Facebook Malware? How to restore address book


How to Restore Your Address Book After Facebook Messed It Up (video)
Read more: http://lifehacker.com/5922951/how-to-restore-your-address-book-after-facebook...

How to restore your address book after Facebook messed it up
msnbc.com
A lot of us sync our Facebook accounts with our address books on our smartphones, so we always have up-to-date phone numbers, email addresses, and pictures for all of our friends. However, with Facebook changing everyone's email to @facebook.com ...

Facebook's Email Change Results in Changed Address Books, Fix on Way
ABC News (blog)
The change aggravated many users, but now, to make matters worse, that change has affected the contacts and address book settings on some smartphones. The switch has caused the email addresses of many to change on some users' phones. What that...

ABC News (blog)

Facebook: We're fixing email and address book issues
Los Angeles Times
Many users began saying that not only was the change spilling over to address books that were synced with Facebook, but in some cases users would email others at their @facebook.com address and the message would simply not be received and the ... 

Companies report spike in cyber attacks on critical infrastructure
The Hill (blog)
Companies that operate critical infrastructure systems have reported a sharp rise in cybersecurityincidents over a three-year period, according to a new report from an arm of the Department of Homeland Security. Companies reported 198 cyber incidents ...

Olympic experts confident over cyber attacks
Sacramento Bee
Technology experts running the 11000 computers and servers at the logistical heart of London's 2012 Olympic Games say they are confident of defending their systems against attempted cyber-attacks.

How Exactly Do Cyber Criminals Steal $78 Million?
TIME
Last week, two security firms announced that tens of millions of dollars had likely been stolen from bank accounts all around the world through new, sophisticated variants ofmalware called Zeus and SpyEye. (MORE: The Stubborn Consumers Who Just Aren't...

TIME

Cyber incident reports skyrocket over three-year period
FCW.com
Cyber incidents reported by critical infrastructure managers jumped by more than 2000 percent between 2009 and 2011, according to a new report. ... The next steps for ICS-CERT are to glean all the information from an attack to build better situational ...

NIKSUN Hosts World Wide Security & Mobility Conference (WWSMC) Summer '12
EON: Enhanced Online News (press release)
PRINCETON, N.J.--(BUSINESS WIRE)--NIKSUN® Inc., the world leader in real time and forensics-based cybersecurity and network monitoring solutions, plans to host the 5th WWSMC (World WideSecurity & Mobility Conference) on July 9-11, 2012 in ...

Cyber warfare advancing at a rapid rate
PublicServiceEurope.com
For instance, within just 24 hours of Evans' speech, it was revealed that almost €60m was stolen from European banks as a result of a cyber-attack. With such incidents coming thick and fast, it is time that businesses and governments reassess current ...

PublicServiceEurope.com

Senate Working on Cybersecurity Bills
The New American
The U.S. House passed its own cybersecurity bill, the Cyber Intelligence Sharing and Protect Act (CISPA), in April, but President Obama has threatened to veto the bill, claiming it undermines privacy and fails to protect infrastructure. Other critics ...

Boom in cyber attacks on critical infrastructure reported in the US
Computing
Cyber attacks on critical infrastructure in the US have rocketed over the past three years, according to a new report from the Industrial Control Systems CyberEmergency Response Team (ICS-CERT). ICS-CERT, which is part of the Department of Homeland ...

Computing

Moving Forward with US-Japan Cybersecurity Cooperation
defpro
If cyber-attacks and espionage undermine their economies or military capability, larger geostrategic balances may be affected and the negative consequences may spill over to other countries. In June 2011, Tokyo and Washington issued a joint statement ...

Nationally renowned cyber charter school pioneer officially steps down
Sacramento Bee
MIDLAND, Pa., July 2, 2012 /PRNewswire-USNewswire/ -- As The Pennsylvania Cyber Charter School officially said farewell yesterday to its only CEO since opening its doors in 2000, Dr. Nick Trombetta took the opportunity to reaffirm his commitment to the ...

Cyber threats facing the UK are becoming more dangerous, warns the Home Office
Inquirer
Speaking at the National Security 2012 Conference in London today, Home Office Security and Counter-Terrorism Department director Richard Clarke said cyber crime is growing in line with the threat of terrorism as Blighty gets ever closer to the kick ...

'PH needs cyber security policy'
Sun.Star
WITH most, if not, all of the country's most critical infrastructure tied to technology, the president of an advisory firm hopes the government will implement a national cyber security policy that would compel companies to properly secure their data ...

Cyber attacks on critical infrastructure could have been foiled with common precautions
Fierce Homeland Security
Of the 17 cybersecurity incidents affecting operators of critical infrastructure serious enough to require onsite deployment by the Homeland Security Department's Industrial control systems cyber emergency response team, 12 could have been prevented ...

