Anonymous hackers cripple Australian gov't websites

Anonymous hackers cripple Australian gov't websites | Fox News: "International hacking group Anonymous took at least 10 Australian government websites offline briefly Tuesday in a series of escalating attacks over proposed changes to privacy laws. The Australian arm of the group has warned it will continue the attacks on “.gov.au” sites until plans to force ISPs to store user data and make it further available to security services are shelved. The attacks started after Prime Minister Julia Gillard answered policy questions via webcam in an online Google+ Hangout session on Saturday but the sites targeted so far are all run by the Queensland State Government."

HITRUST Expands Cybersecurity Center with Launch of First Cyber Threat ...
MarketWatch (press release)
The HITRUST C-TAS represents a major step for the healthcare industry in proactively protecting vital electronic health data and the nation's critical infrastructure against cyber crime, cyberespionage and cyber activism. It also represents an industry first ... Identified as one of the 18 critical infrastructure sectors by the Department of Homeland Security (DHS), healthcare and public health (HPH) constitutes 17 percent of the Gross National Product and protects all sectors of the economy. The sector is unique in that the ...

Cybersecurity Act of 2012: Revised Cyber Bill Still Has Problems
Heritage.org
The original bill would have assigned the Department of Homeland Security (DHS) the role of creating mandatory cybersecurity standards for critical infrastructure industries.[1] To its authors' credit, the bill moves ... Given the government's own track record of combating cyberthreats and the glacial pace at which it develops rules and regulations, there is good reason to be deeply skeptical that the government can set the right standards in a dynamic environment such as cybersecurity.[2]. Finally, a voluntary standard ...

New Cybersecurity Bill Provides Significantly Improved Privacy Safeguards
Huffington Post
Last Thursday, Senators Lieberman, Collins, Rockefeller, Feinstein, and Carper introduced a new version of the Cybersecurity Act of 2012 (S. 3414), designed to protect America's computer networks from hackers and other cyber attacks. ... TCP's Liberty and Security Committee's January 2012 report, Recommendations for the Implementation of a Comprehensive and Constitutional Cybersecurity Policy, analyzes the civil liberties risks posed by cybersecurityinformation sharing programs, and describes a series of ...

McCain attacks Reid for putting cybersecurity bill ahead of full defense budget ...
Daily Caller
The Cybersecurity Act of 2012 — which is Reid's favored cyber bill — has been delayed in the Senate since its introduction in February. The bill aims to give the Department of HomelandSecurity the authority to oversee the development of security standards ...

HITRUST launches collaborative cyber security platform for healthcare
Healthcare IT News
FRISCO, TX – The Health Information Trust Alliance (HITRUST) on Tuesday launched the HITRUST Cyber Threat Analysis Service (C-TAS), which it bills as a collaborative platform forcyber defense specific to the healthcare industry. ... “With tens of thousands of medical devices in use in our facilities across the country, being able to protect these devices from cybersecuritythreats is a key priority for us,” said John Oswalt, associate deputy assistant secretary for Policy, Privacy & Incident Response, the Department of ...

While Congress dithers, cyber threats grow greater
Nextgov
There are now multiple bills before Congress, including the Cybersecurity Act, the SECURE IT Act, the Cyber Intelligence Sharing and Protection Act, which passed the House in April, as well as the compromise framework led by Sens. Sheldon Whitehouse, D-R.I., and Jon Kyl, R-Ariz. Senate ... Elements of the intelligence provisions in the Cyber Intelligence Sharing and Protection Act or something similar that addresses this aspect of cyber security is sorely needed. It's unrealistic to expect private entities to defend ...

Nextgov

New Cybersecurity Bill Still Leaves Country Vulnerable To Attack, Experts Say
Huffington Post
... revised cyber-security bill. A Senate cybersecurity bill introduced last week removes a key provision from earlier legislation that would require companies to protect their computer systems, an omission that still leaves the nation at risk of a cyber attack, experts warn. ... "This compromise will significantly strengthen the cybersecurity of the nation's most critical infrastructure and with it our national and economic security," Sen. ..... Jerry_Frey: Decide for yourself. http://napoleonlive.info/china/china-means-cyber-warfare/ ...

It's Time to Start Stoking Fears of Cyber War
The Atlantic Wire (blog)
"Fortunately," the president noted, it was just a national security exercise. Still, "In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our ... A weak power might be able to cause a stronger power some annoyance throughcyber attack, but in seeking to compel an adversary through cyberwar, it would run the very real risk of devastating escalation. And that doesn't even get to the downsides of Lieberman's bill. According to The Electronic Frontier Foundation, the ...

