International travelers' laptops vulnerable at hotel Internet connections abroad
Government Security News
The agency said recent analysis from its investigators and other government agencies showed thatCyber criminals are targeting travelers through pop-up windows while they connect to the Internet in their hotel rooms. Apparently, criminals set up bogus ...
Government Security News
The agency said recent analysis from its investigators and other government agencies showed thatCyber criminals are targeting travelers through pop-up windows while they connect to the Internet in their hotel rooms. Apparently, criminals set up bogus ...
NEWS.com.au
CYBER weapons can cause as much real damage as conventional attacks and there is nothingtechnology can do to save us, a leading internet security expert has warned. Eugene Kaspersky, founder of anti-virus software developer Kaspersky Labs, ...
Cyber-Ark Partners with Carahsoft to Deliver IT Security Solutions to the ...
MarketWatch (press release)
The agreement enhances Carahsoft's current cyber security and defense solution offerings by addressing attack vectors that are specifically handled by Cyber-Ark's Privileged Identity Management, Privileged Session Management and Sensitive Information ...
Cyber Squared to Host Cyber Espionage Webinar
MarketWatch (press release)
ARLINGTON, Va., May 21, 2012 (BUSINESS WIRE) -- In response to growing interest in their Project Enlightenment Case Study, Cyber Squared Inc. has scheduled a webinar to publically release information about the attack. Project Enlightenment was a six ...
NCC launches service against cyber attacks
Manchester Evening News
IT security firm NCC Group has launched a new service which it claims will lead the fight against the world's most common form of cyber attack. The new service, called DDoS Assured, is designed to defend against attacks where a company's servers are ...
Cyber weapons conventions needed, Kaspersky tells CeBIT
The Australian
WORLD governments need a cyber weapons convention like those for chemical and nuclear arms, computer security expert Eugene Kaspersky warned. Mr Kaspersky, founder of anti-virus software make Kaspersky Labs, today said cyber warfare had bumped cyber ...
U.S. Congressman Warns of Catastrophic Cyber Attack
eSecurity Planet
By Jeff Goldman | May 21, 2012 Republican congressman Mike Rogers, chairman of the House Intelligence Committee, recently stated that the US is insufficiently prepared for a "catastrophic cyber attack" that's likely to hit the country within the next ...
eSecurity Planet
Corporate Boards Still In the Dark About Cybersecurity
Law.com
By Catherine DunnContactAll Articles As the US natural gas pipeline sector and the Department of Homeland Security square off against malicious cyber intrusions aimed at companies, along comes yet another study that highlights serious governance ...
Law.com
Broadridge Taking Leadership Role on Cyber Security and Online Identity Management
Sacramento Bee
Broadridge is also an active member of the Open Identity Exchange (OIX), a private sector organization that is working with industry participants to develop the legal framework, technology standards and business rules to ensure that security, privacy, ...
Top Internet security expert warns 'cyber warfare technology will be used by ...
Newstrack India
Sydney, May 22 (ANI): Cyber weapons can prove to be dangerous as conventional attacks and there is nothing technology can do to save us, a leading Internet security expert has said. Eugene Kaspersky, founder of anti-virus software developer Kaspersky ...
Project Enlightenment Webinar – Additional Details Revealed
SYS-CON Media (press release) (blog)
By Adam Vincent In response to growing interest in their Project Enlightenment Case Study, Cyber Squared has scheduled a webinar, “Anatomy of a sophisticatedcyber-attack and how it affects your organization”, for May 30 th to publically release...
SYS-CON Media (press release) (blog)
The Need for New IT Security Strategy
GovInfoSecurity.com
Credit Eligible Cybersecurity threats and concerns are so great that the FBI recognizes its falling behind on the problem. So what needs to be done to hold back the flood of cyber criminals? FBI cybersecurity leader Steve Chabinsky has some ideas.
GovInfoSecurity.com
Senator warns Cybersecurity Act has same privacy problems as CISPA
Infosecurity Magazine
House lawmakers have introduced a bill to overhaul the Federal Information Security Management Act (FISMA), which governs security for IT systems of the US federal government. The Obama administration on Wednesday simulated a cyber attack on the New ...
Cybercrime: we need to wake up to the risk
eGov monitor
By Henry Harrison, Technical Director at BAE Systems Detica The launch of the UK GovernmentCyber Security Strategy last year marked a positive move towards cyber defence for British businesses. However, a BAE Systems Detica report this week revealed ...
The "Oceans 11" of Cyber Strikes
Brookings Institution
A so-called consultant in cybersecurity (at least that's what his business card and website said, and who are we to question the Internet?) spent half his presentation talking up the massive boogeyman of cyber danger that loomed for any and all, ...
WSJ: Time for government to give utilities a hand on cybersecurity
Smart Grid News
The Cyber Intelligence Sharing and Protection Act from the House of Representatives may be fairer to utilities than the White House-backed alternative in the Senate, according to an editorial in the Wall Street Journal.The Journal admits that the House...
