DHS: America's water/power utilities under daily cyber-attack

DHS: America's water and power utilities under daily cyber-attack
ITworld.com
By Ellen Messmer, Network World | Security Add a new comment April 04, 2012, 10:46 AM — WASHINGTON, DC -- America's water and energy utilities face constant cyber-espionage and denial-of-service attacks against industrial-control systems, according to ...

Al-Qaeda websites go silent 'after cyber attack'
Telegraph.co.uk
Al-Qaeda's main internet sites have gone silent for more than a week in an unprecedented blackout that is most likely the result of a cyber attack, analysts said. Al-Qaida's Ayman al-Zawahri Photo: AP "All of them essentially went down" as of March 23, ...

Telegraph.co.uk

DHS: America's water and power utilities under daily cyber-attack
Network World
WASHINGTON, DC -- America's water and energy utilities face constant cyber-espionage and denial-of-service attacks against industrial-control systems, according to the team of specialists from the US Department of Homeland Security who are called to ...

With cyber-attack on Middle East's oil and gas a real possibility, experts ...
Business Intelligence Middle East (press release)
Following a day focused on international collaboration and knowledge sharing as potential solutions against the ever-increasing threat of cyber warfare, day two of the Cyber Defence Summit was opened by Marco Obiso, Cyber SecurityCoordinator at ITU.

Business Intelligence Middle East (press release)

Digital River Hosts Leading Cyber Security Experts at Globalocity 2012
MarketWatch (press release)
Rob Pate, vice president for cybersecurity, Science Applications International Corporation (SAIC): Mr. Pate has held numerous security executive positions in the private sector and with the federal government. Mr. Pate served at the National Cyber ...

Eight universities join GCHQ in fight against cyber-crime
ZDNet UK (blog)
Eight UK universities are set to work closely with the UK's cyber intelligence agency after it recognised them as centres of excellence for cybersecurity research. GCHQ, the UK's signals intelligence organisation, awarded eight UK universities the ...

Czech PM's private data under cyber attack
Newstrack India
Hacker groups Anonymous and TrollSec have claimed responsibility for the cyberattacks and for posting private data of the prime minister on internet citing that theirattack have come in the wake of protesting the Czech authorities, who are ignoring...

Newstrack India

The University of Texas at San Antonio to Host 2012 National Collegiate Cyber ...
MarketWatch (press release)
The national event will serve as an additional training ground for future cyber defenders. It also provides the best and brightest collegiate students an opportunity to shine on a national stage and connect with the top cyber security firms in the ...

Estonian leader says Ireland faces constant cyber attacks
Irish Times
Estonia was one of the first countries to be subjected to a political cyber attack. In 2007 a large number of the country's major sites were subjected to concerted attacks during a period of tense relations with Russia. Because of this, and the extent ...

Irish Times

FBI: Cyberattacks Grow as National Security Menace
PCWorld
"You'll see a greater prevalence of cyber-related offenses, including cyber-terrorism," predicted Ralph Boelter, assistant director of the counterterrorism division at the FBI. There's has not yet been a major cyber-terrorism attack in this country, ...

National Information Security Group (NAISG) Brings World Class Speakers to ...
San Francisco Chronicle (press release)
Leaders of the Security Industry Discuss the Current State of Cyber Crime and Risks Ashland, MA (PRWEB) April 04, 2012 NAISG is pleased to present Securanoia Boston 2012 on May 7 - 8 at the Microsoft Research and Development (NERD) Center in Cambridge, ...

Ireland faces constant cyber attack
OneStopClick
Estonian president Toomas Hendrik llves has told Ireland that they are more than likely subject to constant cyber-attacks, despite their neutrality, and that the country should consider an involvement with a Nato-sponsored cyber defence centre.

Anonymous Vs. DNS System: Lessons For Enterprise IT
InformationWeek
A rumored attack on the world's DNS servers by Anonymous failed to materialize. But the many enterprises still ignoring persistent weaknesses could learn from the defensive strategy. The Internet didn't go dark on Sunday.

Cyber defence slow due to generation gap: US official
Brisbane Times
Rose Gottemoeller, US Acting Under Secretary for Arms Control and InternationalSecurity, says generational gap is an obstacle for cyber security legislation. Photo: Sergey Ponomarev Policy makers stil living in the past, barely know how to use email.

Brisbane Times

Codenomicon Clarified Performed Key Role in NATO Cyber Defense Exercise Locked ...
defpro
Codenomicon Clarified Situation Awareness solutions played a key role in the Locked Shields 2012 multinational cyber security exercise. The exercise took place March 26-28 and was organized by NATO Cooperative Cyber Defense Center of Excellence in ...