Japanese Finance Ministry uncovers major Trojan attack
Computerworld
Techworld.com - Japan's Finance Ministry has uncovered evidence of a major Trojancyber-attack on its computer systems that lay undetected for almost two years, according to local sources. Ministry officials have admitted that the unspecified Trojan, which was not detected by the organisation's security systems, was probably free to steal confidential data from January 2010 to November 2011, after which the attack suddenly stopped. A total of 123 computers inside the Ministry were infected out of around 2000 so ...

Report suggests malware hits Iran atomic organization, blasts AC/DC at night
VentureBeat
A purported Iran scientist working for the Atomic Energy Organization of Iran e-mailed an SOS to F-Secure Chief Research Officer Mikko Hypponen this weekend, saying the AEOI was under a cyber attack. Hypponen, who is well-regarded in thesecurity ...

VentureBeat

Security experts mixed on revised Lieberman bill
The Hill (blog)
... by the Homeland Security Department. That section of the bill was modified so companies could elect to join a program where they would receive incentives such as liability protection in exchange for meeting sector-specific cybersecurity standards. ... In a statement, Collins cited a recent report from the Homeland Security Department that said owners of critical infrastructure have reported nearly 200 cyber intrusions in 2011, a 400 percent increase from the previous year. “The data and the headlines make it clear ...

Heritage urges Senate to reject cybersecurity bill
The Hill (blog)
The conservative group argued that the government moves too slowly to keep up with developments in cyber attacks, and it shouldn't be entrusted with developing even voluntarysecurity standards. "The federal government does not have a good track record ...

London ready to fight off Olympic hack attacks
Reuters
"The digital systems recording scores and timings are susceptible to attack and will be targeted by hacktivists wanting to make a statement and by organized crime groups looking to profit from betting on events," said a former UK government cyber security ...

Cyber Attack 'Forces Iranian Nuclear Computers To Play AC/DC At Full Volume'
Huffington Post UK
Cyber warfare has been taken to a new, hard rockin' level. According to one security expert, a computer virus has attacked computer systems in Iran and forced them to play heavy metal, at full volume, during the middle of the night. ... "According to the email our cyber experts sent to our teams, they believe a hacker tool Metasploit was used. The hackers had access to our VPN.... #tech Cyber Attack 'Forces Iranian Nuclear Computers To Play AC/DC At Full Volume': Cyber warfare has b... http:... http://t.co/r06rTC0f ...

Is a Computer Worm Causing Iranian Nuclear Facilities to Blast AC/DC's ...
Gawker
... attack by involuntary blasts of AC/DC, sparked by computer malware. Mikko Hypponen, lead researcher at the Finnish computer security firm F-Secure, says he received "a series of emails from Iran" this weekend about a new rockin' cyber attack on nuclear research facilities there. ...Flame was developed by the U.S. and Israel to spy on Iranian computer networks in advance of future cyber warfare campaigns, according to the Washington Post. But the program mentioned in the email, Metasploit, is an open-source ...

Obama presses Congress on cybersecurity bill
FCW.com
Describing a recent cyber attack drill exercise, Obama called for cybersecurity to be a top priority, and to pass laws that would enable information-sharing, address security concerns and protect civil liberties. “It doesn't take much to imagine the consequences ...

'Hacktivist' group Anonymous take down Australian government websites in ...
TNT Magazine
The 'hacktivist' group Anonymous has taken down at least 10 Australian government websites in a cyber attack to protest proposed changes to privacy laws. The Aussie faction of the group said it will continue to take '.gov.au' sites offline until plans to force ...

TNT Magazine

National Security Leaks and Iranian Revenge
Council on Foreign Relations (blog)
In his 2009 book The Inheritance, Sanger revealed details about the NationalSecurity Agency's (NSA) penetration of Iranian government computers—also known as cyber exploitation—that helped inform the 2007 National Intelligence Estimate, which ... aloud at the same hearing: “Would it bother you to know that the detail that was described in the New York Times, if true, is a level of detail not presented to members of Congress, such as the chairman of the CybersecuritySubcommittee on Homeland Security, that is, ...

Council on Foreign Relations (blog)

Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals
Brookings Institution
A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night's tequila and file into a ballroom at the Ritz-Carlton hotel. At the front of the room, a giant ... In fact, he's one of Russia's richest men—the CEO of what is arguably the most important Internet security company in the world. His name is Eugene Kaspersky, and ... In other words, Kaspersky Lab isn't just an antivirus company; it's also a leader in uncoveringcyber-espionage. Serving at the pinnacle of such ...

Updated US cyber security act could be disastrous for internet freedom
Computing
The Act failed to pass in February 2012, but Senator Joseph Lieberman and his supporters have returned with a redraft, which they want passed as quickly as possible in order to address the "clear and present danger" of cyber criminality and aggression. Further reading ... "While the bill we introduced in February is stronger, this compromise will significantly strengthen thecybersecurity of the nation's most critical infrastructure and with it our national and economicsecurity," said Lieberman. "We responded after the ...

