Public concern over cyber-attack

Public concern over cyber-attack
Washington Post
Q: How concerned are you that computer systems of the US government could be the target of a major cyber-attack, meaning that computer systems could be shut down or damaged by viruses or other hacker attacks? (Half sample) Q: How concerned are you that ...

'NK third for cyber war capabilities'
The Korea Herald
Professor Lee Dong-hoon of the Korea University Graduate School of Information Security said the North is running a special unit of 3000 elite hackers under the direct control of its leader Kim Jong-un. “North Korea has been preparing for cyber warfare ...

S'pore needs to boost cyber security: Lawrence Wong
AsiaOne
SINGAPORE - With the increase in malicious cyber attacks and the nation's deep reliance on Internet services, Singapore needs to boost its cyber security. Cyberattacks are becoming a real danger, with the potential to equal to or surpass terrorism in ...

AsiaOne

'NK has third most powerful cyber war capabilities'
The Korea Herald
“In North Korea the state nurtures cyber (warfare) personnel to achieve military aims, and is capable of conducting various cyber attacks including denial of service and hacking.” He added that the distributed denial of service, or DDoS, attack in July ...

UN Tries To Navigate Cold Hard Politics Of New Cyber War
TPM
After three cyber security firms in late May announced the discovery of the Flame malware — a Windows-based espionage tool found on hundreds of computers in the Middle East capable of capturing and transmitting everything from keystrokes to ...

Sunshine suffers 'attack' of cyber crime
Nassau Guardian
"Additionally, the plaintiff has been advised of the attack to the plaintiff's domains and leaves them vulnerable to pseudo-companies being established assuming the identity and emails of the employees of the plaintiff." Not only do the companies rely ...

'Cyber attacks could mean end of world as we know it'
Haaretz
Questions raised during press conference at Tel Aviv University cyber warfare panel event concern 'Die Hard' style disasters. By Oded Yaron | Jun.07, 2012 | 2:48 AM Eugene Kaspersky, the founder of the Russian Internet security firm that alerted the ...

Haaretz

The “Shot Heard 'Round the Cyber World” – US Involvement in Stuxnet Throws ...
DigitalJournal.com (press release)
One would think the over-hyped conversation about the “biggest and nastiest” cyber attack ever devised would be the focus of every water-cooler pow-wow held amongst industry leaders in thecyber security, computer forensics and cyber warfare arenas for ...

Blunt claims leaks have made US more vulnerable to cyber-attacks
St. Louis Beacon
By Robert Koenig, Beacon Washington correspondent WASHINGTON – Echoing other Senatecybersecurity experts, Sen. Roy Blunt argued Wednesday that alleged White House leaks about a US cyber attack on Iran make this country “more vulnerable” to similar ...

Cyber hacking: Needed: Just one 'zero day'
Herald and News
Charlie Miller prepared his cyber attack in a bedroom office at his Midwestern suburban home. Brilliant and boyish-looking, Miller has a PhD in math from the University of Notre Dame and spent five years at the National Security Agency, ...

Clancy: Can the Markets Be Protected From Cyber Espionage?
CNBC.com (blog)
When a cyber-attack on the European market for carbon credit trading last year resulted in the theft of 30 million euros and the closure of the EU Emissions Trading System for more than a week, it reinforced the serious threat posed by cyber-criminals ...

And Today's Cyber Attack Award Goes to LinkedIn, as News Breaks that Users ...
Techzone360
Dave Pack, director of LogRhythm Labs said in a statement, “Without specific details of the attack, it's difficult to determine exactly what could have been done to help protect the sensitive data. However, most database breaches are the result of a ...

McCain, Kerry disagree over publishing of Iran cyberattack story
The Hill (blog)
are both infuriated over leaks to the press about a US cyber attack against Iran, but the two senior senators disagree over whether the New York Times should have published the information. McCain, who has called for a special counsel to investigate ...

Modulo Sponsors Gartner Security & Risk Management Summit and ISSA North ...
MarketWatch (press release)
... announced today that it is sponsoring and exhibiting at the upcoming Gartner Security & Risk Management Summit and the North Alabama Chapter of the Information Systems SecurityAssociation (NAC-ISSA) Cyber Security Summit.

UK legal sector ripe for cyber-attack, warn experts
MicroScope (blog)
A leading lawyer and security expert has cautioned UK law firms that their failure to tackle onlinesecurity is leaving clients increasingly vulnerable to hackers, writes Linda Endersby. London-based Seth Berman, executive managing director of Stroz ...

