The open Internet's five deadliest enemies

The open Internet's five deadliest enemies
Digitaltrends.com
The open Internet is under attack. Every day, a myriad of groups, governments, and organizations flex their muscles in ways that challenge the integrity of the open Web and Internet. It is important for Web users to know who these entities are, ...

Digitaltrends.com

Congress Looks to Extend Government Overreach Into Cyberspace
U.S. News & World Report (blog)
Hopefully the Republicans on the Homeland Security Committee will come to their senses and reject the idea that a new cyber-bureaucracy is the answer to the security challenges the Internet currently faces. Check out US News Weekly: an insiders guide ...

Cyber borders not foolproof: Experts
IBNLive.com
BANGALORE: Putting up a brave face against the alleged espionage by Chinese hackers against Indian defence and shipping companies, a report filed by Trend Micro, a global computersecurity group has nailed Gu Kaiyuan, a graduate from the Sichuan ...

Security firm links cyber spy campaign to Chinese hacker
Himalayan Times
SAN FRANCISCO: Tokyo-based computer security firm Trend Micro said it linked a hacker in China to a 'cyber espionage' campaign targeting India, Japan and Tibetans. A Chinese hackerwhose nicknames include 'Dang0102' and 'scuhkr' was involved in online ...

Cyber-sleuth Noel traces 'he needs to die' Facebook troll... and offers to pay ...
Daily Mail
The 63-year-old star took matters into his own hands and called in Web Sheriff, a company that monitors social networking sites for cyber-bullying by trolls – people who post abusive messages on the internet. The firm contacted Facebook's headquarters ...

Daily Mail

Hacktivists no longer anonymous
The Province
Anonymous has created many powerful enemies and propelled law enforcement into action. Gene McLean, a former RCMP officer and now managing director of the cyber-security firm Digital Wyzdom, makes no distinction between those who hack for profit and ...

NSA chief sees possible Anonymous hit on power grid
Utility Products
Keith Alexander's warned of a cyber attack on the electrical grid that has come in White House meetings and in other private sessions, the Journal writes, citing people familiar with the gatherings. Although the so-called hacktivists have not indicated ...

Bring law and order to the digital Wild West
Toronto Star
Our regulatory and technological systems are simply not up to the task as yet of facing down the cyber-criminals. Given the intensity of the attack, it is remarkable how rarely we learn of the arrest and conviction of digital criminals.

Toronto Star

Chinese Hacker Linked To Spy Campaign
Imassera News
March 31, 2012- Trend Micro, a computer security firm based in Tokyo, said on Friday it has linked a Chinese hacker to a campaign of cyber espionage that is targeting Japan, India and Tibet. The hacker's nicknames include scuhkr and Dang0102.

Imassera News

Industry minister needs to wake up
Toronto Star
Re: 'Massive' cyber attack hijacked NDP vote, March 28 Your article explains that the NDP voting mechanism was probably compromised by a “botnet” — a robotic network of compromised computers usually belonging to people you call “innocent and ...

Experts Ponder Which Security Threats May Gain Speed
Credit Union Times
Indeed, there are plentiful toolkits for sale to assist would-be cyber crooks in stealing from unwitting Windows users, no matter how paltry the thieves' computing skills are. Industry watchers have coined the phrase script kiddie to refer to those who ...

Credit Union Times

US credit card security breach
Emirates 24/7
The US Secret Service is investigating a major cyber intrusion at an Atlanta-based payment processor that could expose millions of MasterCard, Visa, American Express and Discover cardholders to fraudulent charges. Processor Global Payments Inc said on ...

The Other Internet Problem
Shma
Today, Americans can literally embarrass someone to death (as in cyber-bullying) without committing a crime, even though they could face jail time for forcibly shaking someone's hand. Jewish law, in contrast, prohibits public insult in the strictest ...

Neal Ungerleider
Fast Company
Updated Mon Mar 26, 2012 Cyber Cops Stop Mohammed Merah, Scour Web For Missing Murder Videos Mohammed Merah, the French terrorist responsible for attacks on Jewish schools and paratroopers, is dead. Here's how authorities used modern techniques such as ...

Fast Company

Money & the Law: Fighting online fraud a never-ending battle
Colorado Springs Gazette
... fraudsters develop work-arounds, requiring banks to develop new security procedures, etc. Although this competition has fostered technological innovation, it hasn't done much to assure bank customers that their accounts are safe from cyber attack.

