Hidden dangers of CISPA; Chinese Censors; DNS Malware

Hidden Dangers of CISPA
PCWorld
By Dan Tynan, ITworld Have you heard of the Cyber Intelligence Sharing and Protection Act? If not, you're in for a crash course. Leading privacy and civil rights groups have declared last week StopCyber Spying Weekin an effort to get the word out ... 

Now Chinese censors try to silence US website behind ex-pat murder revelations ...
Daily Mail
By Hazel Knowles Chinese government hackers are believed to be behind a crippling cyber attack on a US-based website that revealed how British businessman Neil Heywood was killed with cyanide on the orders of the wife of a Communist Party leader.

Daily Mail

sobeq.net - DNS Malware: " . . .  the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time. . . . "

Cyber threat on agenda
Worcester Telegram
Keith Alexander, the NSA's director, also heads the Pentagon's Cyber Command, which protects military networks. “The question is whether this is a cybersecurity bill or an intelligence bill,” said Leslie Harris, president of the nonprofit Center for ...

House Takes on Cybersecurity Bills
National Journal
Measures coming up during “Cyber Week” include bills that would encourage businesses and government to share threat information; increase cyber research, development, and education; and update federal network security practices.

College cybersecurity competition brings out the pop-culture humor
Boston Herald
FBI Director Robert Mueller has said cyber attacks may soon eclipse terrorism as the nation's topsecurity threat. A hostile country could attack the nation's power grid, or try to bring down the financial system. "It's now recognized that the threat ...

House gears up for 'cyber week,' but security bill's fate rests with Senate
The Hill (blog)
By Brendan Sasso - 04/21/12 01:35 PM ET The House is set to vote on a host of cybersecurity bills next week, but the fate of the legislation rests in the Senate. The House is expected to approve theCyber Intelligence Sharing and Protection Act (CISPA) ...

Durham-based Chinese news site victim of disabling cyber attacks
News & Observer
By John Murawski - jmurawski@newsobserver.com A Chinese-language website based in Durham was disabled in recent days by an aggressive wave of cyber attacks apparently linked to a sensational murder scandal embroiling a Communist Party official in China ...

Palace to govt agencies: Take steps to protect sites from cyber-bullying
GMA News
In Friday's cyber-attack, the UP System website was defaced with a map claiming China owns Panatag (Scarborough) Shoal. “We come from China! Huangyan Island is Ours!” the message on the defaced site had read. The Philippines and China remain locked in ...

News Digest: April 23
Federal Times
That committee in December approved another bill — the Cyber Intelligence Sharing and Protection Act— to enhance information sharing between the government and private sector. The bill, HR 3523, will also be considered on the House floor next week.

CISPA Is Not the New SOPA, But It's Still Not Good, Says Analyst (19:31)
WebProNews
The Cyber Intelligence Sharing and Protection Act, which is more commonly known as CISPA, is expected to receive a House vote this week. The Internet community, with the exception of tech giants such as Google and Facebook, has been raising concerns ...

Saudi hacker dies of asthma attack
Al-Arabiya
(File photo) By Al Arabiya A Saudi hacker known just as “Cyber Terrorist” died in Riyadh after suffering an apparent acute asthma attack caused by the dust storm that hit the Saudi capital last week. The 28-year-old hacker was known for penetrating the...

Al-Arabiya

In Congress this week: Secret Service imbroglio, cybersecurity, park rules
Human Events
Pete King of New York has assigned several investigators from the House Homeland SecurityCommittee to examine the event, as has Darrell Issa (R-Calif.), chair of the Oversight and Government Reform Committee. It's not clear whether hearings will begin ...

Filipinos told: Exercise restraint amid cyber attacks
Sun.Star
MANILA (Updated 5:35 pm) -- The government urged Sunday all Filipinos to exercise restraint amidcyber attacks on Philippines and Chinese websites linked to the ongoing standoff in the Panatag or Scarborough Shoal.