White House, McCain trade accusations over security leaks
Reuters
* Leaks included details of covert cyber attack on Iran * News conference planned for Thursday * McCain charges violations of law By Susan Cornwell and Mark Hosenball WASHINGTON, June 6 (Reuters) - The White House and a leading Republican senator ...

Barak admits Israel's cyberwar activity
Financial Times
By Vita Bekker in Tel Aviv Israel needs to play a more active role in cyber warfare and is developing both offensive and defensive capabilities, Ehud Barak, the defence minister, said on Wednesday. Mr Barak's statement, made at a cyber security ...

Defense Secretary Leon Panetta Sets First Cyber Operation Plan in Motion
DailyTech
United States Secretary of Defense Leon Panetta has approved a plan that will set in motion the first steps towards standardizing cyber operations for the military. The organizational framework approved by Panetta outlines a new command structure ...

DailyTech

South Korean military accuses North of cyber warfare
Radio Australia
South Korea's military security chief has accused North Korea of training elite hackers to steal military secrets. North Korea is the accused of staging cyber warfare agains South Korea. [ABC] "North Korea is trying to steal military secrets and ...

Radio Australia

Norman Announces SCADA Security OEM Partnership with Kongsberg Maritime to ...
MarketWatch (press release)
To meet this challenge against advanced persistent threats like Stuxnet, Norman has developed the Norman SCADA Protection system to protect against cyber attacks from malware such as trojans, worms and viruses that can cause millions of dollars of ...

New focus on IT security and new legislation could help prevent major events ...
Government Security News
In November 2011, the deputy assistant director of the FBI's cyber division, Michael Welch, told a London cyber security conference that hackers had recently accessed the critical infrastructure in three US cities by compromising their Internet-based ...

Kaspersky: Flame and Similar Malware Pose Worldwide Risk
eWeek
"Flame is extremely complicated, but I think many countries can do the same or very similar, even countries that don't have enough of the expertise at the moment,” Kaspersky said June 6 during acyber security conference in Tel Aviv, according to ...

Google warns users of state-sponsored cyber attacks
MediaMughals
Google Inc has warned users that their accounts may be compromised by state-sponsored cyber attacks and has asked them to take all precautions to make sure that their data is safe from any such attack. Eric Grosse, Google Engineering SecurityVice ...

MediaMughals

DHS-led exercises test nation's response to major cyber attacks
Federal Times (blog)
The Department of Homeland Security is leading a series of congressionally mandated exercises to test the nation's ability to prepare for and respond to a major cyber attack. Sponsored by the Federal Emergency Management Agency, National Level Exercise ...

Lebanon lax Web security allows easy hacking, cyber attacks
The Daily Star
Of course, there's no such thing as total Internet security. But this is even truer in Lebanon than many other countries, experts say. There are several types of IT securitybreaches. Hackers can attack the computer system (ie, laptop, PC, server, ...

The Daily Star

Republicans blast Obama for using cyber warfare for political gain
Haaretz
Arizona Senator and former presidential candidate John McCain, has accused Obama administration officials of leaking the confidential and highly sensitive information in order to boost his national security credentials ahead of the November elections, ...

Haaretz

Hackers, bloggers 'bunged cash to spin for Iran 2.0'
Register
Bardin said he believes the core members of Ashiyane were drawn from a hacker group that cut its teeth defacing Western websites and running more elaborate hacks as the so-called Iranian CyberArmy. The Iranian Cyber Army used a DNS attack to hijack ...

Poll Shows Americans Divided Over Government Cybersecurity Role
OregonLive.com
National Security Agency Director Keith Alexander, who also heads US Cyber Command, has said that "a purely voluntary and market-driven system is not sufficient" to protect critical networks. Some experts say that only an actual cyberattack shutting ...

DHS creates task force to develop cyber workforce
FederalNewsRadio.com
The Homeland Security Department has created a task force to develop future workers. It will consider expanding DHS' involvement in cyber competitions and university programs, enhancing public-private partnerships and working with other agencies.

Flame malware spoofs Windows update, prompts Microsoft to issue patch
GMA News
The advice came from Microsoft and several security vendors, which said a certificate flaw in Windows could allow the dreaded Flame malware to spread. Microsoft's Security Advisory 2718704 said the attack uses unauthorized digital certificates derived ...

