US State Department hacks Al Qaeda websites

US State Department hacks Al Qaeda websites
TG Daily
According to Secretary of State Hillary Rodham Clinton, cyber experts based at the State Department jacked Yemeni tribal websites, deleting and replacing anti-American propaganda. "Within 48 hours, our team plastered the same sites with altered ...

TSP discloses hacking of accounts
Washington Post (blog)
By Eric Yoder More than 120000 federal employees and other account holders in the Thrift Savings Plan had personal information including Social Security numbers accessed last year in a “sophisticated cyber attack,” the TSP announced Friday morning.

Northeastern designated by the NSA as a National Center of Academic Excellence...
News@Northeastern
Northeastern University has been designated as a National Center of Academic Excellence in Cyber Operations by the National Security Agency. The program, in which students can pursue a new specialty in cyber operations, aims to provide them with the ...

News@Northeastern

Cyber Attack Puts TSP Participants' Personal Data at Risk
FedSmith.com
By Ian Smith The Federal Retirement Thrift Investment Board (FRTIB) announced today that a computer belonging to Serco Inc, suffered a sophisticated cyber attack that resulted in the unauthorized access of personal information of approximately 123000 ...

FedSmith.com

Smaller cities are more prone to cyber attacks
Rediff
Smaller cities in India run the risk of a cyber attack when compared to the bigger ones. A report released by Symantec Corp reveals that smaller and emerging cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indoreare increasingly ...

Rediff

SAIC Launches Inaugural Utah Cyber Defense Challenge and Symposium 2012
GISuser.com (press release)
SALT LAKE CITY, May 24, 2012 -- Science Applications International Corporation (SAIC) (NYSE: SAI) today announced a statewide cyber competition and symposium designed to raise cyberawareness across government, academia and industry. The Utah Cyber ...

Address cyber threat now
Khaleej Times
Life increasingly lived in the cyber domain faces a new quality and quantity of threats, said security experts at the first International Cyber Security Forum for Energy and Utilities, which concluded here on Thursday. As both individuals and nations ...

Khaleej Times

US hackers take out Al Qaeda
Fudzilla
US cyber experts launched a huge attack on an al-Qaeda's affiliate and replaced propaganda with, er different propaganda. US Secretary of State Hillary Clinton told AP that the sites were based in Yemen and were full of material that bragged about ...

Hacking for freedom: U.S. hacks al-Qaeda sites in Yemen
CNET (blog)
Secretary of State Hillary Rodham Clinton says cyber hacking team replaces anti-American propaganda on site in a 48-hour period. by Donna Tam May 24, 2012 10:06 AM PDT Follow @DonnaYTam The US State Department has been hacking into al-Qaida websites in ...

US Launches Successful Cyber Attack on al Qaeda
KEYC TV
Secretary of State Hillary Clinton says the US has pulled off a cyber attack on terrorists. State department cyber experts were able to hack into Yemeni tribal websites and replace al Qaeda propoganda bragging about killing Americans with ads that show ...

Is State Dept. hacking Al Qaeda? Not quite, but propaganda war is fierce.
Christian Science Monitor
... tribal sites as a hacking attack on a rogue website. That would have been novel since cyberwar hacking – taking over, spying on, or attacking a computer network or website – has been the province of intelligence agencies and US Cyber Command.

Christian Science Monitor

Cyber Warfare: Al Qaeda Sites Hacked By US
Yahoo! News UK
By Dominic Waghorn, US correspondent | Sky News – 5 hours ago The US government says it is taking the cyber battle to its enemy by hacking al Qaeda websites. In a rare admission the US State Department has said it has penetrated the websites of al ...

Alarming Trend of Cybersecurity Breaches and Failures in the US Government
Heritage.org
The Department of Agriculture was subject to a cyber-attack by an unknown entity, during which the names, Social Security numbers, and photographs of 26000 employees were stolen.[7] 6. Economic Development Administration—February 2012.

'Privacy is Awesome' campaign hopes to derail cybersecurity bill CISPA
Death and Taxes
By DJ Pangburn 33 mins ago CISPA, the Cyber Information Sharing and Protection Act, has already passed through the House and is being debated in the Senate. It would allow corporations and government (particularly the spy agency NSA) to share ...

Terrorists Will Turn To Cyber Warfare, Professional Warns
SmartHouse
By Tony Ibrahim | Friday | 25/05/2012 Cyber weapons will be the artillery of choice for tomorrow's terrorists, wreaking as much damage as conventional weapons warnssecurity expert Eugene Kaspersky. Eugene Kaspersky is the founder of Kaspersky Labs—an ...

SmartHouse

All cyber bills center on government control, report says
FederalNewsRadio.com
The Heritage Foundation released a new report out on federal cybersecurity, and it does not paint a pretty picture. The conservative think tank said of all the cybersecurity bills before Congress right now, the most important issue is the government ...

Analysis: Cyberwarriors face a hard truth // 11:40 AM ET
Nextgov
The capabilities of cyber are fast approaching what until recently seemed possible only in a sci-fi thriller. Cyber technology “will become both a standalone warfighting instrument with global reach, and it will also be a ubiquitous enabler of the ...

The NSA selects 4 universities for Cyber Operations Program
Geek
The National Security Agency will carry out one of the most thorough background checks you will ever likely experience, and with good reason, as you are entering an organization focused on protecting the US from a cyber attack.

Geek

American Gas Association Under Pressure
The Epoch Times
Critical infrastructures are private industries that are crucial to economy and safety of the United States; industries where a well-placed cyber-attack could have potentially devastating consequences. The financial and energy sectors are other example ...