Calabasas-based Ixia to purchase cyber security company for $160M
Los Angeles Daily News
CALABASAS - Information network testing firm Ixia said Monday it is buying a cyber security company for $160 million. ... Calabasas-based Ixia to purchase cyber security company for $160M · Medical providers - Providence and Facey - align to prepare ...

Feds report spike in cyberattacks against 'critical' US targets
Alaska Dispatch
Did Stuxnet virus open a Pandora's box of cyber warfare? ... Emergency cyber-responders with the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), an arm of the Department of Homeland Security, reported a 20-fold leap in the number ...

UK govt encourages insurers to reward good IT security
Information Age
Cabinet Office cyber security wing seeks to encourage insurance providers to reward businesses with good cyber hygeine with better premiums. ... Company lost £800m in state-backed cyber attack: MI5. A London-listed business "incurred revenue losses" of ...

Cybersecurity incidents on the rise in the US, but analysis shows flaws in ...
The Next Web (blog)
Over the past half day, a report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) stating that cyber incidents jumped from 41 in 2010, to a stunning 198 in 2011, has sent industry watchers into a frenzy. What could cause ...

US-China Cyber Dialogue
Lawfare (blog)
Lawfare. Hard National Security Choices ... Since 2009, CSIS and CICIR have held six formal meetings on cybersecurity (accompanied by several informal discussions), called “Sino-U.S. Cybersecurity Dialogue.” The meetings have been attended by a broad ...

Lawfare (blog)

Chinese Hackers Reportedly Breach Indian Naval Computers
2point6billion
The Command's Visakhapatnam location is also the current base for India's first nuclear missile submarine, which was undergoing trials at the time of thecyber-attack. The extent of the loss is unclear, with Indian officials claiming that it is...

2point6billion

Government Sends Mixed Signals on Cybersecurity
IT Business Edge (blog)
Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users I was catching up on cybersecurity news today, and I couldnt help but notice the c.

Blue Turtle, Quest protect business against cyber threats
ITWeb
As a trusted advisor and steadfast technology provider for nearly 90% of the Fortune 500, Quest Software has amassed the knowledge, experience, and technology necessary to successfully guide organisations through the new security landscape,” adds John ...

Turkey's Foreign Ministry website hacked, local group publishes alleged stolen ...
Canada.com
ANKARA, Turkey - Turkey's Foreign Ministry says its official website has fallen victim to acyber-attack,

Former White House cyber czar rejoins private sector
FederalNewsRadio.com
Former White House Cyber Coordinator Howard Schmidt, who retired in May, has landed back in the private sector. Schmidt will join Qualys, a company specializing in information security and compliance cloud solutions, according to a company release ...

Governments Using Anonymous to Cover Hacking Tracks
IBTimes.co.uk
Governments around the world could be hiding behind the Anonymous name in order to carry out cyber-attacks against other government's websites. ... carried out by some other country, using the cover of Anonymous as protection. Rob Rachwald, directory...

IBTimes.co.uk

Defense organizations to ramp up cybersecurity spending
Infosecurity Magazine
A full 49% of defense organizations surveyed expected at least some increase in cybersecurityexpenditure, while a similar percentage expected no change, according to the 'Global Defense Survey 2012: Cyber Warfare in the Defense Industry' report. ICD ...

Kratos Completes Acquisition of Aerial Drone and Targets Provider Composite ...
MarketWatch (press release)
... Communications, Computing, Combat Systems, Intelligence, Surveillance and Reconnaissance (C5ISR), satellite communication systems, unmanned systems, cyber warfare, cybersecurity, information assurance, critical infrastructure security and weapons ...

Cyber attacks on WA teachers
The West Australian
"The website has allowed anonymous postings for some years, many of which would be found to be defamatory and slanderous of teachers if tested against legislation," the resolution said. The US-based website's ... "It's not a physical attack. It's a ...

Chinese hackers attack India
The Voice of Russia
Tags: Society, World, cyber attack, hackers , internet, India, China, Commentary ...The very headquarters of the Eastern Command, which was subject to the hacker attack, is in charge of the Indian Navy's presence in the South China Sea. It is also in...

The Voice of Russia

McCain's retooled Secure IT act still a privacy threat, critics say
GCN.com
The revamped Strengthening and Enhancing Cybersecurity by Using Research, Education, Information and Technology Act, S. 3342, tightens definitions of the kinds of information that would be shared and clarifies responsibilities of cybersecurity centers ...

Android susceptible to sophisticated clickjacking malware
InfoWorld
Additionally, Android is the most widely adopted mobile platform worldwide, making it all the more appealing as a target for cyber criminals. Jiang and his team have found at ... The rootkit -- which exploits a vulnerability in Android 4.04 and earlier ...

