Rogers: National-Security Leaks 'Probably the Most Damaging' in US History
National Journal
Rogers, who would not confirm any specific reports, said mere speculation about a U.S. cyber attack against Iran has enabled bad actors. The attack would apparently be the first time the U.S. used cyberweapons in a sustained effort to damage another ...
National Journal
Rogers, who would not confirm any specific reports, said mere speculation about a U.S. cyber attack against Iran has enabled bad actors. The attack would apparently be the first time the U.S. used cyberweapons in a sustained effort to damage another ...
Security Debrief
Information travels through America's cyber networks at the speed of light. The legislation that will be used to govern some aspects of network security is traveling at the speed of bureaucracy. The Senate has been debating two cybersecurity bills that ...
ITU-IMPACT to hold Arab cross-border cyber drill
Voice & Data Online
ITU and its cybersecurity partner, the International Multilateral Partnership Against Cyber Threats (IMPACT), are organizing the first UN-backed cross border cyber drill designed to test the Arab region's cyber response capabilities and improve ...
Diplomacy 'burdens' cyber attack responses, admits NATO
Public Service
Countries unsure how to respond to state-sponsored cyber attacks, warns departing NATO director. ... "These are not crimes anymore but threats to nations' securitywhich in many ways is a more delicate subject than crime," he said. "We still don't ...
Public Service
County Exec. Maggie Brooks signs legislation to prohibit cyber bullying
News 10NBC
Monroe County is leading the way to prevent cyber bullying. Monday morning, County Executive Maggie Brooks ... state law won't address cyber bulling until 2013. The Monroe County law says anyone under 18 who uses technology to attack or intimidate...
News 10NBC
Government plans cyber offensive to tackle Chinese hackers
India Today
The navy is examining the findings of a board of inquiry that probed lapses in cyber securitymeasures in the eastern command headquarters at Visakhapatnam, leading to possible loss of data to Chinese hackers.
US Cyber Command needs more offensive specialists
Stars and Stripes
A summary of the defense authorization bill for fiscal 2013 shows the Pentagon is understaffed during attack-oriented cyber missions and is considering reallocating defense minded staffers. One elected official says the U.S. needs 20000 or 30000 elite...
Stars and Stripes
Network Testing Consolidation: Ixia Pays $160M Cash For Security-Focused ...
TechCrunch
BreakingPoint is a specialist in security testing for wireless and wireline networks, as well as attackanalytics, with more than 34000 examples of attacks, malware and exploits parsed in its library. The move means that Ixia will be able to ... “The ...
Cyber crime disclosures rare despite new rule
The Australian Financial Review
The chairman of the Senate Commerce, Science and Transportation Committee, Senator Jay Rockefeller, is adding a provision to cyber security legislation that would strengthen the reporting requirement. The SEC's cybersecurity guidance issued in October ...
Stuxnet exposing Obama's cyber-war hypocrisy!
Pravda
In May 2011, Obama and his administration published a seemingly-attractive and ethical report of America's strategy for Cyberspace, calling for tighter measures for cyber protection, security, freedom and openness. Fine words used... ... Cybersecurity ...
High school grads landing high-tech security positions
San Antonio Express
After Banda was part of a team that brought home a prize in the CyberPatriot national high schoolcybersecurity competition, the Air Force picked him up for a network security defense analyst internship his senior year. ... Ricky Banda, 18, right, a ...
Coleman warns of stability dangers from regulatory reform
Risk.net
Coleman cites the Treasury and Homeland Security Departments as taking a large share of the responsibility for protecting against cyber attack, but there are a multitude of others: the US armed forces' Cyber Command, established in 2010, focuses on ...
Risk.net
Flame virus: Too hot to handle?
SC Magazine
The complex attack toolkit known as Flame quickly made front-page news around the world as researchers uncovered the next great cyber espionage instrument assumed to be created by a nation-state. Is it a worm, trojan or a backdoor? It's all of the ...
BAE to grow defence biz with industrial participation
The Sun Daily
"The cyber security market includes the government, like Ministry of Home Affairs,CyberSecurity Malaysia and the National Security Council. But we also do a growing amount of work with the local financial sectors. We've won a number of contracts ...
The Sun Daily
Islamic hackers post hundreds of Israeli email addresses and passwords
Haaretz
According to Avnet Security Systems, most of the addresses and passwords listed are active accounts. Roni Bachar, the manager of the cyber-attack department at Avnet, said in a statement, "There was apparently penetration of an Israeli site which ...