Dark Clouds Over Technology: Pondering Action After Recent State Government ...
Public CIO (blog)
Anyone who thinks they are not susceptible to similar cyber incidents (whether from insider threats or external hackers) has not been paying close enough attention to the growing threat in the cyberworld we live in. (I covered this topic briefly in ...

Obama was briefed immediately about death of British ex-pat Neil Heywood ...
Daily Mail
Chinese government hackers are believed to be behind a crippling cyber attack on a US-based website that revealed how Mr Heywood was killed with cyanide on the orders of Gu. The Boxun website, run by Chinese dissidents, first reported that Mr Heywood...

Daily Mail

Hackers attack F1 websites
pitpass.com
Protests ahead of the Bahrain Grand Prix continue to gather momentum as activists move from the real world and in to cyber space. Computer hacking group Anonymous has targeted the sport's official website in order to create what it called 'a smoking ...

Saudi Hacker who Hit Israel Dies at 28
Arutz Sheva
By Maayana Miskin A top Saudi hacker who targeted Israel and Jews has died at age 28, Saudi media reported Sunday. The man, who was not named, died of an asthmaattack brought on by summer sandstorms. The hacker, who called himself “CyberTerrorist,” ...

Arutz Sheva

The end of Internet privacy
South Asia Mail
Sign the petition to these key net corporations now: The Cyber Intelligence Sharing and Protection Act (CISPA) would allow companies doing business in the US to collect exact records of all of our online activities and hand them over to the US ...

Feds need more computer defense experts, Napolitano says
CNN (blog)
We need people who are experienced in intelligence as it relates to the cyber-universe," Napolitano said. George Washington University is on a short list of institutions answering the need. The university will launch a masters' program in cybersecurity ...

Apple's Flashback Trojan tool fixes nothing
BetaNews
This is the time, should the Flashback botnet flourish -- or even just persist. As I expressed last week, before Apple released the security fix: "Botnets this size are self-propogating. Cyberciminals can use a large botnet to attack and infect other ...

BetaNews

Neil Heywood death: how news of an Old Harrovian's murder went straight to ...
Telegraph.co.uk
A senior Washington intelligence official, who analyses Chinese cyber activities on a daily basis, said: “There is no question that the Boxun denial-of-service attack was ordered by the authorities in Beijing. It has their fingerprints all over it.

Telegraph.co.uk

Mac OS X Is Vulnerable To Malware, Says Kaspersky
ITProPortal
After Apple announced back in 2011 that their beloved Macs reached 5 per cent of the desktop and laptop global market share, cyber criminals the world over turned this remark into a challenge. Just a year ago, Mac OS X suffered aggressive malware ...

Bahrain grand prix protests - live updates
The Guardian
As a response for your callus disregard for human life we, Anonymous, are taking the liberty of educating you, your fans, and the world about the crisis in Bahrain and giving you a cyber taste of your own medicine. To the fans of F1: You have every ...

The Guardian

Secret meeting between MI6 and police hours after discovery of spy Gareth ...
Telegraph.co.uk
Mr Williams had been working at NSA shortly before his death, where he was helping to develop a joint GCHQ-NSA defence against cyber attack's on the west's computer infrastructure, particularly in the banking and transport sector.

Telegraph.co.uk

CRUEL NET BULLIES MADE ME SUICIDAL
Express.co.uk
By Lucy Johnston and Richard Creasy Many of the victims who fall prey to the cyber bullies, known as internet trolls, say their ordeal lasted for 12 months or more. Researchers have highlighted the devastating effects, with cases leading to suicide, ...

Bahrain protesters hit with tear gas
Sky News Australia
Meanwhile, the sport came under attack from cyber anarchists Anonymous who vowed to turn theformula1.com website into 'a smoking crater in cyberspace'. The denial-of-service attack, under the title of Operation Bahrain, was launched shortly after ...