Arab world's first UN-backed cross-border cyber exercise set for mid-July
Infosecurity Magazine
The International Telecommunication Union (ITU) and the International Multilateral Partnership Against Cyber Threats (IMPACT) are sponsoring the first United Nations-backed cross-border cyberexercise in the Arab world. ... The workshop aspires to ...

SC Total Security Conference: Insider threat issues addressed
SC Magazine UK
Richard Bell, corporate security assurance manager at Transport for London, said that the cyberthreat had taken management at TfL by surprise and it was forced to react to it in the same way it did with more physical challenges, such as the Olympics ...

Microsoft Turns Culprits In March Zbot Attack Over To FBI
Techli
Following the Zeus (Zbot) cyber attacks earlier this year, Microsoft has identified and turned over the names of two suspects to the FBI this week. ... Microsoft Turns Culprits In March Zbot Attack Over To FBI. BY: Corey Cummings | July 2, 2012 ...

Techli

What's real and what's not in web security
IDG News Service
What's real and what's not in web security ( Internet Security ) This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember ...

CYBER SECURITY CHALLENGES IN 21st Century | Dr - 2020vp.com
By Dr. Hossein Eslambolchi
They are now required to protect their network and computing infrastructures from attack by amateurs, malicious intruders, industrial spies, cyber-criminals, and potential cyber-terrorists. The 2004 E-Crime Watch survey of security and law ...
Dr. Eslambolchi's blogs

What Are The Rules Of Cyberwar? - The Conversation
By webhelp@kuow.org (KUOW 94.9 Public Radio)
Many areas of our economy, like banking and transportation, are vulnerable to cyber attack. Two years ago President Obama said cyber intruders have probed our electrical grids. The US may have launched cyberwarfare. The Stuxnet virus ...
The Conversation Newsletter

Chemical Facility Security News: PHMSA Publishes Lack of ...
By PJCoyle
Or a critical infrastructure facility had a successful cyber-attack that resulted in hundreds of off-site casualties, but were covered by …. OOPS there is no ... What do March Madness and Cyber Security have in common? 2 months ago. ASDWA's ...
Chemical Facility Security News

ICS and SCADA Security Myth: Protection by Firewalls « Waterfall ...
By amir
So there are all sorts of ways for a cyber attack to cross that mythical firewall. So obviously no, the protection is not there anymore. And even if you think it's there, it's probably a sound best practice to assume that it isn't and put host security ...
Waterfall Security Solutions

Cybercrime, Terrorism And The Lesser Of Two Evils | Business ...
By Hannah Tufts
Further to that, Jonathan Evans, Head of MI5, spoke publicly for the first time last week, raising awareness of how the two types of attack combine in cyber espionage. The comments are timely as extensive preparations for the Olympic ... Their future development in a constructive and positive direction requires our encouragement and support: education is fundamental, and it requires securityexperts to step up to the mark. We must also not overlook the fact that Generation Y is entering ...
Business Computing World

Kratos Completes Acquisition of Composite Engineering | UAS VISION
By The Editor
... of its business to better align Kratos' resources for enhanced focus on the corporation's strategic priority areas of unmanned systems, electronic warfare, satellite communications, cyber security &warfare, tactical & ballistic missile systems, ... led by Richard Selvaggio, where all of Kratos' unmanned systems related products business is contained, including CEI; (2) Electronic Products, led by Rich Poirier, focused on electronic warfare, electronic attack, ISR and tactical and strategic ...
UAS VISION

Terrorists Attacks, Mass Murder and Aliens: Plans of the Global Elite ...
By Susanne Posel
Russia's National Anti-Terrorist Committee (NATC) claim to have uncovered and stopped plans by Chechen separatists in Georgia to commit a terror attack on the 2014 Winter Olympic Games using explosives and arms and to “use them during the preparations and during the [2012 and 2014] games”. Shota Khizanishvili ... Industrial-scale processes involving many thousands of people lying behind both state-sponsored cyber espionage and organized cyber-crime. Vulnerabilities in ...
OCCUPY CORPORATISM

LulzSec Hackers Plead Guilty to Cyber-Attack Charges in U.K. ...
Two members of the LulzSec hacking group pleaded guilty in United Kingdom courts to taking part in cyber-attacks on several Internet sites in the U.K. and ...
www.eweek.com/.../LulzSec-Hackers-Plead-Guilty-to-CyperAt...

Iran claims new cyber-attack detected > Security & Defence Agenda ...
Iran has detected a planned "massive cyber-attack" against its nuclear facilities, Iranian state television announced last week, after Iran's talks with the P5+1 ...
www.securitydefenceagenda.org/.../Iran-claims-new-cyberatta...

GOP Senators Revise Cybersecurity Bill CIO.com
A group of Republican Senators introduced on Wednesday a revised version of a previously proposed bill that seeks to improve cybersecurrity through improved ...
www.cio.com/.../GOP_Senators_Revise_Cybersecurity_Bill?...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com