Haaretz
Global technology groups release common cybersecurity goals
FierceGovernmentIT
Three international technology associations released a joint statement (.pdf) June 21 laying out a common set of principles for governments' cybersecurity policies. ... Leadership & Best Practices · Homeland Security ... the Japan Electronics and ...
IXIA : to Acquire BreakingPoint Systems, Inc.
4-traders
Ixia to Acquire BreakingPoint Systems, Inc. Acquisition of cyber security leader rounds out end-to-end converged network monitoring, testing, and optimization solution Hosts Conference Call July 2, 2012 at 8:00 a.m. Eastern time. Calabasas, CA, July 2 ...
Mac, Windows Malware Hits Uyghur Activists
TechWeekEurope UK
Researchers have warned that a malware campaign with both Mac OS X and Windows components is singling out human rights campaigners. ... Researchers at Kaspersky Lab say Mac malware is being used in an advanced persistent attacktargeting people ...
TechWeekEurope UK
Ixia to buy BreakingPoint Systems for $160 million in cash
telecomlead.com
BreakingPoint's network processor-based simulation and testing platform creates application and liveattack traffic at Internet-scale. The company claims that enterprises, service providers, and government agencies ... "As a leader in cyber security ...
Ixia to Acquire BreakingPoint Systems, Inc.
Marketwire (press release)
Without an ongoing security and performance-testing regimen, even the most sophisticated networks and data centers fail to ensure business continuity in the face of crippling cyber attacks and dynamic application conditions. BreakingPoint's solutions ...
East Turkestan: Activists Targeted By Malware
UNPO
Researchers at Kaspersky Lab say Mac malware is being used in an advanced persistent attack targeting people supporting human rights for the Uyghur people in China. ... It has all the signs of your typical cyber-espionage or cyber-intelligence ...
UNPO
Flame - was it actually seen three years ago?
SC Magazine UK
He said that before Flame became an overnight household name, the idea of 'hiding a maliciouscyber attack beneath a fleece of unsecured software updates' sparked a lot of anxiety for many in the application and network security industry. Flame ...
BYU recognized as one of nation's premier academic institutions in ...
Daily Herald
BYU's computer science and information systems programs also offer security-related courses. The NSA/DHS designation comes to schools who develop cyber experts for both the private and public sectors and "meet the increasingly urgent needs of the U.S. ...
Implications of an Iranian Bomb
Democratic Underground
Whether Iran is secretly trying to build nuclear arms or not, the longer US/Israeli economic war, terrorist attacks on nuclear scientists, cyber-war, and diplomatic marginalization continue, the more Iranian national security officials are likely to ...
Security Think Tank: Flame – business must prepare for the unpredictable
ComputerWeekly.com
To implement this cyber resilience requires cybersecurity governance; a clear and comprehensive risk strategy and response plan; and support for cybersecurity initiatives at the very highest level. The business must lead this resilience effort, using a ...
How to balance security and convenience by protecting your bank accounts from ...
Smart Business Network
How to balance security and convenience by protecting your bank accounts from fraud - Barry Langer, First Vice President, Customer Relations Manager, California Bank & Trust. ... Small to mid-sized businesses are particularly vulnerable to cyber ...
Cyberinsurance adoption especially 'cold' in APAC
ZDNet (blog)
Despite the growing number of security and data breaches on enterprises across the globe, cyberinsurance adoption remains fledging worldwide but more so in Asia, due to budget and trust issues, limited cyber-regulation and a still immature market, say ...
DigiCert promotes their COO, LogLogic is acquire, and more company news
SC Magazine
»The Health Information Trust Alliance (HITRUST), based in Frisco, Texas, has announced the launch of a center to assist the health care industry in fighting growing threats to cyber security. The aim of the new HITRUST Cybersecurity Incident Response ...
DHS' Coose leaving for the private sector
FederalNewsRadio.com
Since January, four senior executives have come to DHS, and since the fall, almost the entire management team that oversees cybersecurity in the National Programs and Protections Directorate (NPPD) is new. Meanwhile, over the last ... In that role, he ...
We Are Anonymous Parmy Olson
A.V. Club
A writer investigates the figures behind Anonymous and the "global cyber insurgency" in this compelling journalistic overview.