Asiajin » Anti-Cyber Attack Alert System “DAEDALUS” Looks Very ...
By Akky Akimoto
Japan's National Institute of Information and Communications Technology (NICT) announced “DAEDALUS” (Direct Alert Environment for Darknet And Livenet Unified Security) system on June 6. The system has nationwide distributed surveillance network to ... The screenshots of the DAEDALUS monitoring system remind a lot of Japanese a system appeared in the popular cyber animation series “Ghost in the Shell”. Many people say that the creator of this system got influenced by the ...
Asiajin

Dept. of Homeland Security to focus on cyber workforce development
By Mid-Pacific ICT Center
Secretary of Homeland Security Janet Napolitano today said the agency will form a cybersecurityworkforce task group that will consider strategies such as expanding DHS involvement in cybercompetitions and university programs, ...
Mid-Pacific ICT Center

Israel's cyber skills an asset and a threat – CNN Security Clearance ...
By Adam Levine
Eugene Kaspersky, CEO of Kaspersky Lab, the Internet security company that uncovered the Flame virus while investigating the attack on the Iranian oil industry, addressed the issue of "Threats in the Age of Cyber Warfare." In a news ...
CNN Security Clearance

Tools and Advice the Channel Can Offer to Help Companies Ward ...
By IT Channel Insight
On 06.07.12, In Security, by IT Channel Insight. As the number and severity of cyber-crimes continues to grow, it's important for the channel to understand the steps cyber-criminals take toattack an organization's network as well as the types of ...
IT channel & Managed Services...

Cyber Threats Yet Another Frontier in Anti-choice Arsenal | MyFDL
By RHRealityCheck
An article that appeared in the The New Statesman on April 19th opined that, “The assault on BPAS'cyber security is a renegade, bottom-up attack by what appears to be a collection of individuals rather than an organized political force.” ...
Firedoglake

DHS to expand cyber workforce development | FedScoop
By David Stegon
The Department of Homeland Security will launch a new effort focused on further developing the cyberworkforce, Secretary Janet Napolitano said Wednesday during a meeting with industry and small business representatives at the White House. The initiative ... Recently, Secretary Napolitano traveled to California where she spoke to students at San Jose State University on cybersecurity and expanding the cybersecurity workforce, as part of the DHS Campus Lecture Series.
FedScoop

Flame: New cyber-attack described as an 'Industrial Vacuum ...
By Melanie Watson
A complex and targeted cyber-attack has been uncovered by Russian security firm, Kaspersky Labs.... Understand more about cyber warfare and the underground economy of cyber attacks with 21st Century Chinese Cyber Warfare.
IT Governance Blog on IT governance,...

NSA chooses Northeastern for cybersecurity initiative | The ...
By The Huntington News
The National Security Agency (NSA) selected Northeastern to be one of four universities to participate in a new cybersecurity initiative, the agency announced. The NSA named Northeastern a National Center of ... The program was launched as a part of President Barack Obama's National Initiative for Cybersecurity Education to “broaden the pool of skilled workers capable of supporting acyber-secure nation,” according to the NSA's website. As part of the program, undergraduate ...
The Huntington News

Finder of 'Flame' Virus Tells Israel to "Stop Before It's Too Late ...
By Karl Vick
Eugene Kaspersky, the Russian cyber sleuth who last week revealed the most sophisticated virus yet targeting Iran, was greeted as a hero at the Tel Aviv University conference on digital securityWednesday. ... The Russian said his concern is the vulnerability of civilian infrastructure that relies on computer operating systems such as Microsoft Windows, which cannot be hardened againstattack. The only way to secure systems that deliver water, electricity and the economy is through a...
Global Spin

Germany prepares special unit to tackle cyber attack | InfoWar.com
By admin
“Germany has prepared a special cyber warfare unit of its military to conduct offencive operations against computer hackers, who attack key installations or engage in espionage activities, defence ministry has said. “ (Source: Germany ...
InfoWar.com

Borepatch: Security Smorgasbord, vol 4 no 3
By Borepatch
The first rule about Cyber Attack Plans is that there are no Cyber Attack Plans: CyCon 2012 NATO does NOT need cyber-offensive capabilities, according to a senior military commander. Major General Jaap Willemse, who was speaking at the ...
Borepatch

Internet Advisor, Sat. June 9, 2012 4-6PM: American Cyber War ...
By Foster Braun
Richard Stiennon, frequent IA guest and security expert and industry analyst, is known for shaking up the industry and insightful commentary like his recent Forbes column on Olympic Games, the code name for America's cyber warfare initiative. He recently relaunched the ... Your Security in an Insecure World: Our team of tech experts share special insights on keeping your computer safe on the Internet and show you how to recover from a spam attack. For live show listeners, call ...
Internet Advisor

Obama Ordered Wave of Cyberattacks Against Iran - NYTimes.com
Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet (April 24 ... Mr. Obama decided to accelerate the attacks — begun in the Bush ...
www.nytimes.com/.../obama-ordered-wave-of-cyberattacks-ag...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com