commission Chairman Julius Genachowski called "IP hijacking" of large amounts of Web traffic one of the top three biggest cyber-security threats facing the Internet. By Jack Gruber, USA TODAY Federal ...

USA TODAY

Social Media Forces Gather to Kill Another Online Bill
Marketing Vox News
A House cybersecurity bill, the Cyber Intelligence Sharing and Protection Act (CISPA), is the target of the same social media forces that defeated the Stop Online Piracy Act, or SOPA, earlier this year, The Hill newspaper reports.

Anonymous Disrupts UK Government Sites
PCWorld
This latest action by Anonymous was described by one security expert as audacious, especially in light of recent efforts by global law enforcement agencies to crackdown on the group's cyberprotests. "You have to admit that this is an audacious move by ...

Our future cyberdefenders set to face off
Network World
By Bob Brown, Network World The University of Texas at San Antonio (UTSA) later this month will host the three-day National Collegiate Cyber Defense Competition for the seventh consecutive year. The event, sponsored by Deloitte and launching April 20, ...

Home Office confirms 'Anonymous' attack on websites
The Independent
A denial of service attack prevents a website from functioning properly, sometimes by swamping it with more traffic than it can handle. The cyber protest came after it emerged last week that the Government was planning a massive expansion of its powers ...

Watch for phishing scams after Global Payments security breach
Sacramento Bee
If your card is being used by a cyber thief, you need to stop it immediately. If you find phony charges, call your credit card company immediately to report them. Another thing to watch for isphishing emails and phone calls. Slick crooks know you are ...

Anonymous planning to attack more China sites
NDTV
The activist hacker group Anonymous plans to launch further attacks on Chinese government websites in a bid to uncover corruption and lobby for human rights, a member of the group said on Monday. Anonymous, a loosely knit group that has attacked ...

NDTV

Federal Agency Lives in Dark Ages After Hacker Hit
Newser
Because the cyber attack threatened the entire Commerce Department's computer network, the EDA was unplugged, meaning staffers no longer had access to email, Google searches, or any other wonders of the World Wide Web. In response, employees started ...

Kratos Receives $11.8 Million Single Award Critical Infrastructure Security ...
MarketWatch (press release)
... Combat Systems, Intelligence, Surveillance and Reconnaissance (C5ISR), satellite communication systems, unmanned systems, cyber warfare, cybersecurity, information assurance, critical infrastructure security and weapons systems sustainment.

Pennsylvania property tax under new attack in legislature
Philadelphia Inquirer
"I think we have a chance to get it done," said David Baldinger, a retired radio personality who lives in the Reading area and who started the Pennsylvania Tax Cyber Coalition eight years ago. It now includes more than 70 groups and 60000 people.

Anonymous Darkens UK Sites Over Extraditions, Web Monitoring
Nextgov
#AnonUK" Sunday night, the same twitter feed was protesting a new US House bill, the CyberIntelligence Sharing and Protection Act, or CISPA, that critics say would let the federal government snoop into anyone's e-mails.

Data Breach Rattles Card Issuers
Credit Union Times
They all need to review continuously the security policies, practices and technology controls they have in place, including but not limited to encryption, access controls and authentication,” he said. “Cyber criminals are evolving their attack ...

Credit Union Times

Deliberate DOS Assault Disrupts NDP Voting
SPAMfighter News
An advanced cyber-assault, which created chaos during the federal NDP party's election, has been attributed to a specialized Web hacker who utilized over 10000 PCs globally for so slackening the pace of the online-voting that it started to crawl, ...

Hard National Security Choices
Lawfare (blog)
For more interesting law and security-related articles, follow us on Twitter, visit the Georgetown Center on National Security and the Law's Security Law Brief, Fordham Law's Center on National Security's Morning Brief, and Fordham Law's Cyber Brief.

Bullies won't win against Moreland taskforce
Moreland Leader
THE father of a 13-year-old Brunswick East teenager who was bashed and cyber-bullied says a new local taskforce will provide an invaluable resource. Joanna's father said the bullying of his daughter only stopped after he involved police and said the ...

Moreland Leader

New media crimes
Jerusalem Post
Clarke wrote an editorial in The New York Times earlier this month mapping out the severity of cyber-crime in the United States, particularly attacks which target American businesses. I always knew that the espionage in cyberspace is a problem, ...

Scene & Heard: '250 and a senator'
Press Herald
"In 2010, 3 billion cyber attacks were recorded by the computer security firm Symantec alone," Collins said. She cited a report by Norton that found the annual cost to businesses from such crimes is $114 billion. "The FBI director told me recently that ...

Press Herald

Dutch govt, NWO release money for cybersecurity research
Telecompaper (subscription)
The project is in line with the government's National Cyber Security Strategy (NCSS). The government wants a comprehensive approach to security, within a free and open digital society. NWO and Agentschap NL –under the ministry of economic affairs- will ...

CSI Creator Anthony E. Zuiker Delivers Thrills and Chills to Fans with Friday ...
MarketWatch (press release)
Dare to Pass most recently completed production on the cyber-bridges for Zuiker's third Level 26 Digi-novel, Dark Revelations that will be published by Dutton on December 29, 2011. YouTube recently began rolling out its new offering of premium channels ...