European Union lags behind U.S. in cyber legislation
FederalNewsRadio.com
While the Senate prepares to debate cybersecurity legislation, other countries are moving ahead with similar proposals. The European Union ... The latest version of the cyber bill proposes encouraging companies to comply with standards. This story is part of ...

Cyber attacks: don't think if, think when
bdaily
If a business suffered a cyber attack and lost this kind of data, the reputational and financial damage would be significant. The average cost of a large organisation's worst security breach is £110k-£250k and £15k-£30k for a small business. Customers too will ...

bdaily

Revised Lieberman-Collins cyber legislation drops sticks in favor of carrots
FierceGovernmentIT
If they demonstrate through self-certification or a third-party assessment that they meet voluntarycybersecurity practices, they would be eligible for benefits "including liability protections, expedited security clearances and priority assistance on cyber issues," ...

US faces new uphill battle in cyberspace
FCW.com
As developing countries begin to catch up with the technology wave and realize the potential the Internet offers, the U.S. will face a new set of challenges on the policy front, according to a State Department cyber official. ... Painter, who was appointed to his current role in February 2011, delivered a keynote at the July 20 Defense & Security MOBILE Symposium held in Washington, D.C. His speech stressed the growing recognition that cybersecurity and related issues are becoming increasingly important around the ...

Cyber Warfare and Combat Aircraft - Borrowing Ideas From The Constitution
Canada Free Press
But it also offers a new vulnerability: our sophisticated enemies are now able to sense when their equipment is targeted by an AESA radar beam, and their own cyber warfare equipment can create return beams with computer code in them that can deceive or take over the computer information and control systems in our aircraft. In the Aviation Week article the idea ... The problem is, we know that various potential enemies are already working on such programs toattack our combat aircraft. So - how does this have ...

Meet the new Cyber Czar (a Putin pal who fights to limit US Cyber interests)
SYS-CON Media (press release) (blog)
Friend and writer Noah Shachtman has produced a nice piece for Wired Magazine titled “Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals” Most all in the cyber securityand national security communities have heard about Kaspersky and I imagine you have familiarity with his software and company and connections to Russian ... A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night's tequila and file into a ballroom at the Ritz-Carlton hotel.

Stuxnet thwarted by control code update
BBC News
The fix comes as reports circulate of a fresh cyber attack on Iranian nuclear enrichment project. Burn out. Stuxnet ... Top F Secure security researcher Mikko Hypponen said it had not been able to confirm any of the details in the message. However, digital ...

BBC News

Cloud, Cyber And Mobile Conferences Announce Session Track Topics
HostReview.com (press release)
... Government Events, 1105 Media, Inc. “Topics ranging from OMB's Digital Strategy and the future of mobile-friendly government, to the cyber threat landscape, to the 'Cloud First' policy andsecurity mandates of FedRAMP, will be discussed in one location.

Will Loss of 200 Cheltenham Spy Centre Staff Threaten UK Security?
Top Secret Writers
In a 'coy' press briefing about the level of cyber attacks in the UK, the British Home Officesecurity minister, Lord West, declined to comment when asked about what countries had been involved in attempting to attack British government systems. Lord West ...

TIA cautions against cybersecurity mandates
The Hill (blog)
Keith Alexander, head of U.S. Cyber Command, and former National Security Agency Director Michael Hayden about how legislation should include some sort of cybersecurity standards for critical infrastructure in addition to information sharing measures.

Playing Cyber War Games to Detect Security Flaws in Enterprise ...
By Sudarshan Gopaladesikan
Creating a proper cyber war game involves brainstorming sessions between business andsecurity managers about which assets are important, who are potential attackers, and what the impact of an attack will be. Once the main components ...
Gamification Blog

Cyber expert: Iran scientist reports new malware attack | The Back ...
By Laura Rozen
On Sunday, Finnish cyber security expert Mikko Hypponen received a series of emails from a scientist at Iran's atomic energy organization. “The scientist reached out to publish information about Iranian nuclear systems getting struck by yet ...
The Back Channel

Irans Nuclear Things under Cyber-Attack by AC/DC-Fans - Nerdcore
By René
Irans Nuclear Things under Cyber-Attack by AC/DC-Fans. Angeblich sind Irans Nuklear-Anlagen grade wieder einem Cyber-Angriff ausgesetzt und infolge dessen plärrt aus den Boxen der Rechner dort nachts AC/DCs „Thunderstruck“.
Nerdcore