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users
IT Business Edge
Google™, LinkedIn®, Skype™ and the video game Mass Effect™ 3 were among the brands exploited by cyber criminals in order to attract more victims. “Taking advantage of the notoriety of companies, celebrities and major events is a tactic cyber ...

Analysis: Cybersecurity legislation? No thanks
FederalNewsRadio.com
Harper admitted it was difficult to know how well companies were already doing at protecting themselves because the full extent of the cyber threats out there is unknown. "We have to look at the proof which is in the pudding," he said.

Government already in cybersecurity regulation business, report says
FederalNewsRadio.com
The Congressional Research Service issued an exhaustive review of the legal underpinnings forcybersecurity. Congress is debating whether to regulate private sector cyber practices, especially for critical infrastructure. CRS found the government is in ...

Preventing cyber crimes
Oman Daily Observer
Following the short welcome address by the conference Chairperson, Marco Obiso, Cyber Security Coordinator with the International Telecommunication Union (ITU), the opening keynote speaker took to the stage. Speaking to a large attentive audience, ...

Virtual Vulnerability
AllAfrica.com
Banque Populaire du Rwanda (BPR), which is heavily investing in electronic banking, says that it has not experienced any cyber attacks on its network for almost four years. However, it says that it is increasing security on its network by deploying ...

FBI, police eye 'threat poster' as terror sites go silent
Yahoo!7 News
Al-Qaeda's main websites have gone silent for more than a week in an unprecedented blackout that is most likely the result of a cyber attack, analysts said Tuesday. "All of them essentially went down" as of March 23, said Aaron Zelin, a researcher at ...

Yahoo!7 News

Rogue US Airways-themed emails distribute ZeuS-based malware
Computerworld
In this particular attack, BlackHole is being used distribute an information-stealing Trojan horse called GameOver, which is based on the much older ZeuS malware. The ZeuS source code was leaked on underground forums in May 2011, allowing cyber ...

TIGTA: IRS cyber response center needs some improvements
FederalNewsRadio.com
The cybersecurity response center at the IRS is mostly working, according to a new report from the Treasury Inspector General for Tax Administration. However, in the report, Treasury Inspector General J. Russell George said that the Computer Security ...

Even worse than SOPA: New CISPA cybersecurity bill will censor the Web
RT
HR 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America's war against cyberattacks. But the vague verbiage contained ...

RT

Cybersecurity index aims to penetrate the fog of marketing hype
Nextgov
Teaming up with a financial industry professional, he built a monthly sentiment index to capture the security community's impressions on whether risks to IT systems and networks were rising or falling. The project, called The Index of Cyber Security, ...

Al-Qaeda websites go down
The Australian Financial Review
No one has publicly claimed responsibility for disabling the sites, but the breadth and the duration of the outages have prompted some experts to conclude the forums have been taken down in a cyber attack, launched perhaps by a government-backed ...

The Australian Financial Review

Draconian 'Privacy Invasion Bill' Continues to Gain Support
TorrentFreak
The Cyber Intelligence Sharing and Protection Act (CISPA) hasn't received a whole lot of media attention yet, but it continues to pick up support from legislators. The bill is touted as being much worse than SOPA when it comes to privacy invasions.

Jihadist web forums hit by cyberattack?
FRANCE 24
A number of Jihadist web forums have reportedly been hit by a cyber-attack. US Republican candidate Rick Santorum engaged in some Obama bashing. And 8 sets of quadruplets cause mischief in the streets of New York. By Electron Libre Jihadist web forums ...

Police: Dubai watching the web round the clock
Sacramento Bee
AP DUBAI, United Arab Emirates -- A senior Dubai cyber-crimes investigator says authorities are now conducting round-the-clock monitoring of social networking sites such as Facebook and Twitter. The stepped up web watching in the United Arab Emirates ...

