InformationWeek
Cybersecurity bill continues to draw fire from privacy groups even as it is revised. Some experts predict the entire bill will be tabled. By Mathew J. Schwartz InformationWeek Does the CyberIntelligence Sharing and Protection Act (CISPA) have any ...
Cyber Bills Called Not Enough to Protect Vulnerable US
BusinessWeek
By Eric Engleman and Juliann Francis on April 20, 2012 Proposed legislation in Congress doesn't go far enough to improve US security against cyber spying and potentially cripplinghacker attacks, a former US national intelligence director said.
America's cyber czar speaks
ZDNet (blog)
They are increasingly the backbone of our economy and our infrastructure; our national security and our personal well-being. But it's no secret that terrorists could use our computer networks to deal us a crippling blow. We know that cyber-espionage ...
ZDNet (blog)
Insurance Industry Responds to Cyber Attack Increase
Insurance Networking News
Reports show that cyber data breaches increased in 2011, and group of UK cyber insurers are developing a framework of recommended information security practices and policies. Last year was an extremely active year for data breaches, according to a new ...
Cybersecurity Roundup: Support for CISPA, Instagram Malware and More
CIO (blog)
This week's cybersecurity roundup features stories on the Cyber Intelligence Sharing and Protection Act (CISPA); a new Android Trojan that hides inside the popular Instagram photo-sharing app; Javascript-related malware that could have infected as many ...
A Web divided? Not on cybersecurity
The Hill (blog)
Last year, personal information – names, addresses, Social Security numbers, credit card information, and the like – represented 95 percent of all the data compromised by cyberintrusion. Criminals used this data for identity theft, phishing campaigns, ...
HP: Fewer security vulnerabilities reported, but risk escalating
ZDNet (blog)
By Rachel King | April 20, 2012, 1:03am PDT Summary: Cyber security threats are becoming more dangerous partially because they're now harder to predict, as seen with hacktivist group attacks from the likes of Anonymous and Lulz Security.
Cispa finds six more sponsors as critics continue to attack new cyber spy bill
The Guardian
The Cyber Intelligence Sharing and Protection Act (Cispa) is due to be discussed in the House of Representatives next week. Ahead of that discussion, critics have mounted a concerted effort to change the bill. And Cispa has now added six more...
The Guardian
Ex-FBI Cyber Cop Joins Network Security Firm
Sci-Tech Today
At the FBI, Henry said he saw intelligence about private networks constantly underattack. The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant ...
Sci-Tech Today
Can the US prevent a digital sneak attack?
CNET
Security experts gathered in New York City to discuss cyber threats -- and how to stop them. by Andrew Nusca April 19, 2012 3:08 PM PDT As the United States' technology infrastructure ages, and Internet connectivity becomes ubiquitous, ...
Moving too fast on cybersecurity
The Hill
Notably, the House Intelligence Committee passed HR 3523, the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA). The House Homeland Security Committee this week marked up HR 3674, the Promoting and Enhancing Cybersecurity and Information ...
Cyber Attack On Rise
NewsPoint Africa
He further affirmed that a lot of changes have come in the cyber attack format, as now no more long term attacks are being planned. Moreover, it has also been found that cybercriminals have now shifted their focus on Android-based smart phones.
NewsPoint Africa
CHERTOFF, INDUSTRY: CYBER THREAT IS URGENT; ACTION NEEDED
The Cypress Times
WASHINGTON, DC – The threat of a devastating cyber attack on America's critical infrastructure is real, the consequences would be costly and the need for action by Congress is urgent. That is the consensus of a panel of technology, energy and banking ...
Security and Defense: Meet the 'Cyber Defenders'
Jerusalem Post
“If you don't protect your information your attempted attack might not be successful.” Israel's expertise in cyber warfare comes from defense industries that are built on graduates of some of the IDF's elite technological units as well as from IDF ...
US State launches initiative against cyber attacks
FutureGov Magazine
By Gosia Klimowiscz | 20 April 2012 The Michigan Cyber Initiative is an umbrella project that contains several parts, including a new training and awareness program, a comprehensivecybersecurity detection and response system and the establishment of ...
CISPA cybersecurity bill 'not being rushed through,' aide says
CNET
"I'm really astounded to keep hearing this drumbeat that it's vague," Jamil Jaffer, senior counsel to the House Intelligence Committee, said during a roundtable on the Cyber Intelligence Sharing and Protection Act, or CISPA (PDF), moderated by CNET ...
White House raises concerns over CISPA bill
ITworld.com
Any cybersecurity legislation should include strong privacy protections, The Hill quoted Hayden as saying. "The nation's critical infrastructure cyber vulnerabilities will not be addressed by information sharing alone," she said in apparent reference ...
