Cyber Attacks Jump 81% In 2011, Mobile Threats Rise

Cyber Attacks Jump 81% In 2011, Mobile Threats On The Rise
RedOrbit
The number of cyber attacks jumped 81% in 2011, with mobile platforms like Google's Android operating system increasingly being targeted, according to an annual “Internet Security Threat Report” released on Monday by security software vendor Symantec.

RedOrbit

Enhancing America's cyber security
Boston Globe
What's more, it represents one of our gravest national security challenges: the need to enhance America's cybersecurity. Cyber insecurity is an emergent threat, and America is unprepared to win on the digital battleground.

Boston Globe

Iran Says New Cyber Warfare Is Attack on Economy
American Thinker
By Reza Kahlili Iran is blaming the US, UK and Israel for the new cyber attack that struck the Internet and communications systems of its Oil Ministry and national oil company, Iranian media has announced. The Islamic regime says the West is not only ...

Why the Government Can't Remain the Cybersecurity Czar
Slate Magazine
Mike Rogers, chairman of the House Permanent Select Committee on Intelligence and author of CISPA Last week, the controversial cybersecurity bill known as the Cyber Intelligence Sharing and Protection Act passed the House of Representatives.

The house passes controversial cyber security bill, White House veto threat ...
89.3 KPCC
It would allow the government and the private sector to share information back and forth in an effort to stop a cyber attack, bring down child pornographers and for general cyber security. Detractors say the bill is so broad and so vague that it ...

89.3 KPCC

CISPA and the Emergence of a Cyber Détente
Huffington Post
We have all known directly, or through someone that we know, about the effects of cyber-hackers. They can do anything from changing high school grades, to turning off street lights, to stealing hundreds of thousands of social security numbers from ...

Prospects poor for US cyber security bill
Financial Times
The Republican-controlled House approved the Cyber Intelligence and Protection Act (Cispa), which would allow companies to share cyber-attack information with each other and with the federal government despite the concerns of civil liberties and ...

Why The Cyber Security Act Might Not Be Good For Business
Forbes
Will government intervention help reduce the number of security attacks on our nation's infrastructure? The Cyber Security Act of 2012 aims to give the Department of Homeland Security the power to mandate the security level in industries it deems as ...

Forbes

Iran identifies 'hidden agenda' behind oil terminal cyber-attack
Consumer Tech
Tech4Biz | 01 May 2012 : The apparent cyber-attack that disrupted IT systems at Iran's main oil terminal was serious enough to have wiped data from hard drives, news agencies in the country have claimed. Since news of the attack that caused the ...

Consumer Tech

CISPA enjoys wide backing from enterprises
ITworld.com
May 01, 2012, 7:46 AM — The Cyber Intelligence Sharing and Protection Act (CISPA), the proposed federal law passed last week by the US House of Representatives that would promote the sharing of cyber threat information between private business and ...

CISPA = CYA
Network World
While cybersecurity legislative generally proceeds at a torpid pace, the US House of Representatives actually passed the Cyber Intelligence Sharing and Protection Act (CISPA) last week. The bill now proceeds to the Senate and may end up on the ...

Wombat Security Technologies Releases "Security Beyond the Office" Software ...
San Francisco Chronicle (press release)
Wombat's newest security awareness training module is a powerful tool to combat securitybreaches caused by employees. Pittsburgh, PA (PRWEB) May 01, 2012 Wombat SecurityTechnologies (Wombat), a leading provider of cyber security training solutions, ...

How to mitigate cyber security threats
Smart Business Network
Smart Business spoke with Smith about how to identify and mitigate the cyber security threats that can harm your business. What steps can businesses take to lower their risk of a securitybreach? * Test web-facing servers often and thoroughly.

Unseen Cyber-Threats
Bank Technology News
Security experts are seeing an increase lately in advanced persistent threats, threats that have no known signature or known pattern of behavior. "The first victim is patient zero," notes Samuel Visner, vice president and cyber lead executive at CSC, ...

Is Individual Privacy an Endangered SpeciesThreatened by Technology?
Examiner.com
The stated purpose of the bill is “to provide for the sharing of certain cyber threat intelligence andcyber threat information between the intelligence community and cybersecurity entities.” If passed, the bill would require the Director of National ...

“Bullet Time” Counter-Measures To Cyber-Attacks
ITProPortal
Following its debut in The Matrix, so-called "bullet time" was quickly adopted by a number of video games, and now cyber-security researchers at the University of Tulsa are employing the concept. The idea is that when a cyber-attack has been initially ...

