CNET
CNET learns the FBI is quietly pushing its plan to force surveillance backdoors on social networks, VoIP, and Web e-mail providers, and that the bureau is asking Internet companies not to oppose a law making those backdoors mandatory. by Declan ...
Army wants to monitor your computer activity
ArmyTimes.com
Steven Smith, chief of the Army Cyber Directorate, said the software was one of his chief priorities, joking that it would take the place of a lower-tech solution: “A guy with a large bat behind every user as they go to search the Internet.
World Press Freedom Day
The People's Voice
At issue is repressive police state legislation. HR 3523: Cyber Intelligence Sharing and Protection Act (CISPA) provides the latest example. It's more about destroying personal freedom than cybersecurity. "On World Press Freedom Day—and every day—the ...
The People's Voice
Alerts say major cyber attack aimed at gas pipeline industry
msnbc.com
A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security. At least three confidential "amber" ...
msnbc.com
Alert: Major cyber attack aimed at natural gas pipeline companies
Christian Science Monitor
A major cyber attack is currently underway aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued by the US Department of Homeland Security. By Mark Clayton, Staff writer / May 5, 2012Cyber ...
Christian Science Monitor
Elderly at risk of cyber attack
Adelaide Now
The increasing reach of the National Broadband Network means the elderly will be at risk ofcyber attacks, authorities warn. Source: Supplied THE elderly will be at greater risk of cyberattacks after the National Broadband Network rollout, ...
Senate Dems modifying cybersecurity bill to pick up GOP votes
The Hill (blog)
The House passed its own measure, the Cyber Intelligence Sharing and Protection Act (CISPA), last month despite a veto threat from the White House. The goal of CISPA is to help companies beef up their defenses against hackers who steal business secrets ...
Unannounced war on Iran
gulfnews.com
It is true that no conventional war has been announced, but nonetheless, a new form of warfare is being waged, unannounced. And that is cyber warfare. Although the Iranians seem to be more at the receiving end of cyber attacks, the situation is fluid ...
gulfnews.com
Justice Minister slams Palestinian supporters after band cancels Israeli tour
IrishCentral
Ireland's Justice Minister has launched an astonishing attack on Palestinian 'cyber bullies' who forced Irish band Dervish to cancel an Israeli tour. Alan Shatter has claimed that the Irish Palestinian Solidarity Group staged a "concerted" campaign to ...
Lake sheriff hackers reveal flaws in police computers
Orlando Sentinel
It's unclear what effect the leaked information could have on open cases, but cyber securityexperts believe the repercussions could be huge in terms of public confidence or open cases. "It's pretty devastating," said Darren Hayes, a professor at Pace ...
FEMA National Preparedness Report Finds Shortcomings in Cybersecurity ...
Occupational Health and Safety
To counter these and related threats, federal and private sector partners have accelerated initiatives to enhance data collection, detect events, raise awareness, and response to cyberincidents. The report also identifies long-term recovery ...
Intelligence sharing in the private sector
The Daily Progress
The House of Representatives has just passed the Cyber Intelligence Sharing and Protection Act, which proponents hail as necessary to security in the modern age and as a way to “stand up” for America. Opponents say it threatens the exposure of all ...
Top 10 Most Talked About Bills in Congress Last Week
Politic365
To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes. To increase purchasing power, strengthen economic recovery, ...
As It Stands: Holy Hackcalypse, Batman! What should we do?
Times-Standard
A hacker can be 12 years old or 89 years old. There are no age requirements. Hackers hang with con artists and scammers and often help them rip off unsuspecting victims by setting cybertraps. military, and corporate websites. There's never a time out.
The best practices for the secure use of QR codes
QR Code Press
As with virtually every other form of online technology, mobile barcodes are now falling victim to misuse by malicious individuals and companies that are beginning to use it as a new form of cyber attack. QR codes are inexpensive for brands and...
QR Code Press
9-11 suspects defiant as US court attempts to begin trial proceedings
Telegraph.co.uk
... of others watched the proceedings on a live video-stream at four US military bases in the north-east of the US, including Fort Meade, a sprawling army installation in Maryland that is home to the US Cyber Command and the NationalSecurity Agency.
Telegraph.co.uk
Britain goes all out to charm Asia
Malaysia Star
Similarly, Singapore's new National Cyber Security Centre set up last year would benefit from renewed engagement with British cybersecurity expertise. On other issues, like climate change, Britain has provided support for the Asean Working Group on ...
Concubhar O Liathain: Dervish are caught up in one-sided boycott of Israel
Irish Independent
"Cyber bullying" is how it was described by Justice Minister Alan Shatter -- and it's not hard to see what he's getting at. He wondered -- as we all should -- why this campaign to protect human rights is targeted solely at Israel, and not at the many ...
A look at the future of cyberwars
CNET (blog)
You may continue bullying our country's waters but we will not tolerate you from intimidating our own cyber shores." "Those defacements are just a mere response to what you have initially started. We are not trying to start anything.
Politicial parties sling presidential campaign mud sooner than usual
PennLive.com
And with that cyber exchange, any chance that the 2012 campaign would be waged with dignity and grace was gone. The sooner-than-expected dust-up affirmed widespread speculation that this race would be run with personal attacks and character ...
PennLive.com
CMS Cameron McKenna | Cyber attacks: Insurers seeking to develop risk ...