US investigates credit card security breach
MWC News
By Agencies The US government is investigating a major cyber intrusion at a payment processor that could expose millions of credit cardholders to fraudulent charges. Atlanta-based processor Global Payments Inc said on Friday it had found "unauthorized ...

The Bull Market
Monthly Review
Under oligopoly there is strong disincentive to engage in price warfare to expand one's market share, because all the main players are large enough to survive a price war and all it would do is shrink the size of the industry revenue pie that the firms ...

Alongside Bullying
dagblog (blog)
We've seen repercussions at a distance in cyber bullying and webcam spying. And blatant examples in hate crimes, sexual harassment, and the devastation caused by gangs. Intolerance of differences and control of others by coercion: hardly ...

Chemical Facility Security News: OMB Receives Emergency ICR ...
By PJCoyle
According to the Federal Register submission the ICR the “proposed collection will be used by the Department and electric sector owners and operators to identify best practices and potential resource allocations for cybersecurity in terms of supply ... While I certainly applaud any federal initiative that legitimately increases the cyber security of the electric grid, the justification above hardly provides any information that makes it clear why the normal publish and comment procedures for ...
Chemical Facility Security News

New York Times names Tencent employee as hacker - Beijing SHOTS
By Young
The article cited a report by Trend Micro, a Tokyo-based computer security company, which on Friday announced the results of a yearlong effort to trace a malicious cyber attack aimed at stealing information from hundreds of companies and ...
Beijing SHOTS

Drones are not information warfare « Assembling Cyber Security
By Tim Stevens
In an item titled, Cyber and drone attacks may change warfare more than the machine gun, Andersen and Taddeo discuss the changing nature of warfare and the ethical implications of new technologies such as drones and cyber warfare.
Assembling Cyber Security

Hunt For Secret Iranian Network Planning To Attack Jewish, Israeli ...
By editor
Sam Kiley, defence and security editor. These have included the killing of at least four scientists believed to have been part of the nuclear programme, a cyber-attack which crippled centrifuges for refining uranium, and mysterious explosions at ...
TURKISH CENTRAL RESEARCH STRATEGY...

Internal Dangers Pose Biggest Cybersecurity Threat to Marines ...
Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that ...
www.cyberwarzone.com/.../internal-dangers-pose-biggest-cyb...

DoD needs Industry's help to catch Cyber Attacks, Commander says
We have to have the ability to work with industry -- our partners -- so that when they are attacked, they can share that with us immediately.” Many cyber defense ...
www.diplonews.com/feeds/free/28_March_2012_50.php

Russian intelligence director accused West of cyber attacks as ...
A senior Russian security official told reporters this week that Western intelligence agencies are using cyber attacks to damage Russia and members of the ...
www.infowars.com/russian-intelligence-director-accused-west-...

U.S. military goes on cyber offensive - FederalTimes.com
Confronted with 10 million cyber attacks per day, the Defense Department is changing its tack. The offensive cyber weapons that have long been wielded by ...
www.federaltimes.com/article/20120326/.../203260301

Anonymous' "Operation Blackout" won't happen ... probably ...
By John Callaham
The other problem is that even if a hacker group decided to launch a cyber attack on those 13 servers, most experts agree that a total shutdown of the Internet wouldn't happen anyway. Mashable quotes Dave Marcus, director of security ...
Neowin.net

Is Iran using hackers to attack the foreign press? : Postnoon
By Postnoon News
These techniques include distributed denial of service attacks, the method favoured by hackers to disable websites. The BBC said on Thursday it was targeted in an Iran-based cyber-attack on March 1. Thought to be a DDoS attack, some parts ...
Postnoon

Secret Iran 'Terror' Squad Unmasked - Grendel Report
Sam Kiley, defence and security editor. Intelligence agencies are ... the west - through asymmetric warfare - and to cope with mounting international pressure ... been part of the nuclear programme, a cyber-attack which crippled centrifuges for ...
Grendel Report

Chinese hacker attack Indian websites
IBNLive.com
Trend Micro tracked elements of the cyber attack campaign to hackers based in China. The Luckycat campaign attacked a diverse set of targets using a variety ofmalware, some of which have been linked to other cyber-espionage campaigns.

IBNLive.com

Cybercrime exposed: Once a grad student in China, now an international hacker-spy
VentureBeat
A targeted and sustained cyber attack that ended up compromising hundreds of computers belonging to military personnel, aerospace engineers, activists and others, has been traced back to a Chinese hacker. The cyber criminal in question is Gu Kaiyuan, ...

