Colorado Springs Business Journal
It's also the topic of an upcoming meeting, Cybersecurity for Your Business, which will introduce the newly formed Western Cyber Exchange, a regional consortium of public and private organizations dedicated to fighting cyber crime. “We found that if a ...
Iran Cyber Attack on Nuclear Facilities Leads Regime To Threaten Shutting ...
PolicyMic
According to an Iranian nuclear scientist working at the Atomic Energy Agency of Iran, the country's nuclear infrastructure has allegedly been the target of yet another cyber attack. The attack was said to have struck the Natanz and Fordo nuclear ...
PolicyMic
IT Security Unprepared for Targeted Attacks
eWeek
Businesses are ill-prepared to detect and stop advanced, targeted security attacks , according to a survey of information security executives at enterprise organizations with revenues greater than $100 million, which was sponsored by cyber attack ...
Did the Bounds of Cyber War Just Expand to Banks and Neutral States?
The Atlantic
Even if it's not, Gauss's potential as spyware and attack software blurs the line between cyber war and cyber espionage, and its use may fall under the rules of engagement for cyber warfare set out by the U.S. Department of Defense. The rules primarily ...
The Atlantic
Federal government, telecom firm, mum about cyber security failure
Montreal Gazette
OTTAWA — Federal bureaucrats in charge of cyber security were puzzled about why a private company involved in protecting the federal government's IT systems didn't catch an Internet attackagainst the Canada Revenue Agency earlier this year, according ...
World's biggest oil company hit by cyber attack
Inquirer
Saudi Aramco has not said when it expects its computer networks to be back at full capacity, but has assured that systems will be back online soon. Operational and database systems were reportedly untouched by the virus attack. Security vendor McAfee ...
WELCOME BACK - Students should take cyber-security precautions
Purdue Exponent
Gene Spafford, a professor of computer science at Purdue and the founder and executive director of the Center for Education and Research in Information Assurance and Security, works oncyber-security. He said the protection of data is key because it's ...
No partisan fight over cybersecurity bill, GOP senator says
Computerworld
Kay Bailey Hutchison noted that cybersecurity is a matter of "vital national importance" to both parties. "Experts have long cited cyber-terrorism as one of the potentially most dangerous threats to national security," Hutchison said while noting the ...
Threat of Cyber Attack and Release of Oil Reserves Weigh on Crude Oil
FX Empire
Gold rose nearly 1%, on comments by German Chancellor Angela Merkel and disappointing US manufacturing and housing data fueled speculation that central banks could take measures to stimulate the economy. Also the Chinese Premier signaled that the ...
College Opens New Cyber Center in Hanover
Patch.com
Anne Arundel County Community College (AACC) has opened its new center in Hanover focused on training the next generation of cybersecurity professionals. The new Center for Cyber and Professional Training will allow students to learn cyber defense ...
Cyber Command seeks cyber warriors
FederalNewsRadio.com
The Pentagon is struggling to recruit cyber warriors. NextGov ... The command hopes to attractcyber pros with special incentives, including bonuses and education benefits. It said it will ... This story is part of Federal News Radio's daily ...
GAO Report Shows Weakness of Regulatory Approach in Cyber
Security Debrief
In their recent report on Smart Grid Cyber Security, the Government Accountability Office (GAO) made some interesting observations (thanks to Andy Bochman of Smart Grid Security Blog for pointing this out). The Smart Grid is the way of the future in ...
High time India counters China, Pak cyber armies
Rediff
Defence Minister A K Antony recently told the Lok Sabha that steps had been taken to strengthen the security of the network at the Eastern Naval Command at Vishakapatanam in the wake of intelligence inputs regarding possible hacking. He also said in a ...
UMUC student team takes third in national cybersecurity challenge
Gazette.Net: Maryland Community News Online
A team of students at the University of Maryland University College placed third out of 53 teams at the MITRE Corporation's 2012 Capture the Flag Cyber Challenge, a collegiate national cyber security competition held July 9 and 10. The Adelphi-based ...
Aramco's computers hit by virus [Gulf News (United Arab Emirates)]
Equities.com
Dubai: There is no respite for networks in the Middle East from computer viruses as state-sponsoredcyber-spying threats intended to steal personal details are growing in the past few years. Saudi Aramco's computers were affected by a virus on ...
A Cybersecurity Dream Act Alternative
BankInfoSecurity.com (blog)
Rockefeller says the president should create a collaborative partnership between the federal government and business to conduct cyber-risk assessments of the nation's most critical infrastructure and create voluntary best practices for companies to ...
BankInfoSecurity.com (blog)
Analysis: Israel pushing Washington to up the Iranian ante
Reuters
"Iran will not engage seriously unless their situation is so bad that the alternative, giving up on their nuclear ambitions, will look better," said Emily Landau, a senior research associate at the Institute for National Security Studies. But there is ...
