Reuters Blogs (blog)
As threats of cyber-attacks expand across industries, and given the potential material impact on operations, the security of these digital technologies from internal and external threats is vital. Prior to newly released SEC guidance, there were no ...
Reuters Blogs (blog)
For cybersecurity, let bipartisanship succeed
The Hill (blog)
One of which is passing cybersecurity legislation. Cyber efforts haven't garnered much press so far for two simple reasons. First, unlike the budget and the Keystone XL pipeline, cyberproposals only recently became mired in entrenched political ...
U.S. Cyber Challenge Calling All Future Cyber Defenders to Compete!
Sacramento Bee
By SANS Institute IDAHO FALLS, Idaho, April 5, 2012 /PRNewswire-USNewswire/ -- The National Board of Information Security Examiners, through the US Cyber Challenge Initiative, today announced its Cyber Quest competition, a fun and challenging online ...
US Cyber Challenge Calling All Future Cyber Defenders to Compete!
MarketWatch (press release)
The National Board of Information Security Examiners, through the US Cyber Challenge Initiative, today announced its Cyber Quest competition, a fun and challenging online contest open to high school and college students who will compete against their ...
Is DHS ready to oversee private cybersecurity?
Federal Times
11 terrorist attacks, NRC began issuing advisories and other notices directing companies it regulates to improve the physical and cyber protection of their nuclear power plants, said Craig Erlanger, who oversees NRC's Cyber Security and Integrated ...
Mac hacker attack hits more than 600000 computers
San Francisco Chronicle
Apple fixed a security hole this week that let the malicious software spread. Users who haven't downloaded the necessary updates are vulnerable, Doctor Web said. "This once again refutes claims by some experts that there are no cyber-threats to Mac OS ...
"Cyber Czar" wants Homeland Security to patrol America's Internet borders
RT
Former George W Bush special adviser for cybersecurity, Richard A. Clarke, tackles the topic of America's susceptibility to Internet crimes in an editorial published in The New York Times this week, and the ex-White House “cyber czar” says the issue ...
RT
Al-Qaeda online forum back after blackout
Pakistan Observer
Washington—One of al-Qaeda's primary Web forums was back online Wednesday after a lengthy blackout that analysts said appeared to have the hallmarks of a cyber attack. The outages extended to at least five other sites associated with al-Qaeda, ...
China admits sites hit in hacking attack
CNN
The cyber attackers plastered the sites with subversive messages, condemning what they described as Beijing's "evil regime" and warning "Your government has been in control of your network and filters harmful things. Careful." While official news sites ...
SOPA Part II: New Cyber Intelligence Bill Threatens To Label Alleged ...
Experts Exchange (blog)
In a purported effort “[t]o provide for the sharing of certain cyber threat intelligence and cyberthreat information between the intelligence community and cybersecurity entities, and for other purposes,” CISPA threatens to take the targets of failed ...
Did the US just start a cyber war with al-Qaeda?
RT
After several al-Qaeda linked websites went offline recently, questions have been asked regarding whether or not the United States has involved itself in a cyber war against its most noted foe. Several online forums frequently visited by al-Qaeda ...
RT
Arizona's Cyber-Bullying Law May Be Revised
WebProNews
By Heather Campobello · 56 mins ago · Leave a Comment Arizona's cyber-bullying law has passed both the state House and Senate. House Bill 2549 law will become official once Governor Jan Brewer approves the piece of legislation.
Draconian Cybersecurity Bills
The People's Voice
by Stephen Lendman On March 8, the Department of Homeland Security (DHS) conducted a mock New York cyber attack. At issue was gaining support for pending Senate legislation. White House spokesperson Caitlin Hayden called the stunt a way to give ...
The People's Voice
Al Qaeda Sites Taken Down by Cyber Attack
eSecurity Planet
Five key online forums were taken down two weeks ago by an apparent DDoSattack. By Jeff Goldman | April 05, 2012 The Christian Science Monitor reports that five key online forums promoting al Qaeda were taken down two weeks ago by an apparent DDoS ...
eSecurity Planet
Battling Hackers: The Game of Cybersecurity
Midsize Insider
The same goes for the many security enthusiasts who fight back against them--which is one reason why Britain's Cyber Security Challenge event is seeking to enlist amateur talent for the ongoing struggle against hacking attacks. Amateurs are integral to ...
Apple computers target of malware attack
Toronto Star
Michael Lewis Business Reporter A malware outbreak called Flashback Trojan that has infected more than 650000 Apple Inc. computers has likely peaked, says the director of a Russia-based antivirus vendor that has been charting the cyber-attack.
Cybersecurity Roundup: Online Attacks Bigger US Threat Than Terrorism ...