Cyberwar defenders train at UNO
Omaha World-Herald
While the United States is believed to have been engaged in some offensive cyber-operations, such as the one that damaged Iranian nuclear facilities, these students are focused for now on the defensive side. The UNO cyberscholars do compete sometimes ...

Past RIMS presidents offer views on risks, market changes
Business Insurance
Various factors ranging from a cyber attack to a research project that “goes the wrong way” can affect NYU's brand and reputation, he said. Rebuilding a brand is difficult and expensive, Mr. Liebowitz said. Mr. Drapeau cited the aftermath of the ...

Use of private companies in cyber operations | Vyūha
By Srijith
US Homeland Security Secretary Janet Napolitano's recent comment that the administration has and will consider the participation of private companies in “proactive” cyber “counterattacks” has received its share of attention: In discussing the private ... Thus “proactive” gels well together with “defense”, which in military literature refers to the art of preventing an attack, to mean the act of defending against an imminent attack by taking action before the act of attack has happened. This fly ...
Vyūha

Cyber warrior development needs your help | Matt Scherer | a mySA ...
By matt-scherer
There are some things that were briefing in today's 4 Annual Greater Chamber's CybersecuritySummit that were what some senior info warriors would term as “highly classified.” Yet, if there is one important, unclassified message that is coming out of today's ... As part of the conference, the Air Force Cyber Patriot national champions, the Information Technology and Security Academy, were introduced. Through the information assurance companies, the chamber and the local AFCEA ...
Matt Scherer

Advance Ethical Hacking and Cyber Security Boot Camp at Delhi ...
By noreply@blogger.com (THN Reporter)
... Ethical Hacking and Cyber Security Boot Camp at Delhi, India. Computer Security Blog !! THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability. ... This insight will help you understand how to better protect your IT architecture and identify the vectors of attack that hackers use. The Hacker News organising an Advance Ethical Hacking and Cyber Security Boot ...
The Hacker News [ THN ] - Security Blog

*Cough* *Cough* | Israellycool
By Aussie Dave
The man, who was not named, died of an asthma attack brought on by summer sandstorms. The hacker ... Israeli experts have warned that cyber warfare, already an active part of the Israeli-Arab conflict, will become more important with time.
Israellycool

Expert Warns: 100% Certainty of Total Catastrophic Failure of the ...
By admin
As Mr. Chalk points out, even the top security firms in the country have been hacked, and the head of US Cyber Security confirms that military systems are under constant attack and have been broken by hackers who have gained access to ...
Peak Oil News and Message Boards

A divided Congress confronts a rising cyberthreat — TalkVietnam
By mrhoi
Keith Alexander, the NSA's director, also heads the Pentagon's Cyber Command, which protects military networks. “The question is whether this is a cybersecurity bill or an intelligence bill,” said Leslie Harris, president of the nonprofit Center ...
TalkVietnam

College cybersecurity competition brings out the pop-culture humor ...
By Blackmere
College cybersecurity competition brings out the pop-culture humor – The News & Observer. Published April 21, 2012. "Usually, at the very end, they will do all of their attacks at once," Sackler said. Raduege called cyber security one of the ...
Blackmere Consulting

US fumbles chance to learn about China inner circle | PrairiePundit
By Merv
It is quite the scandal and it would have been nice to have some inside knowledge of how the events were handled. A site in the US that has been covering the Bo scandal has been under cyber attack this weekend. Posted 7 hours ago by ...
PrairiePundit

Cyber attack being conducted in China Video | Cyber Warzone
This video shows a cyber attack being conducted in China. It was caught on screen and aired ...
www.cyberwarzone.com/.../cyber-attack-being-conducted-chi...

CISPA Will Improve U.S. Cybersecurity | Debate Club | US News ...
The U.S. House of Representatives will have an opportunity next week to pass a critically importantcybersecurity bill. The Cyber Intelligence Sharing and ...
www.usnews.com/...is.../cispa-will-improve-us-cybersecurity

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com