Smart Grid News
NIKSUN CEO Dr. Parag Pruthi Gave Keynote Address at IEEE Sarnoff Symposium 2012
MarketWatch (press release)
Many attackers are motivated by financial gain, but some may also be perpetrating cyber terrorism or state sponsored espionage. These increasingly sophisticated attacks require a new paradigm for surveillance, detection, and defense.
Check Point Survey Reveals More Than Half of Targeted Attacks Reported Were ...
MarketWatch (press release)
The report, The Impact of Cybercrime on Businesses, also showed companies reporting an average of 66 new security attack attempts per week, with successful incidents costing businesses anywhere from $100000 to $300000. Among the list of top threats, ...
Critical industries don't grasp IT risks, study shows
GCN.com
By William Jackson A study by Carnegie Mellon cybersecurity researchers found that top corporate executives too often are disengaged from management of cyber risks to their organizations and that operators of critical infrastructure tend to lag behind ...
FBI investigates bomb threat at Utah cyber center
Sacramento Bee
The NSA broke ground on the $1.2 billion cyber security center in January. Camp Williams is about 25 miles south of Salt Lake City. Reader comments on Sacbee.com are the opinions of the writer, not The Sacramento Bee. If you see an objectionable ...
NCC GROUP PLC : NCC Group launches DDoS simulation service
4-traders
Global information assurance firm, NCC Group, has today launched DDoS Assured, a new service to lead the fight against the world's most common form of cyber attack. Distributed denial of service (DDoS) attacks flood organisations' servers with more ...
Iranian Hackers Claim They Compromised NASA SSL Digital Certificate
Dark Reading
Word of the alleged hack by the Iranian Cyber Warriors Team was first reported last week by SecurityWeek , which said NASA confirmed that its security office was "investigating the claim." A NASA spokesperson had not responded as of this posting to a ...
KnowBe4 Alerts Businesses to the Top 5 Spear-Phishing Scams Targeting Executives
PR Web (press release)
Cybercrime expert Stu Sjouwerman outlines new phishing tactics executives need to know and advises Internet Security Awareness Training (ISAT) to prevent breaches. According to Internetsecurity expert Stu Sjouwerman, cybercriminals are using ...
New White House cybersecurity chief largely an unknown
PC Advisor
She also notes: "It seems counterintuitive for the White House to appoint someone to the cyber security czar position who would oppose the things the president has indicated are important, which include preserving privacy while protecting the digital ...
Eugene Kaspersky predicts Apple 'disaster', and praises states on cyber crime
SC Magazine UK
Speaking at the 2012 CeBIT 2012 conference, the Kaspersky Lab CEO said he was "pretty sure the golden age of cyber crime is over and cyber criminals will have a very difficult time" due to interest from governments, reported The West Australian.
Iranian Students Claim to have Stolen Thousands of Researcher's Records
Threatpost (blog)
by Anne Saita There's still no official response from NASA officials after a group of Iranian student programmers calling themselves Cyber Warriors Team claimed to have swiped records for thousands of NASA researchers by compromising an agency site's ...
Anonymous Hackers Hit Chicago Web Sites
eSecurity Planet
"Jeff Cramer, who heads the Chicago office for Kroll Advisory Solutions, said his firm has been for months helping companies around the city secure their computer systems as they braced themselves for a cyber attack in and around the NATO Summit," ...
eSecurity Planet
NCC Group Launches DDoS-Fighting Service
ITProPortal
IT security firm NCC Group has announced the launch of DDoS Assured, a new product that aims to combat distributed denial of service attacks (DDoS). DDoSs are the world's most common cyber attacks, and function by overwhelming a site's servers with a ...
ITProPortal
NetAuthority Launches to Radically Transform Device Authentication
Sacramento Bee
NetAuthority offers a disruptive solution for identifying and authenticating Internet-enabled devices to reduce cyber security risks and prevent losses. The NetAuthority patented device-centric authentication solution helps organizations prevent ...
(ISC)2® Opens Nominations for Ninth Annual US Government Information Security ...
San Francisco Chronicle (press release)
... on the information security frontlines who are thinking outside of the box and inspiring those around them to innovate and use new tools and strategies to effectively combat the always changingcyber threats that exist against government assets and ...
Partnership Developments in Cybersecurity
The White House (blog)
While the cyber threat remains one of the most serious challenges we face as a nation, we have made some tremendous progress recently working together with industry on meaningful ways to secure our nation's critical infrastructure.
The White House (blog)
Sen. Wyden: CISPA creates 'Cyber Industrial Complex' to feed on ...
By Stephen C. Webster
... create “a Cyber Industrial Complex” that profits on Americans' private data. “It is a fundamental principle of cyber-security that any network whose failure could result in loss of life or significant property should be physically isolated from the Internet,” he said. ... It is vital that they understand that any liability for a preventable cyber attack is their responsibility – there will be no government bail-out after the fact.” Wyden added: “As they stand, these bills are an overreaction to a legitimate...
The Raw Story
By Stephen C. Webster
... create “a Cyber Industrial Complex” that profits on Americans' private data. “It is a fundamental principle of cyber-security that any network whose failure could result in loss of life or significant property should be physically isolated from the Internet,” he said. ... It is vital that they understand that any liability for a preventable cyber attack is their responsibility – there will be no government bail-out after the fact.” Wyden added: “As they stand, these bills are an overreaction to a legitimate...