Linex Legal (press release) (registration)
Cyber crime attacks have now been upgraded to a “tier one” national security threat. Government statistics have estimated that cyber attacks cost businesses approximately £21bn a year and high profile commercial victims of cybercrime include Sony and ...
Israeli Generals, Intelligence Chiefs Condemn Politicians for Threats to ...
Al-Jazeerah.info
During his term, the Mossad carried out many assassinations, several against Iranian scientists, as well as cyber[ ]attacks. A protégé of Ariel Sharon, he was considered a champion of the most aggressive policies. And here, after leaving office, ...
Live Blog: 'March of Millions' and People's Front Rally
The Moscow Times (blog)
... Website of Prominent Newspaper Kommersant Suffers DDOS Attack: The website of leading daily Kommersant fell victim to a DDOS attack that made the site go down Sunday morning and early afternoon, Kommersant-FM reported. The website underwent cyber ...
The Moscow Times (blog)
Raritan Valley Community College sets summer youth computer, design classes
Hunterdon County Democrat - NJ.com
App Attack-Make Your First Game App: Students ages 11-14 explore the App universe and create their own mobile application or mobile game. The class will be held Monday through Friday, July 23-27, from 1-4 pm The fee is $199. Cyber Spies: Students ages ...
Schools look for solutions to challenges of new technology
Lancaster Eagle Gazette
All school districts in the state also are reviewing their policies to comply with the newly passed Jessica Logan Act, which requires them to establish cyber-bullying policies and to teach students about cyberbullying. These policies must be in place ...
US basing F-22 Raptor Stealth Aircraft at Al-Dafra Air Base on Iran's back door
Examiner.com
It was designed primarily as an air superiority fighter, but has additional capabilities that include ground attack, electronic warfare, and signals intelligence roles, according to Wikipedia. In March 2012, the GAO increased the estimated cost to $412 ...
Lee's fraternity faces breakdown
The Korea Herald
Choi had faced vehement calls for his resignation last April when the federation's online network crashed, which later was revealed to be caused by a North Korean cyber-attack. Choi was reelected to the post in November.
Queen's Speech to mark political fightback for Tories
Telegraph.co.uk
Legislation to set up the NCA will “pull together” existing agencies such as the Serious and Organised Crime Agency and the Child Exploitation and Online Protection Centre and also house the national cyber crime centre. NCA will police the border and ...
Telegraph.co.uk
EDL In Luton
libcom.org
One cyber tramp on the forums yesterday claimed that the EDL still has Jewish, Sikh and Hindu followers which is nonsense: none of the photos of recent demos have shown this and they look more like a soccer mob than ever, especially when draped in the ...
Major cyber attack aimed at natural gas pipeline companies | Peak ...
By admin
... of Homeland Security. A major cyber attack is currently underway aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security.
Peak Oil News and Message Boards
Alerts say major cyber attack aimed at gas pipeline industry – msnbc ...
By Blackmere
Each of the three alerts, for instance, includes detailed descriptions of the cyber threat – far more detailed than previous ICS-CERT warnings over the years, cyber security experts who have seen the alerts say. Those private warnings included ...
Blackmere Consulting
Google's Forced Exit From China Because of Chinese Political ...
By Star Chang
Google withdrew its search engine business from China in 2010 after it was the victim of a coordinated cyber attack that hacked into their email service. Those attacks originated in China. According to an exclusive report from Taiwan media, ...
M.I.C. Gadget
Mobile use of social networks becoming preferred way to infect ...
By admin
Michael McKinnon, Security Advisor at AVG (AU/NZ), said: “AVG detected a big increase in the use of social networks such as Facebook and Twitter to target Android users. Cyber criminals are finding it very convenient to distribute their ...
Rust Report
National Preparedness Report: Cyber Attacks Still Major Threat ...
By Team Cymru Internet Security News
Via Team Cymru Internet Security News. "While the nation has made strides in preparing for a wide range of potential disasters, state and local officials said they feel least prepared for an emerging threat: a cyber attack. Cybersecurity "was the ...
Digital Rights Watch
Mobile and Phishing – Why It's More Dangerous | Robert Siciliano ...
By Robert Siciliano
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and. ... GPS (1) cybersecurity(4) credit report (1) child predators (1) camera surveillance system (2) telemarketing scams (1) burglary (4) smartcard (1) social registration (1) skimming (3) craigslist (1) online harassment (1) cyber crime (2) skimmers (2) computer virus (1) geolocation technology (1) stupid criminals (1) remote access ...
Robert Siciliano
Alerts: Cyber attack aimed at pipeline industry - Technology ...
A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to ...
www.msnbc.msn.com/.../alerts-say-major-cyber-attack-aimed-...
SOCA website still down after mystery cyber attack ...
The website of the UK's Serious Organised Crime Agency (SOCA) has been downed by what is starting to look like the most serious cyberattack ever to hit the ...
www.computerworlduk.com/.../soca-website-still-down-after-...
Unusual cyber attack targets continue: This time Ethiopia | Norman ...
Unusual cyber attack targets continue: This time Ethiopia. May 3, 2012 by Snorre Fagerland - 1 Comment. Despite reports that digitally signed malware is ...
blogs.norman.com/.../unusual-cyber-attack-targets-continue-th...
Cyber-attack risks associated with London Olympic Games | PRLog
PRLog (Press Release) - May 03, 2012 - Information security company commissum (seehttp://www.commissum.com) today warned of an increased risk of ...
www.prlog.org/11865863-cyber-attack-risks-associated-with-l...
Follow @sobeqorg