CIO (blog)
FBI: Cyberattacks may represent bigger threat than traditional terrorism: Speaking at the GovSec Conference, Ralph Boelter, assistant director of the counterterrorism division at the FBI, predicted "You'll see a greater prevalence of cyber-related ...
New CISPA cybersecurity and censorship bill could be even worse than SOPA
Arab American News
The authors of CISPA say the bill has been made “To provide for the sharing of certain cyberthreat intelligence and cyber threat information between the intelligence community andcybersecurity entities,” but not before noting that the legislation ...
Watch out, Washington: CISPA replaces SOPA as Internet's Enemy No. 1
Digitaltrends.com
CA “Dutch” Ruppersberger (D-MD) late last year, CISPA is described as a “cybersecurity” bill. It proposes to amend the National Security Act of 1947 to allow for greater sharing of “cyber threat intelligence” between the US government and the private ...
When Online Hacking Poses Real-World Dangers
NPR (blog)
Anonymous is a broad, largely disorganized movement, built around the idea of cyber-civil disobedience. I think the China attacks speak to that. There are dozens, probably hundreds of different types of actions talked about in Anonymous chat rooms.
Fighting security threats: May the force be with you
CSO
"In 2011, we saw the IT industry continuing to improve the quality of software, but at the same time, cyber criminals are evolving their techniques, taking advantage of the high penetration of mobile devices and the prevalence of social media use, ...
Global Internet Slowdown: Is Anonymous to Blame?
Mashable
Asia's cyber backbone was especially hard hit, seeing packet loss of 33% or more, according to the monitoring website Internet Traffic Report. Anonymous, a loosely knit group of hackers, took credit for defacing up to 500 Chinese websites Thursday, ...
New Variant Of Flashback Malware Exploits Unpatched Java Vulnerability In Macs
Security Pronews
Cyber security firm F-secure announced this discovery via its blog today. Flashback is a trojan that was originally distributed in the guise of erotic images or politically offensive material. It was later updated to be distributed in a fake installer ...
Final Day of FOSE Featured an Impressive Panel of Women in Technology
MarketWatch (press release)
The Cyber Attack demo presented by Mischel Kwon of Mischel Kwon and Associates and Government Computer News' Technology Analyst, Greg Crowe, showed a standing-room-only audience the step-by-step patterns and methodologies for detecting attacks on an ...
Is mobile security a losing game?
FCW.com
By Amber Corrin The surge of network-connected mobile devices has introduced a new kind of threat to an already crowded cyber landscape, and with it a new kind of concern: mobilesecurity. With an increasing number of workers from both the federal and ...
Cybersecurity bills raise privacy and civil liberties concerns
FierceGovernmentIT
also contain language that permits cyber information shared with the government to be used for other purposes, according to a CDT analysis (.pdf) of four major cybersecurity bills under consideration. That ability to share information gained through ...
Rsignia Offers Affordable Deep Packet Inspection Network Monitoring and ...
Sacramento Bee
By Rsignia, Inc. COLUMBIA, Md., April 5, 2012 -- /PRNewswire/ -- Rsignia, Inc., a leading provider and technology innovator of next generation cyber security solutions, announced today the availability of an affordable deep packet inspection network ...
Registration for CyberPatriot V Now Open!
Sacramento Bee
Established by the Air Force Association, CyberPatriot was created to inspire high school students toward careers in cyber security or other science, technology, engineering and mathematics (STEM) disciplines. CyberPatriot offers valuable skills for ...
2012 Cybersecurity Symposium
BlackEngineer.com
One of the highlights at the symposium is the Cybersecurity Career Fair. The CACI & CCGCyber Security Symposium will provide college students with an understanding of the cybersecurity profession and the many pathways to enter this growing field.
Deterring State-Sponsored Cyber Attacks: Intelligence and the ...
By Jon Diamond
Until a state casts off the cloak of plausible deniability and unilaterally claims responsibility for acyber attack, we may safely assume that imperfect attribution will remain an integral feature ofcyber conflict. We may likewise reasonably assume .... Thus, rather than the current catch-all, state-centric approach, future U.S. cyber security policy should be built upon strong, reliable intelligence and an smart, incisive counterinsurgency-style deterrence. [i] Department of Defense. Department ...
Sigma Iota Rho Journal
#OpTrialAtHome : Anonymous Plans 7 April Attack on British ...
By noreply@blogger.com (THN Reporter)
OpTrialAtHome : Anonymous Plans 7 April Attack on British government. Computer SecurityBlog !! THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, ...
The Hacker News [ THN ] - Security Blog
Chicago Summit: Nuclear NATO, Global Missile Shield, Cyber Warfare
By richardrozoff
The term “global security network” used in reference to an organization that has waged air and ground wars against small nations on three continents in the past 13 years is a candidate for the most ludicrous and cynical misuse of euphemism ... With all four issues here discussed – American nuclear weapons in Europe, the U.S.-NATO missile shield, cyber warfare capabilities on the continent and increasingly more assertive energy strategies – it would be advised to mentally insert the ...