VentureBeat

Chinese Hackers Linked To Cyber-Espionage In Japan, India, Tibet
CRN
By Antone Gonsalves, CRN Chinese hackers have been linked to a cyber-espionage campaign that planted data-gathering malware in a total of 233 computers of Tibetan activists and military and industrial entities in Japan and India.

China's Tencent employee attacks Indian websites
Times of India
NEW DELHI: Websites of Indian government and Tibetan activists in the country are underattack in a cyber attack campaign engineered by a Chinese hacker, working with one of the world's largest e-tailers Tencent, a report released by IT security firm ...

Security firm links cyber spy campaign to Chinese hacker
PhysOrg.com
Tokyo-based computer security firm Trend Micro on Friday said it linked a hackerin China to a "cyber espionage" campaign targeting India, Japan, and Tibetans. Tokyo-based computer security firm Trend Micro on Friday said it linked a hackerin China to ...

PhysOrg.com

US weighs up cyber threats
The Age
Security alarm ... threats to computer systems come from foreign governments and could one day come from terrorists, US officials warn. Photo: Frances Mocnik The Pentagon's top cyber-warrior wants Barack Obama to decide if and when the US military ...

The Age

The Future and Fears of Cyber-Warfare
American Thinker
"After a major cyber-attack, we will be talking about how we missed the signals and did not connect the dots." Could there ever be a "cyber-Pearl Harbor"? According to John Arquilla (the person who coined the phrase "cyber-warfare"), an expert on the ...

Chinese Company Denies Involvement in Japan, India, Tibet Hack Attack
International Business Times
"The LuckyCat campaign attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns," reported Trend Micro in its research paper. The LuckyCat campaign began in June 2011, involving at ...

Preventing cyber attacks
msnbc.com
Janet Napolitano talks about proposed legislation that would require owners and operators of critical facilities to notify Homeland Security at the first sign of a cyber hacking. >> mayhem in the skies. and the threat of cyberattacks. on that front, ...

Four Unanswered Questions About The US Cyber-Security Bills
Gizmodo Australia
The US legislature has cybersecurity on the brain. In the coming months, the US Congress and the Senate will consider a confusing variety of cyber-security bills — including HR 3523 (Rogers), HR 3674 (Lungren), S. 2105 (Lieberman), and S. 215 (McCain) ...

Chinese student attacks Indian government, Tibetan sites
domain-B
Websites of Indian government and Tibetan activists in India were attacked in a cyber attackcampaign by a Chinese hacker, working with one of the world's largest online retailers Tencent, IT security firm Trend Micro said in report on Friday.

NDP Leadership Vote Hit With Cyber Attack From 10000 Mystery Computers
South Asian Link
While party officials continue to insist that the actual results of the race were never at risk, ongoing investigations have confirmed that a deliberate attack using more than 10000 computers was staged on the computer servers processing the day-long ...

South Asian Link

FBI admits it is losing the fight against hackers
DigitalJournal.com
He is now leaving the organization after over 20 years of working in cybersecurity, and claims that the US is simply "not winning". On the FBI news website, Henry said that he believes “the cyber threat is an existential one, meaning that a major...

DigitalJournal.com

Indian Websites Attacked by China's Tencent Employee
NewsPoint Africa
In a recent report released by IT security firm Trend Micro, it has been found that websites of Indian government and Tibetan activists in the country have come under the threat of cyber attack, and this time the person behind the breach is found to ...

NewsPoint Africa

Internal Dangers Pose Biggest Cybersecurity Threat to Marines
Signal Magazine
Marine Corps cyber experts located in different regions head up the service's effort to keep its systems reliable and trustworthy: the Marine Corps Installations East (MCIEAST) Cyber SecurityDivision, the cybersecurity personnel of Marine Corps ...

Anonymous unmasked: The collective's disruptive influence
Montreal Gazette
Gene McLean, a former RCMP officer and now managing director of the cyber-security firm Digital Wyzdom, makes no distinction between those who hack for profit and those who hack for a cause, whatever that cause may be. “To me, they've broken the law.

'Anonymous' Hacking Group Threatens The Internet
NPR
Several weeks ago, a group identifying itself as Anonymous announced "Operation Global Blackout," the effect of which would be to bring Web surfing to a halt. Cybersecurity experts doubt the operation would have more than a limited effect, ...