ITProPortal

Post cyber-attack: Iranian oil ministry's intranet, national gas company's ...
Trend.az
The Iranian oil ministry's intranet is still disconnected a week after the cyber-attackwas made on its website. It took the ministry five days to get its portal along with four subsidiaries' portals back online again. But the National Iranian Gas ...

Trend.az

3 Reasons CISPA Will Adapt or Die in the Senate
Mashable
The Cyber Intelligence Sharing and Protection Act, better known as CISPA, cleared the House of Representatives late last week. CISPA aims to allow private businesses to share information about cybersecurity threats with one another and with the federal ...

Engineers Develop Algorithm To Slow Incoming Cyber Attacks
TechWeekEurope UK
Security engineers claimed to have invented an algorithm that will slow down incoming cyber attacks and give system administrators time to shore up their defences. Essentially, the way this algorithm works is to slow down internet traffic,...

TechWeekEurope UK

Federal Government Sweats over 'hacktivists'
OhMyGov! (blog)
With 75 percent of companies anticipating a second or third cyber attack against their IT infrastructure, the situation is so grave that Congress has been inspired to act. The Republican-sponsored Cyber Intelligence Sharing and Protection Act, ...

ISnSC announces a Pre-emptive Cyber Defense Center for the MENA Region
AME Info
ISnSC R&D FZ LLC announces a Pre-emptive Cyber Defense (PCD) Center for the Middle East and North Africa (MENA) region offering various cyber defense related services. The PCD Center main objective is to achieve resilience and agility on a secure ...

AME Info

Better solution needed
Buffalo News
So far, both Republicans and the Obama administration have failed to put forth legislation that would protect this nation from cyber terrorism. The House recently passed legislation that the president deemed too weak and threatened to veto.

Police State Harshness
Bay Area Indymedia
"We take security very seriously, but we fervently believe that strong computer and networksecurity does not require Internet users to sacrifice their privacy and civil liberties." "The bills currently under consideration, including Rep. Rogers' Cyber ...

Microsoft denies softening of CISPA support
The Hill (blog)
"This bill is an important first step towards addressing significant problems in cyber security," the company said at the time. The goal of CISPA is to help companies beef up their defenses against hackers who steal business secrets, rob customers' ...

Latest Web security bill a step too far
Austin American-Statesman
The same can't be said for the Cyber Intelligence Sharing and Protection Act, or CISPA, which the House approved Thursday on a 248-168 vote. CISPA removes barriers that prevent companies and the federal government from sharing certain information.

(VIDEO) Paulsen Tackles Cyber Security, Helping Seniors
Patch.com
What do you think about Congressman Erik Paulsen's postion on cyber security? Tell us in the comments section below! By Ryan Gauthier Editor's Note: All information and media has been provided by Congressman Erik Paulsen's office.

Russian Cyber-criminals make Twofold Profits During 2011; Reports Group-IB
SPAMfighter News
Group-IB a Russian security company recently published one report, which states that the net earnings, by the Russian cyber-criminals, in dollar terms went twofold during 2011. The report states that the worldwide economy of cyber-crime valued $12.5bn ...

Microsoft backs off CISPA support: Does it matter?
Digitaltrends.com
The Cyber Intelligence Sharing and Protection Act (CISPA) may have easily passed the House of Representatives last week, but it appears that support for the controversial cybersecurity bill is beginning to crumble. Over the weekend, Microsoft, ...

Digitaltrends.com

Microsoft Support for CISPA in Question?
Experts Exchange (blog)
Unlike its predecessors SOPA and PIPA, the Cyber Intelligence Sharing and Protection Act (CISPA) has enjoyed overwhelming support from the tech industry. Or at least that's been the case until now. On Monday morning, headlines exploded with reports ...

Greece Under Cyber-Attack, Ministry & Telecom Service Provider ...
By VOGH Reporter
Now another infamous hacker group named Kosova Hacker Security (KHS) engaged massivecyber attack on Greek fence. This attack also dubbed "Operation Greek" which causes serious damage for Greek Ministry of Education, Lifelong ...
VOGH- VOICE OF GREYHAT| Leading...