Risk of Cyber Attacks on Law Firms — Slaw
By Omar Ha-Redeye
With limited budgets and few or no technical experts on staff, small businesses generally have weak security. Cyber criminals have taken notice. In 2010, the U.S. Secret Service and Verizon Communications Inc.'s forensic analysis unit, which ...
Slaw

Melissa Hathaway – Cyber Security: Grappling with the Risk – Global
By jeffers
She worked in the office of the Director of National Intelligence and on the White House NationalSecurity Council staff, where she created a new Cyber Security office. She launched the Comprehensive National Cybersecurity Initiative in both ...
NMC Campus Community Events Calendar

We are responsible for the security around us « Ivy Tech Columbus ...
By Ivy Tech
Much of the negative feeling revolved around the idea of government trying to control private industry in the name of national security against hackers and cyber-crime. Now there is a new bill ... called the Cybersecurity Act of 2012. I decided to ...
Ivy Tech Columbus Region News

Data Security: Who's Winning the Cyber War? | Tech 4 Business
By Jose Ricardo
But a wave of very public cyber attacks by international hacker groups such as Anonymous, combined with an already distrustful public following the financial crisis, has forced financial services firms to step up their network security to prevent data breaches and regain clients' trust.... While five years ago financial services firms mainly saw hackers using "relatively simplistic methods to target customer accounts, attack patterns have shifted," says Lou Steinberg, CTO at TD Ameritrade.
Tech 4 Business

Anonymous vs Britain's Home Office - Operation Trial At Home | The ...
By THN Reporter
Anonymous vs Britain's Home Office - Operation Trial At Home. Computer Security Blog !! THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability. ... Cyber Warfare. Cyber Warfare - The Hacker News Magazine April 2012 Edition ... The following tweets are from Anon_Central, which has 120000 followers, describing the attack: #OpTrialAtHome — Target: ...
The Hacker News [ THN ] - Security Blog

NMC Campus Observer » Melissa Hathaway – Cyber Security ...
By NMC Campus Calendar
... Topic: Cyber Security: Grappling with the Risk Location: 
http://slurl.com/secondlife/University%20of%20Delaware/56/150/26 Melissa Hathaway served both the Obama and Bush administrations as a leader in understanding cybersecurity.
NMC Campus Observer

Navy Developing Robots to Fight Pirates « CYBER ARMS ...
By D. Dieterle
CYBER ARMS – Computer Security. Cyber War News and Business Computer Tips. Navy Developing Robots to Fight Pirates ...
CYBER ARMS - Computer Security

After killing SOPA, Internet activists take aim at a new House ...
By the Net economy
By Brendan Sasso – Online activists who helped sink the Stop Online Piracy Act (SOPA) earlier this year have now turned their sights to a House cybersecurity bill, the Cyber Intelligence Sharing and Protection Act (CISPA). Reddit helped rally ...
the Net economy

China, cyber warfare and challenges for the future | Security Affairs
By paganinip
China, cyber warfare and challenges for the future. by paganinip on April 9th, 2012. Flag of the People's Republic of China. When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia.
Security Affairs

Cyber Czar wants Homeland Security to patrol America's Internet ...
By The European Union Times
Former George W Bush special adviser for cybersecurity, Richard A. Clarke, tackles the topic of America's susceptibility to Internet crimes in an editorial published in The New York Times this week, and the ex-White House “cyber czar” says the ...
The European Union Times - World...

Protecting Your Business From a Digital Security BreachSmall ...
By Karen Axelton
Protecting Your Business From a Digital Security Breach. Cyber-security breaches can bring a small business to its knees. In today's guest post, Alan Wlasuk tells you how to protect against asecurity breach—and how to respond if the worst ...
Small Business Daily News, Blogs,...

Corporations Supporting CISPA Include Facebook, Microsoft ...
By Chris Richardson
If so, there's a really good chance the backlash SOPA experienced could be a thing of past, at least in regards to the Cyber Intelligence Sharing and Protection Act (CISPA). The question is, which corporations are supporting the bill, making is ...
WebProNews

U.S. Utilities Under Cyber-Attack Every Day ...
America's water and energy utilities face constant cyber-espionage and denial-of -serviceattacks against industrial-control systems, according to the team of ...
secureworldpost.secureworldexpo.com/u-s-utilities-under-cybe...

FOSE 2012 looks at cyber security ,Video | Cyber Warzone
The three-day technology conference also features several sessions oncyber security ...
www.cyberwarzone.com/.../fose-2012-looks-cyber-security-vi...

If We Can't See The Cyber Attack, We Can't Stop It - CounterTack
Sometimes it really helps to state the obvious. General Keith Alexander, director of the NSA, was quoted by FederalNewsRadio.com yesterday as saying “If we ...
www.countertack.com/.../If-We-Can-t-See-The-Cyber-Attack-...

Congress, DoD and North Korea Move on Cyber « Cybersecurity ...
While much of Capitol Hill was busy with the budget this week, two congresswomen came together to put forth a new House cybersecurity bill. But Congress isn't ...
cybersecuritynews.org/.../congress-dod-and-north-korea-move...

Scytl electronic voting system's massive cyber attack | American ...
OTTAWA — A massive cyber attack involving more than 10000 computers was behind the online voting chaos during Saturday's NDP leadership vote, it was ...
usamericanfreedom.com/.../scytl-electronic-voting-systems-ma...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com