Targeted Pro-Tibetan malware attacks hit Mac OS X users
ZDNet (blog)
The malware is currently detected as TROJ_MDROPR.LB. Kick off your day with ZDNet's daily e-mail newsletter. It's the freshest tech news and opinion, served hot. Get it. Dancho Danchev is an independent security consultant and cyber threats analyst, ...

ZDNet (blog)

Mastercard and Visa warn consumers over massive hacking attack
VentureBeat
It's a stark reminder that while companies like MasterCard and Visa may have some of the best cyber-security in the world, there are smaller players who make up part of the chain in a credit card payment, who make attractive targets to sophisticated ...

VentureBeat

RSA Hack Reverberates a Year Later
GovInfoSecurity.com
That March 2011 attack continues to resonate among the highest echelon of the United States government's cybersecurity leadership. Army Gen. Keith Alexander - the director of the National Security Agency and commander of the military's Cyber Command ...

GovInfoSecurity.com

Big brother may be watching you
New Zealand Herald
The Otago University cyber warfare expert says that hypothetically speaking it would be easy for Chinese technology company Huawei - banned last year as a security risk from Australia's national broadband project but still heavily involved here - to ...

'The Hunger Games' used as bait by hackers
Los Angeles Times
Cyber criminals have been dangling the lure of of free online copies of the blockbuster film to trick young fans into downloading malicious software onto their computers. In the two weeks preceding the movie's March 23 premiere, experts identified some ...

US Outgunned in Hacker War
CircleID
By Terry Zink The Wall Street Journal has an interview with the outgoing head of the FBI's cybercrime investigation Shawn Henry. In it, he has a blunt assessment of the US's capabilities when it comes to combatting online crime, especially data theft ...

Operation Blackout reportedly planned by Anonymous unlikely
PanARMENIAN.Net
The other problem is that even if a hacker group decided to launch a cyber attack on those 13 servers, most experts agree that a total shutdown of the Internet wouldn't happen anyway, according to Neowin. Mashable quotes Dave Marcus, ...

PanARMENIAN.Net

Security breach hits US card processors, banks
MSN Money
By Lauren Tara LaCapra and Carrick Mollenkamp (Reuters) - The US Secret Service is investigating a major cyber intrusion at an Atlanta-based payment processor that could expose millions of MasterCard, Visa, American Express and Discover cardholders to ...

FAA awards cyber contract to lock down personally identifiable information
FederalNewsRadio.com
The Federal Aviation Administration has chosen cybersecurity firm Lunarline to lock down personally identifiable information in its systems, MarketWatch reports. The company says it'll help the agency prevent unauthorized access and disclosure of such ...

US data chief rolls out plan for nation's info systems
DesMoinesRegister.com
Q. What are some of the challenges we face today in terms of cyber security? A. The challenge we face is it is ever-evolving. We are so much more of a connected society than even three years ago. The great thing is that we are, as a government and as a ...

Visa, MasterCard Warn Banks of Data Breach, Stolen Cardholder Data
eWeek
Cyber-criminals hacked into a credit card processing company and stole information from about 50000 Visa and MasterCard cardholders, the two companies said March 30. In separate statements, officials with Visa and MasterCard said they were aware of the ...

US investigates credit card security breach
Aljazeera.com
Major cyber intrusion at payment processor could slap millions of credit card holders with fraudulent charges. The US government is investigating a major cyberintrusion at a payment processor that could expose millions of credit cardholders to...

Aljazeera.com

Internet hackers announce an 'Armageddon' for today
Agenzia Giornalistica Italia
(AGI) Rome - A large-scale hacking attack is forecast for today against the "heart" of the Internet to shut down the whole net. This is the alert launched by Andrea Rigoni, the Director General of the Global Cyber Security Center (GCSEC).

Credit Card Numbers Stolen from 10 Million Visa & Mastercard Customers
Opposing Views
Leading credit card companies Visa and Mastercard are reporting that as many as ten million users may have been affected by a recent cyber attack. Millions of credit card holders' personal information was placed at risk when an online securitybreach ...

Opposing Views

New York cab firm linked to credit breach
Ottawa Citizen
Credit card giants Visa and MasterCard were scrambling on Friday to thwart cyber crooks who looted a massive trove of precious account data, evidently from a payment processor in New York. Gartner analyst Avivah Litan said industry sources revealed ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com