US Starts Hacking Game with Yemenís Al-Qaeda
Journal of Turkish Weekly
ìWe parody and poke holes in what they do,î a State Department official explained, in a cyber ìcat-and-mouse game.î Last week, Yemenís al-Qaeda in the Arabian Peninsula, also known as AQAP, launched a new series of banner attack ads focusing on the ...

US Government Hacks Into Al Qaeda Websites In Yemen Says Hillary Clinton
Sky News
American cyber spooks went into action it seems as soon as the sites began showing recruitment propaganda. The state-sponsored cyber attacks used the extremist websites instead to explain in detail how al Qaeda activity was hurting ordinary Yemenis.

Sky News

UK cybersecurity professionals are 'too old', says Baroness Neville-Jones
Computerworld New Zealand
The UK needs more young people entering the IT security profession if it is to avoid a skills shortage in the near future, according to the government's special representative to business for cyber security. By Anh Nguyen | London | Friday, 25 May, ...

US Special Services hack al-Qaeda website
The Voice of Russia
According to her, the terrorists have already publicly denounced the cyber attacks and called upon their supporters not to believe everything that is written on the Internet. It was clear before this that US Special Forces are already monitoring ...

The Voice of Russia

Hectic lives can lead to carelessness, says cyber cop
Malaysia Star
“Due to our busy schedules, we tend to overlook or forget to be wary of online fraud ... until it happens to us,” said Cybersecurity Malaysia CEO Lt Col (Ret) Prof Datuk Husin Jazri. He related an incident involving a professional who ended up losing ...

Government alarm over cyberattacks validated by terrorists
Network World
The video also includes a US television clip featuring cyber analyst James Lewis and former Navy admiral and past head of both the National Security Agency and director of National Intelligence Mike McConnell discussing the vulnerabilities of ...

NSA Wants to Turn College Students Into Cyber Ops Experts ...
By Brandon Russell
A new program under the U.S. National Security Agency (NSA) is looking to educate college students in cyber ops. ... Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs ...
TechnoBuffalo

Call to Action: Join the Fight Against Cyber Spying Proposals in the ...
By rainey
Call to Action: Join the Fight Against Cyber Spying Proposals in the Senate. EFF and an array of civil liberties organizations are engaged in a pitched battle against the privacy-invasive legislation Congress is pushing under the guise of promoting “cyber security.” Everyone ... Now the fight is moving to the Senate, and the word from DC is that a vote on cybersecurity measures could happen in early June. That gives us little time to waste in fighting this legislation. We need the Internet ...
Deeplinks

Is it possible to have too much cyber security? | Debating Europe
By Debating Europe
... US Secretary of State Hillary Clinton. We asked him to summarise the current state of play incyber security and, in particular, to comment on a recent report (PDF) by SDA and McAfee which concludes that law enforcement is currently lagging behind the cyber criminals. ... in prosecutingcyber-crime cases. With cyber-crime being “borderless” in the sense that often multiple territories and jurisdictions can be involved during an attack, is law enforcement keeping up with the criminals?
Debating Europe

Al Qaeda's Electronic Jihad, NSA Cyber Operations Classes, and ...
By admin
Here is today's federal cybersecurity and information technology news: An Al Qaeda video calls for an “electronic jihad” against American computer networks. More here. The National Security Agency will set up Centers of Academic Excellence in Cyber Operations at Dakota State University, Naval Postgraduate School, Northeastern University, and University of Tulsa where cleared students can learn cyber operations. More here. Rather than defer to Defense Information System ...
CTOlist.com

New Joint Cyber Divison run by Northcom, NORAD
By MG
A new cyber division, jointly managed by the North American Aerospace Defense Command (NORAD) and U.S. Northern Command's (Northcom) Operations Division,
DarkGovernment

RSA Conference Friday Five – May 25, 2012
By rsa365@hosted.jivesoftware.com
This number comes despite the fact that companies are reporting an average of 66 new attack attempts per week. It's yet another reminder that companies need to be more prepared than ever when it comes to cyber security. After Apple ...
RSA Conference Blog

Alleged al Qaeda video gives support to draconian cybersecurity ...
By Activist
“They understand that a cyber attack on our critical infrastructure will cause us great harm – possibly more than a traditional physical attack. That is why the Senate needs to act on our bipartisanCybersecurity Act that requires minimum security ...
Activist Post

The Dangers of Exploits and Zero-Days, and Their Prevention ...
By e_kaspersky
And for several years already the Internet has been a firm fixture on the list of the main sources of cyber-infections: according to our figures, in 2012 33% of users have at least once been attacked via the web. If you dig deeper into the ... For example, at the moment the most widespread exploit kit is one called Blackhole, which is able to infect over 30% of the computers visiting a compromised website (depending on the traffic, installed software and security). Not a single Trojan could ...
Nota Bene

Battlefield Publicity - Online Public Relations Thoughts
By Jim Horton
This is an interesting story of cyber warfare and an unusual way to do publicity. Attack the enemy's web sites with truth. Let the Muslim public know the facts rather than the promises of terrorists. Al Qaida in Yemen must be unhappy with the ...
Online Public Relations Thoughts

CISPA Update of the Day - The Daily What
By Cheezburger Network
To drum up opposition to the legislation, which would create “a 'cybersecurity' exemption to all existing laws,” Fight for the Future, Democrats.com, The Liberty Coalition, and the Entertainment Consumers Association have created a new website called Privacy Is Awesome. The site outlines the top five ways to ... I believe these bills will encourage the development of a cyber security industry that profits from fear and whose currency is Americans private data. These bills create a Cyber ...
The Daily What

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com