Stop NATO
Cybersecurity Roundup: Online Attacks Bigger US Threat Than ...
By Constantine von Hoffman
The FBI says online threats could soon surpass terrorism and become the number one nationalsecurity threat; Facebook apps for Android and iOS expose sensitive user information; Forbes publishes a list of hacker prices for OS exploits; and ... threat than traditional terrorism: Speaking at the GovSec Conference, Ralph Boelter, assistant director of the counterterrorism division at the FBI, predicted "You'll see a greater prevalence of cyber-related offenses, including cyber-terrorism.
CIO Blogs
European Union's proposal could make the production or use of ...
By Tyler Lee
Essentially this would make it impossible for security companies to create tools to test their ownsecurity, or the security of others since it technically could be used as a cyber attack by others with less noble intentions. While the majority of the ...
Ubergizmo
Richard Clarke & The Dr. Strangelove Approach To Cybersecurity ...
By Michael Brown
Mr. Obama must confront the cyber threat, and he does not even need any new authority from Congress to do so. Under Customs authority, the Department of Homeland Security could inspect what enters and exits the United States in ...
Michael D. Brown
Friday News & Notes - Digital Bond SCADA Security Portal
By Dale G Peterson
ICS Security News DHS released version 4.1 of their Cyber Security Evaluation Tool (CSET). This version adds Visio support for network diagrams. CSET is a good do-it-yourself option for those who can't afford pricey consultants like Digital Bond. I hope to give it a ... DHS should be providing detailed info on the attack particularly any elements that are ICS specific in method or targeting, omitting company name, IP addresses and other company identifying details of course. This week ...
Digital Bond's SCADA Security Portal
The USA, Not Dictatorships the Internet's Biggest Enemy
By Hrafnkell Haraldsson
Now comes the U.S. House of Representatives and its Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), otherwise known as H.R. 3523, backed by over 100 members of Congress (twice SOPA's support). ... Ruppersberger (D-MD), the Chairman and Ranking Member of the House Intelligence Committee says that it is written “To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity ...
PoliticusUSA
Beijing SHOTS » China to publish privacy protection standards
By Kalinda
The situation escalated within days, as several popular social networking and gaming websites also fell victim to a cyber attack, with the personal details of millions of subscribers being published. In response to these leaks, the MIIT issued a notice on Dec. 28, asking Internet service providers ... He described the security of their records at present as like “money put in banks made of paper.” The new guidelines will clarify basic principles for personal information protection and provide ...
Beijing SHOTS
CISPA: Son Of SOPA Threatens Internet Freedom | Addicting Info
By Michael Patrickson
CISPA, H.R. 3523, is meant “to provide for the sharing of certain cyber threat intelligence andcyber threat information between the intelligence community and cybersecurity entities, and for other purposes.” According to a press release issued ...
Addicting Info
ICF Team Takes 2nd In Global Cyber Competition
By Ross Wilkers
ICF Team Takes 2nd In Global Cyber Competition. An ICF International team has won second place at a global cybersecurity competition, the company announced Thursday. Senior Vice President William Jacob said the team demonstrated ...
GovCon Executive
Sites Developed with PHP Vulnerable to Attack | Blogs ...
By webadmin@itbusinessedge.com
Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users Want to make sure your computers are safe from attack? Dont go on the Web. OK, I.
Sue Marquette Poremba
The 4th Media » How the US and Israel are Shredding the NPT ...
By Kiyul Chung
Meanwhile, in the face of crippling economic sanctions, heightened political pressure, cybersabotage, assassinations of nuclear scientists, and threats of military attack, the Iranians remain steady in their drive toward what from all credible evidence is a peaceful .... There can be no meaningful “contract” without an internationalization of security arrangements that, in the end, will require a dismantling of the American warfare state that underpins its nuclear outlawry and that of its clients.
The 4th Media
Cyber terrorism, cyber attacks against al Qaeda 2.0 | Security Affairs
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act ...
securityaffairs.co/.../cyber-terrorism-cyber-attacks-against-al-q...
Al-Qaeda sites go silent in possible cyber attack - Yahoo! News
From Yahoo! News: Al-Qaeda's main Internet sites have gone silent for more than a week in an unprecedented blackout that is most likely the result of a cyber ...
news.yahoo.com/al-qaeda-sites-silent-possible-cyber-attack-18...
Draconian Cybersecurity Bills | War Is A Crime .org
Draconian Cybersecurity Bills. by Stephen Lendman. Bipartisan complicity's involved in hypingcyber threats. At issue is promoting draconian cybersecurity ...
warisacrime.org/content/draconian-cybersecurity-bills
Follow @sobeqorg