WPR Article | Global Insights: Building Confidence in the Cyber ...
By info@worldpoliticsreview.com (Richard Weitz)
Participating countriescan transmit data about missile tests, military exercises, troop movements and other potentially destabilizing activities deemed threatening to a country's national security. Once the agreement ... In recent years, the Defense Department has affirmed that if a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for the "use of force." However, U.S. officials have not ...
World Politics Review: Articles

Phantom Cyber Wars are a Distraction
By admin
Phantom Cyber Wars are a Distraction. April 30, 2012 By admin. Editor's note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national securityand technology. – bg. British sociologist Frank ... One example of the crisis of causality incybersecurity is the “attribution problem”–i.e. it is difficult to uncover the perpetrator of a cyber attack with certainty. But growing fear of cyber threats is also indicative of a more general attribution problem, one ...
CTOlist.com

US, Russia plan hotline to prevent cyber war from turning into a ...
By The Extinction Protocol
The proposal underscores the increasing importance of digital threats for government and military policy makers, with U.S. officials issuing warnings that a cyber attack could paralyze water, power or other vital services. The accord would mark ...
The Extinction Protocol: 2012 and beyond

Cybersecurity in the Foreground
By bizmonthly
We have a robust higher education system that trains the next generation of cyber securityexperts, institutions that are developing innovative cyber technologies and one of the nation's most technically advanced workforce.” U.S. Cyber ...
The Business Monthly

Cyber security (cyber war) hype cycle writ large
By sam
Professors Sam and Sydney Liles: Cyber warfare, privacy, computer security, computer forensics, technology, software engineering, running, life in general, and more. front page · Terms of Use · Attribution · RSS. Selil header image 2 ...
Selil

EADS Cassidian Sets Up Cybersecurity Unit | Defense Technology ...
By Cassidian
EADS Cassidian are to create a new dedicated business, Cassidian CyberSecurity, entirely devoted to addressing the fast-growing cyber security market across.
Defense Technology News at DefenceTal...

Free SMS online can be a threat in terms of security - Transparency AZ
By admin
Our geographical location in between China and India makes us more prune to externalities ofcyber terrorism and cyber warfare where we lack to even think but yes its reality and anything can happen. China being best in hardware and India in software can be a question of security for us and where are we? We are in the middle with no counter mechanism in our technology or system and the question of uncertainty haunts us in case of a CYBER ATTACK. According to a World Bank ...
Transparency AZ

Why The Cyber Security Act Might Not Be Good For Business – Forbes
By CyberThreatTeam
... water treatment facilities and wireless …Congress must balance needs for cyber security, privacyDeseret NewsANOTHER VIEW: Status quo on cybersecurity endangers infrastructureThe Westerly Sunall 5 news articles ». More Info ...
Cyberspace Threats

A New Cyber Security Model for SCADA » FISMA Focus
By jim
There's been a lot of discussion around SCADA and ICS cyber security—it impacts our critical infrastructures, which drive a number of key resources including energy, fuel, clean water, biotech and more. What's more, it drives revenue, and so there's been a mad ... The unique aspects of the SCADA systems and the device networks are ignored completely, hence the infrastructure is left with several highly vulnerable attack vectors. SCADA Security Points Matrix. If you visualize all three ...
FISMA Focus

Symantec Report Sees Cyber Attacks Increase by 81% in 2011 ...
By CM
Symantec Report Sees Cyber Attacks Increase by 81%, symantec security, virus, antivirus, about symantec, what is symantec, network security, cyber attack.
Easy Web Hosting Reviews

ARRA News Service: Remarks on CyberSecurity and More Bad ...
By Bill Smith
The Cybersecurity Enhancement Act would mandate the creation of security automation standards and checklists by the National Institute of Standards and Technology, which would be guidelines for agencies rather than requirements. NIST also would ... appear not to apply. The sponsor of the bill Representative Mike Rogers (R-MI) said, “We can't stand by and do nothing as U.S. companies are hemorrhaging from the cyber looting coming from nation states like China and Russia.
ARRA News Service

Chinese military writings reveal cyber, space war plans | InfoWar.com
By admin
A senior colonel in the General Staff Fourth Department—the cyber warfare and electronic spying section known as 4PLA—wrote in one article that Chinese electronic network attack plans call for a 'system of systems' destruction plan.” ...
InfoWar.com

Articles: Iran Says New Cyber Warfare Is Attack on Economy
Iran is blaming the U.S., U.K. and Israel for the new cyber attack that struck the Internet and communications systems of its Oil Ministry and national oil company, ...
www.americanthinker.com/.../iran_says_new_cyber_warfare_i...

World News - Suspected cyber attack hits Iranian oil network
DUBAI - Iran was investigating a suspected cyber attack on its main oil export terminal and on the Oil Ministry itself, Iranian industry sources said on Monday.
worldnews.msnbc.msn.com/_.../11350331-suspected-cyber-att...

Homeland Security Watch » Shared cybersecurity sensibilities ...
Unlike many of our challenges, differences of judgment on cybersecurity cross partisan and ideological divides. This is a good thing suggesting the potential for ...
www.hlswatch.com/.../shared-cybersecurity-sensibilities-squan...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com