The Raw Story
“Catch Me If You Can” Trojan Banker Zeus Strikes Again (Part 2 of 5 ...
By SpiderLabs Research
The pervious blog provided a general overview of the attack. “Catch Me If You Can” Trojan Banker Zeus Strikes Again (Part 1 of 5) In this blog we will discuss the techniques used by the cyber-gang to exploit users' machines. We will analyze Blackhole ... Official Blog of Trustwave's SpiderLabs - SpiderLabs is an elite team of ethical hackers, investigators and researchers at Trustwave advancing the security capabilities of leading businesses and organizations throughout the world.
SpiderLabs Anterior
The Security Risk Assessment: Where Strategy Gets Put to the Test ...
By Melissa Stevens
Security Intelligence. With the growing threat of cyber attacks, sophisticated hackers, devastating viruses & worms and more, keeping your network secure requires superior intelligence. Q1 Blog leverages the experience of the industry's best minds ... Those organizations are resting on hope; hope that they won't be targeted by a cyber attack, hope that no disgruntled insiders will take a shot, hope that their network security analysts won't miss something in the piles of log data being ...
The SIEM, Log Management, and...
Ex-CSSP Director Joins Security Firm | isssource.com
By gHale
Former Director of the Department of Homeland Security's Control System Security Program, Sean Paul McGurk, is joining ICS Cybersecurity, Inc. as Chief Policy. ... Even before the Stuxnet revelations two years ago, securing national and global critical infrastructure against the growing threats to the cyber systems that control them has become an increasingly important issue. At the May Industrial Control Systems Joint Working Group (ICSJWG) meeting, DHS recounted that 106000...
isssource.com
Advanced Persistent Conflicts: Sun Tzu, Geneghis Khan and the Art ...
By Niloofar Howe
The system had the hallmark of today's cyber espionage requirements—security clearances, tokens, fast dissemination of information, and spies infiltrating commercial networks. ... While I don't believe that the Chinese focus on information warfare poses an existential economic threat to the US (with historical dominance in espionage, they still didn't launch the first airplane, discover electricity, invent the Internet, personal computers, the microprocessor , GPS navigation … though I will ...
Paladin Capital Group
How to heal a computer after Windows Advanced Security Center ...
By Julia
How to heal a computer after Windows Advanced Security Center virus attack. May 22, 2012 — Julia. Сomputer infections cause a great deal of trouble for PC owners at present time. The cybercriminals “make us glad” with new malicious ...
Trojan Killer
Who is attacking WikiLeaks and The Pirate Bay ... - Security Affairs
By paganinip
Get on your knees, Anonymous. I am a one-man army. I am not a hacker. I am a security killer,”. Who is behind the attacks is still a mystery, it's not clear if the cyber threat has been moved by a single individual or by a group of hackers contrary to the policy of Anonymous . Many experts are convinced that ... Actually The Pirate Bay is up again, meanwhile WikiLeaks is still suffering a massive DDOS attack that has created serious problems during the last 3 days. An updated provided via ...
Security Affairs
surveillance and identity: Spaces of Terror and Risk
By David Barnard-Wills
... the Time/Space of Preparedness: Anticipating 'the next terrorist attack' - Claudia Aradau & Rens Van Munster; Securing Virtual Space: Cyber War, Cyber Terror and Risk - David Barnard-Wills & Debi Ashenden; Signifying Security - On the ...
surveillance and identity
Opinion: Anonymous 'hacktivists' set their sights on freedom | USA ...
An Anonymous YouTube video explained: “We will continue to attack websites of those who are a danger to freedom on the Internet. We will ... This year in the U.S. alone, the Pentagon plans to spend $2.3 billion on cyber security. This may be ...
USA TODAY College
US Enhances Cybersecurity Collaboration with Australia
Earlier this month, Secretary Napolitano traveled to Australia where she led the Presidential delegation at the 70th Anniversary Commemoration of the Battle of ...
www.infosecisland.com/.../21374-US-Enhances-Cybersecurity...
Next Round in Cybersecurity Battle: The Senate
The Senate will likely take up its own cybersecurity bill, S. 2105, the Cyber Security Act of 2012 (CSA), in June. The CSA is over two hundred pages long and ...
https://www.aclu.org/.../next-round-cybersecurity-battle-senate
1-15 May 2012 Cyber Attacks Statistics « Hackmageddon.com
As I did in the last month, I have summarized the data collected in my Cyber Attacks Sample for the first half of May, (whose thumbnail is on the right), in order to ...
hackmageddon.com/.../1-15-may-2012-cyber-attacks-statistics...
Anatolia,News,Agency,comes,under,cyber,attack - Hürriyet Daily News
Anatolia News Agency has announced that it had come under a cyber attack today.
www.hurriyetdailynews.com/anatolia-news-agency-comes-und...
Going to the doctor and worrying about cybersecurity
For me though, it means thinking about those plus the cyber security of the computer systems being used by the medical professionals. I've spent more time than ...
https://freedom-to-tinker.com/.../going-to-the-doctor-and-worr...