Cybersecurity “Compromise” Distracts From Destruction of Internet ...
By Susanne Posel
Under presidential declaration, the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and “America's economic prosperity in the 21st century will depend on cybersecurity.” In an executive ...
OCCUPY CORPORATISM

Senate Bill Supports President's Effort to Control the Internet | The ...
By Roger Armbrust
The U.S. Senate will vote this week on the Cybersecurity Act of 2012, which would strengthen President Obama's attempt to control the Internet, primarily through the departments of Homeland Security (DHS) and Defense. The bill ... The bill instructs the council “to identify categories of critical cyber infrastructure only if a cyber attack to that infrastructure could reasonably result in: (1) interruption of lifesustaining services sufficient to cause a mass casualty event or mass evacuations; ...
The Clyde Fitch Report

Risk intelligent governance in the age of cyber threats | Deloitte SA ...
Continuing reports of cyberattacks on high-profile businesses – as well as recent SEC guidance urging companies to consider disclosing cybersecurity incidents – are prompting boards of directors to start exploring cyber threat risk with their ...
Deloitte SA Blog

Cybersecurity Bill Rhetoric Heats Up in Washington - PC World by ...
By laplasina
Computer vulnerabilities and how they can affect Americans security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation. ... Barack Obama Urges Cyber Bill Passage As Hackers Probe Critical Networks Every Day – Huffington Post President Barack Obama on Thursday called on Congress to pass legislation that protects critical computing infrastructure from hackers, saying cyber threats are one of the most serious economic and national ...
My Blog by laplasina | English,...

Europol to lead International Cyber Security Protection Alliance ...
By admin
Called Project 2020, the study by the International Cyber Security Protection Alliance and led by its strategic law enforcement partner Europol will analyse current trends in cybercrime and how they may evolve over the next eight years and beyond. ... critical infrastructure in countries around the world has been under daily cyber attack from both organised criminal networks and state-sponsored entities,” says John Lyons, the Chief Executive of the International Cyber SecurityProtection ...
Worldpresse.net - Nachrichten und ...

Chemical Facility Security News: Analysis of S 3414 – Voluntary ...
By PJCoyle
The term 'cybersecurity practices' is vaguely defined as “voluntary outcome based cybersecuritypractices … sufficient to effectively remediate or mitigate cyber risks identified through an assessment conducted under section 102(a)” {§103(a)}.
Chemical Facility Security News

Updated US cyber security act could be disastrous for internet ...
By Mikhail Doroshevich
Updated US cyber security act could be disastrous for internet freedom. By Peter Gothard. The latest draft of the US Cybersecurity Act could restrict internet freedom and result in the prosecutions of ISPs and peer-to-peer media sharers. The act ...
Information Policy

Iranian cyber team brought down 220 Israeli websites and servers ...
By Semantica
Iranian cyber team brought down 220 Israeli websites and servers. Tuesday, 24 July 2012. Iranian DataCoders Security Team said the attack was carried out on the anniversary of the assassination of Iranian nuclear scientist Darioush ...
Iran Daily Brief

Hot Spit! (Boker tov, Boulder!)
By Yael
Mikko Hypponen, lead researcher at the Finnish computer security firm F-Secure, reported in his blog that a scientist working at the Atomic Energy Organisation of Iran (AEOI) sent him an e-mail about his systems getting hit by a cyber-attack.
Boker tov, Boulder!

Iran is under cyber-attack from heavy metal | Tegato
By Darryn
While not exactly known as being home to the Ayatolla of Rock 'n Rolla, it seems that Iran and its PCs at a nuclear power station where they're totally not developing bombs is under a malware attack, with their network launching a series of Thunderstruck recordings from AC/DC, at random times. Finnish computer security firm F-Secure lead researcher Mikko Hypponen, posted the following email from Iran on his blog: ... Tags: AC/DC, attack, cyber, Iran, Thunderstruck, warfare...
Tegato

Feinstein: White House Behind National Security Leaks - Crime and ...
By Bill Otis
Feinstein: White House Behind National Security Leaks. July 24, 2012 6:48 AM | Posted by Bill Otis | 0 ... Some of the leaks in question pertain to a cyber attack on Iran authorized by the Obama administration. Last week, the New York Times ...
Crime and Consequences Blog

Comments on: Report suggests malware hits Iran atomic - Iran Aware
By iranaware1
Click to visit the original post. A purported Iran scientist working for the Atomic Energy Organization of Iran e-mailed an SOS to F-Secure Chief Research Officer Mikko Hypponen this weekend, saying the AEOI was under a cyber attack. Hypponen, who is well-regarded in thesecurity community, published a blog post this morning saying he can't confirm the details, or even existence of the attack, but he can confirm that the e-mails were being sent from within the AEOI. Read more…
Iran Aware

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com