Tossing the cyber: community resilience in Edinburgh « Secure ...
By AlexanderDuncan
Tossing the cyber: community resilience in Edinburgh. By Paul Kearney, Chief SecurityResearcher, BT Innovate & Design. I spent a very enjoyable and stimulating day in Scotland recently, taking part in the opening conference of 2012 ...
Secure Thinking

Influential Blogger: Dealing with cyber bullies who attack using ...
By Janette Toral
Last March 22 and 23, I got interviewed about cyber-bullying. The interest on topic was heighten when showbiz personalities like Sharon Cuneta, Arnold Clavio, among others came underattack in various social media sites for what they have ...
Influential Blogger

Al Qaeda Internet Sites Under Cyber Attack: Jihadists Taunt New ...
By Maggie
Al Qaeda online sites are believed to be under cyber attack. Most of them all went dark on March 23rd. Some are back up now…and with time on their hands, jihadists are taunting with the following graphic. Feds and NYPD are all over it.
Maggie's Notebook

US fears al Qaeda cyber attack on New York | InfoWar.com
By admin
US fears al Qaeda cyber attack on New York. Wednesday, April 4th, 2012 | Filed under Cyberthreats,Headline | Posted by admin. “US law enforcement and counterterrorism officials are trying to figure out the significance of recent occurrences ...
InfoWar.com

Is China Involved in Cyber Espionage? Lucycat Trojan Strikes Hard ...
By Mellisa Tolentino
Researchers now believe that China is involved in “cyber espionage” or cyber spying. Symantec's Luckycat. Symantec, the largest maker of security software for computers, recently published a document regarding “Luckycat”–an operation ...
SiliconANGLE

(ISC)2 Blog: Security Breach in CA Networks -Comodo, DigiNotar ...
By Ravi Mandalia
by Ravi Mandalia Executive Summary Since March, 2011 more and more Cyber attacks are surfacing across the globe with damaging consequences both for the companies that faced the attacks and for the customers whose details were stolen. One such attack... ... The hacker(s) have also been reported to have used advanced attack methods to penetrate the HSM (Hardware Security Manager) with only one single open port. Through this document, I intend to highlight the fact about ...
(ISC)2 Blog

EU Cybercrime Bill Targets Anonymous: Makes It A Criminal Offense ...
By News
While we're still sorting through the crazy cybersecurity bill proposals in the US, it appears that some in the EU are going through a similar process. The EU Parliament's “Civil Liberties Committee” has approved a legislative proposal ...
PHP Hosts

Coming Full Circle: White House Re-sets Cybersecurity Priorities ...
Many have criticized the White House cybersecurity leadership for being slow to ignite positive change in the security posture of the federal government. But lets face it, there are over 1300 distinct organizations ... Hopefully future versions of SCAP will expand to include network devices, storage and other cyber intelligence related data (for example: Malware focused “MAEC” and attack data focused “Cyber Observables” or “CybOX”). 3.) Improved use of Strong Authentication, Digital ...
The Art of Data Protection

Say Anything » “Unelected Officials” Are Ok When They're Obama's ...
By Rob Port
Cybersecurity Czar (Special advisor to the president on cybersecurity, Office of Management and Budget) – Richard Clarke 14. Cybersecurity Czar (Director, National Cyber Security Center) – Rod Beckström 15. Democracy Czar (Deputy ...
Say Anything

Eight universities join GCHQ in fight against cyber-crime
By Cyber Crimes Unit
Eight UK universities are set to work closely with the UK's cyber intelligence agency after it recognised them as centres of excellence for cybersecurity research. Read this CESG: How UK defends against cyberattacks Read more GCHQ, the ...
Digital Rights Watch

CRS — Cybersecurity: Selected Legal Issues « Full Text Reports…
By fulltextreports
It has been argued that, in order to ensure the continuity of critical infrastructure and the larger economy, a regulatory framework for selected critical infrastructure should be created to require a minimum level of security from cyber threats.
Full Text Reports..

1-day exploits,Binary Diffing & patch management ... - Security Affairs
By paganinip
Security Affairs. Read, think, share … Security is everyone's responsibility ... Java vulnerabilities and in particular every 1-day exploits is increasing used by cyber crime and state sponsored a hackers. “This is the most effective way for ...
Security Affairs

Dialogues: USA Africa Dialogue Series - Fwd: [OurWorldView] US ...
By toinho
Richard A. Clarke, the special adviser to the president for cybersecurity from 2001 to 2003, is the author of "Cyber War: The Next Threat to National Security and What to Do About It." __._,_.___. Reply to sender | Reply to group | Reply via web ...
Dialogues

House Republicans introduce new cybersecurity bill | Reuters
WASHINGTON (Reuters) - Companies and the federal government would be able to share information about cybersecurity threats more easily under a bill ...
www.reuters.com/.../us-congress-cybersecurity-idUSBRE82R1...

VA To Unplug Employees Who Skip Cybersecurity Training
The Department of Veterans Affairs will lock employees out of its networks if they fail to take the required yearly cybersecurity and privacy training on time – 365 ...
gov.aol.com/.../va-to-unplugs-employees-who-skip-cybersecu...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com