US and China Prepare Cyber Defenses in Face of Increased Hacking Threat
PRI's The World
Alan Paller is the director of research at the SANS Institute in Washington DC, which does cyber-security training. He first became aware of this new breed ofcyber-attack from China in 2005, when one such attack came from a server in the southern ...
PRI's The World
CISPA is Un-American, says UmeNow CEO
Houston Chronicle
Evelyn Castillo-Bach, Founder and CEO of UmeNow, announced today, in conjunction with her Occupy Privacy campaign, that US companies have an ethical responsibility to reject CISPA, the cyber-security bill scheduled to come to a vote next week before ...
Cyber warfare 'very unlikely', MPs are told
Public Service
Professor Sir David Omand, a visiting professor at King's College London said a frequently referenced pure cyber-attack on Estonia in 2007 "woke people up" to the cyber threat but that it was simply a large-scale version of a relatively basic ...
Public Service
HP: Fewer but More Dangerous Software Security Vulnerabilities
eWeek
However, while the downward trend in vulnerabilities is good news, the risks involved in those vulnerabilities is growing, and cyber-attacks themselves more than doubled in the second half of the year, according to HP's 2011 "Top Cyber-Security Risks ...
Cyber Bills Set to Hit House Floor Next Week
ExecutiveGov
House committees approved two cybersecurity bills on Wednesday and they are set to hit the House floor for consideration next week, the Federal Times reports. The Oversight Committee approved the Federal Information Security Amendments Act, ...
Former FBI cyber cop: Hunt the hacker, not the hack
GCN.com
Henry, who retired last month as executive assistant director of the FBI's Criminal, Cyber, Response and Services Branch, said he is moving to the private sector to provide the kind ofcybersecurity intelligence for business that is now available only ...
FBI Seizes Anonymizing Email Service Server
InformationWeek
[ Proposed Cyber Intelligence Sharing and Protection Act is under attack from privacy groups. Is CISPA Worth Saving? ] McClelland said that his company, as well as Riseup and ECN, have been cooperating with the bureau on the bomb threat probe since ...
BREAKING: Anonymous Takes Down Formula 1 Website With DDOS Attack
Jalopnik
For over a year now, we have as a global movement concentrated our efforts in Libya and Syria, leaving Anonymous Bahrain to to defend their fellow citizens in cyber space. This will no longer be the case. As of tomorrow, Friday - April 20, ...
DC, NYC hacked; intruders promise more attacks
Washington Examiner
The District and New York City governments were the targets Thursday of a major cyber-attack, which crippled their websites for hours as the self-avowed culprits vowed to initiate more attacks and DC authorities sought a federal investigation.
Red Sky Alliance and Collaborative Cyber Sharing: It's good to give, but it's ...
SYS-CON Media (press release) (blog)
By Bob Gourley Editor's note: This guest post from JeffStutzman of the Red Sky Alliance provides context on a topic of tremendous interest in the community, collaborative cyber securityinformation sharing. – bg Government sponsored hackers, ...
Hacktivists, BotNets and More: Top Security Trends and Threats from the HP ...
BankInfoSecurity.com
Enterprise organizations have been under security attacks for the past decade, but security events in 2011 have created a ripple effect that will be felt for years to come and will actually start to shift the way we view security. In the 2011Cyber ...
BankInfoSecurity.com
Insurance Industry Responds to Cyber Attack Increase – Insurance ...
By Blackmere
Last year was an extremely active year for data breaches, according to a new study. “The First Annual 2012 Data Privacy and Information Security Predictions” from Cyber Data-Risk Managers reported that there were 841 incidences of cyber ...
Blackmere Consulting
Blog Archive » Nations, businesses under attack in cyber warfare
By Amy Gillentine
Nations, businesses under attack in cyber warfare (access required). by Amy Gillentine. Published: April 20,2012. Time posted: 8:37 am. Tags: cyber warfare. No network is secure fromcyber theft or cyber warfare. That's the grim news from the ...
Colorado Springs Business Journal
The threats of the Age of cyber-warfare: Eugene Kaspersky on ...
By david b.
Eugene Kaspersky on cybercrime landscape during his talk at Kaspersky Lab's Cyber SecuritySymposium. ... So, everything is online, and unfortunately everyone, every business, every person is under the attack. There are so many targets: ...
Privacy PC
Facing Cyber Bullies Head On
By Amanda
tips for facing cyber bullies Hiding behind a computer screen is an easy way to attack and offend people without having to be accountable. And unfortunately a lot of people do just that these days. They think it's ok to go after you or your ...
SMALL BUSINESS CEO
Red Friday – April 20th
By Cary
... Cyber security Botnet DDOS (dedicated denial of service) Denial of service Malware Virus Trojan Keylogger Cyber Command 2600 Spammer Phishing Rootkit Phreaking Cain and abel Brute forcing Mysql injection Cyber attack Cyber terror ...