China: 'Pervasive access' to 80% of telecoms
WND.com
Having Huawei install the systems in Peru and Mexico, the source said, provides a “perfect cover” for using the network equipment to inject viruses and bypass anti-virus protection, firewalls and other traditional security mechanisms. He added that ...
WND.com
Europe needs cyberinsurance market to improve IT security, report says
ComputerworldUK
The European Union is lacking a well-developed cyberinsurance market that could push companies to better protect their information systems and data, according to a report published by the European Network and Information Security Agency (ENISA). ... a ...
Hard National Security Choices
Lawfare (blog)
These are the first uses of sanctions, according to Joby Warrick's Washington Post story, to "attackthe financial underpinnings of Taliban militants who rely on the system to fund their insurgency." Brendan Sasso of The Hill updates us ... For more ...
Drones: Changing the Boundaries of War
NewsClick
Christof Heyns, the current UN special rapporteur said in Geneva last week that the US dronewarfare threatens the regime of international law built up over the last 50 years. At the conference ...In their view, in self defence, they have the right to ...
In Depth interviews - June 29
FederalNewsRadio.com
The cybersecurity marketplace is one the fastest growing portions of federal contracting. That demand is changing the landscape of the Federal contracting market. Sopen Shah is a financial analyst at Bloomberg Government and she's been looking at how ...
The Flame virus is the "Threat of the Month"
SC Magazine
Although the reported “victim” count is around 1000 and geographically centered in the Middle East, Flame should remove any doubt that highly resourced cyber espionage is alive and well. How can I prevent it? Today's “open” computing environments ...
Locking Private Sector Shields Against Cyber Attacks » FISMA Focus
By jim
Information travels through America's cyber networks at the speed of light. The legislation that will be used to govern some aspects of network security is traveling at the speed of bureaucracy. The Senate has been debating two cybersecurity ...
FISMA Focus
Stuxnet exposing US cyber standards hypocrisy | We Speak News
By farukyusaf
In May 2011, President Obama and his administration published a seemingly-attractive and ethical report of America's strategy for Cyberspace, calling for tighter measures for cyber protection,security, freedom and openness. Fine words used to depict morality and ethics in global ... Within a few months of taking over the presidency, Obama decided to accelerate the cyber warfare that was targeted towards Iranian nuclear facilities. The cyber programme, named Olympic Games, ...
We Speak News
Georgetown Security Law Brief: Senate ready to move on ...
By Georgetown CNSL
Lawmakers of both parties worry that hackers are stealing America's business secrets and that anattack on a vital computer system could cause thousands of deaths. But sharp differences remain. The House passed its own bill, the Cyber ...
Georgetown Security Law Brief
Image Based Harassment and Visual Misogyny | Feminist Frequency
By Anita
I've already posted about the harassment via YouTube and Wikipedia but these were not the only abusive cyber mob tactics employed to try and silence me. After struggling with whether or not to make the extent of the attacks public I've ... Part of the trolling strategy with these images is also to try and get them to appear in search results for the target's name as a way to attack their online reputation. This harassment is best classified as a cyber mob attack as it's a hate campaign loosely...
Feminist Frequency
Monday Morning News Kick Off: D.C. Agencies Open After Severe ...
By mattl
Monday Morning News Kick Off: D.C. Agencies Open After Severe Storm, DHS Outlines New CyberPlan; and Northrop Grumman Wins Afghanistan Communications Contract. Posted on July 2, 2012 by mattl in ... DHS Outlines $202 Million Plan to Beef Up Cybersecurity. The Department of Homeland Security has outlined a $202 million program to arm federal agencies with new tools to continuously monitor their computer networks for security threats. Contracts for monitoring services...
Fed Connects
U.S. Critical Infrastructure Cyberattack Reports Jump Dramatically ...
Though not all of the reports turned out to be actual cyber-attacks, the magnitude of the increase is somewhat surprising, says Kim Legelis, vice president of ...
www.darkreading.com/.../u-s-critical-infrastructure-cyberattac...
Massive cyber attack in USA, Europe and Latin America
Leading cyber security company, McAfee, has issued a breaking news report that indicates that ...
digitaljournal.com/article/327518
Cyber Security: recovery from a hack or virus incident attack ...
Thunderpaw Business Intelligence Services - strategic business planning, CND, CND-IR, INFOSEC,cybersecurity, web marketing, developing, website ...
www.thunderpaw.com/.../cyber-security-recovery-from-hack-...
Follow @sobeqorg