The "O" Word
Reiterating CTIA's Support for CISPA | CTIA-The Wireless ...
By Jot Carpenter
... to enhance America's ability to avoid cyber-attacks. CTIA applauds this effort to enhance America's national and economic security. ... We support this legislation because our members, who are on the front lines in defending America's communications networks from attack, believe it will promote robust and effective voluntary information sharing of cyber threat information between and among government and private sector partners. It will do this with appropriate privacy protections, ...
CTIA-The Wireless Association® Blog
US Air Force Space Command Vice-Commander Discusses Cyber ...
By The Editor
From GPS-enabled Joint Direct Attack Munitions to the cyberspace command and control links and satellite superiority vital to the Remotely Piloted Aircraft mission, space and cyberspace are vital to the warfighter, the General said. The cyber ...
UAS VISION
RSA Conference | Ben Rothke: Security Reading Room | Cyber ...
By rsa365@hosted.jivesoftware.com
Just got a copy of the Cyber Security Policy Guidebook. If you judge a book by the cover, this should be a good one, as some of the authors are major information security heavyweights such as Jennifer Bayuk, Marcus Sachs and others. ... 1 View Tags: none (add) deployment_strategies, enterprise_defense, hackers_and_threats, policy_and_government, data_breach, cybercrime, privacy, data_security, malware, cybersecurity, business_of_security, rothke, marcus_sachs, bayuk, ...
Ben Rothke: Security Reading Room
Red Alert: Draconian CISPA Bill Picking Up Sponsors Ahead of Vote ...
By Ask Marion
CISPA, the Cyber Intelligence Sharing and Protection Act, is picking up sponsors and it looks like the legislation will make it to the House floor for a vote next week. CISPA emerged from the House Intelligence Committee with ... CISPA, H.R. 3523 , is meant “to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.” According to a press release issued last week, the bill ...
askmarion
Survey: 41% of Energy Security Pros Say Smart Meter Infrastructure ...
The survey was sponsored by nCircle and EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the electric infrastructure. The online survey was conducted between March 12 and March 31, 2012. When asked, “What part of the smart grid infrastructure is most vulnerable to cyber attack?” 29% said “smart meters”, 41% said “metering infrastructure including transport”, 20% said “utility energy management systems” and 10% said “energy ...
Latest News from Sarbanes Oxley...
Friday News & Notes - Digital Bond SCADA Security Portal
By Dale G Peterson
ICS Security News Lots of action and disagreement on cybersecurity legislation in the US Government. One of the main ICS security partisan divides is around regulation of the privately owned critical infrastructure. This week the White House chimed in: ”National ... Critical Intelligence provides reports and other information products on Cyber Situational Awareness and Threat Intelligence services for Industrial Control System Owner/Operators, Vendors and Government stakeholders.
Digital Bond's SCADA Security Portal
UP site hacked over Scarborough Shoal | AWFM 101.1 – Mellow ...
By Sam
At the same time, Arao condemned the cyber attack. “I strongly denounce the attempt to deprive the UP community of vital information, particularly the schedule of commencement exercises in nine UP campuses and the April 2012 issue of the ...
AWFM 101.1 - Mellow Touch
Cybersecurity Bill Loses Key Provision, Dem Blames 'Extremely ...
By The Huffington Post News Editors
1, sought to protect vital networks by allowing the Department of Homeland Security to help create cybersecurity standards that companies must meet. ... There have been nearly 50 reports of "attempted or successful cyber intrusions of critical infrastructure control systems" since President Barack Obama asked Congress to pass cybersecurity legislation during his State of the Union speech in late January, according to White House spokeswoman Caitlin Hayden. Earlier this week, a ...
The Huffington Post | Full News Feed
Google+'s best feature: The power to shut trolls up | Cyber Network ...
By noreply@blogger.com (Christopher Stokes)
But, if you're mean, insulting, attack people personally, or just otherwise get on my nerves, you and your messages, are out of here. If you don't like my rules, ... your iPhone or Android Phone.Cyber Network News is now on Google Currents ...
Cyber Network News
Cybersecurity is Coming! Cybersecurity is Coming! - Cybersecurity ...
As widely reported, next week will be busy as the House takes up a series ( probably) ofcybersecurity bills as part of the House Republican Leadership's ...
cybersecurityreport.nextgov.com/.../cybersecurity_is_coming_...
Cybersecurity bill slammed by privacy advocates -- Defense Systems
A proposed national blueprint for combating cyberattacks has received ample support from members of Congress and the private sector, but also has received ...
defensesystems.com/.../agg-cybersecurity--bill-privacy-battle.a...
Follow @sobeqorg