Google Ups Bug Bounties Amid Booming Exploit Market
InformationWeek
The Electronic Frontier Foundation, a cyber liberties group, is less overtly critical, arguing that the U.S. government should consider the issue of vulnerability sales as it discusses future cybersecuritylegislation. David Maynor, CTO of Errata ...
What is Smishing and How Do You Prevent it?
The Droid Guy
Now, as Internet users become more aware about suspicious messages either on websites or in their e-mail, cyber criminals are moving from websites to mobile phones to target their new victims. The word smishing is a combination of SMS and phishing.
The Droid Guy
Audit finds some holes in NASA's cybersecurity center
GCN.com
... of Inspector General. The OIG conducted an audit to evaluate the cybersecurity effectiveness of the SOC, which has managed the agency's computer security incident detection and handling since it was created in November 2008 through the ...
Anonymous hits Uganda in defense of LGBT rights
GlobalPost (blog)
The Anonymous collective has hacked and vandalized a website belonging to Ugandan Prime Minister Amama Mbabazi in protest of the country's laws concerning members of the lesbian, gay, bisexual and transgender (LGBT) communities. In Uganda ...
Only disconnect
The Guardian
Why are essentially autonomous power stations connected to the internet at all (Cyber-attack alert sparked checks on eve of Games, 16th August)? In the 60s, the regional electricity boards managed to control remote power stations via dedicated channels ...
Leaked Document – Israel's Planned Assault Against Iran
Yeshiva World News
Silverstein broke the story on his blog on August 15, 2012, describing an Israeli assault against Iran's nuclear program involving “coordinated strike” which includes an unprecedented cyber attack which will bring the entire Iranian regime to its knees ...
Yeshiva World News
Global InfoTek, Inc. One of Six Primes on $300 Million Air Force Cyber ...
PR.com (press release)
"Our team brings together world class researchers and leading industrial partners to provide a complete range of cyber research and development skills to augment the Air Force's most challenging cybersecurity initiatives," says Chip Block, Vice ...
Swami Nithyananda may take action against guerilla defamation
Oye! Times
The controversial Swami Nithyananda may soon approach the government's Cyber Crime Investigation Cell (CCIC) to intimate them of select websites indulging in what his publicist terms as “guerilla defamation.” Speaking about the same, the ... He ...
Hackers crash 73 Sudan websites in gay rights protest
Gay Star News
Cyber activists have hacked 73 official government websites in Sudan, including the president's, as they continue to demand LGBT people in Africa are given rights. Sudan has one of the most severe laws regarding homosexuality. The judicial system is ...
Gay Star News
The day the Tweets went silent
Malaysia Star
IT was a breeze surfing the Internet on Tuesday – the day many Malaysian cyber citizens decided to “down tools” as a protest against the contentious Section 114A of the Evidence Act 1950. The Internet Blackout Day protest was organised by the Centre ...
The Energy Report 8/17/12
Inside Futures
Of course for Iran using a cyber attack to shut down Saudi oil production with a cyber attack would be a lot easier than trying to shut the Strait of Hormuz and a lot safer. Well at least ... I guess poll numbers are more important than national ...
Want a Career Change? There's a Cybersecurity Crash Course
Nextgov
Eric Cole, a senior fellow at the SANS Institute, said Monday that SANS is hosting a new training session next month that provides participants with little to no knowledge of cybersecurity with the basic foundational knowledge to get started on a cyber ...
'We are preparing for the worst'
IsraelDefense
The threat reference discusses hundreds of missiles per day, launched at Israel's homefront during 21 to 30 days of warfare. It discusses hundreds of homefront fatalities. I believe .... Do they have somewhere to go to in case of an attack? "Yes, they ...
IsraelDefense
ISRAEL: The Egyptian Army Gets Religion
Strategy Page
INFORMATION WARFARE: Hezbollah Under Attack · MURPHY'S LAW: New .... August 10, 2012: Internet security researchers have revealed that a new Cyber War class computer program has been unleashed in the Middle East. Similar to Stuxnet and Duqu ...
Russia Today website hit by AntiLeaks' DDoS over Pussy Riot judgement
SC Magazine UK
Paul Lawrence, vice president of international operations at Corero Network Security, told SC Magazine that he was not sure where the Russia Today data centres were located, but said he was surprised that it did not have adequate protection in place to ...
To QE3 or Not To QE3, The Timing Is The Question
Wall Street Journal (blog)
The Israeli attack will open with a coordinated strike, including an unprecedented cyber-attack which will totally paralyze the Iranian regime and its ability to know what is happening within its borders. The internet, telephones, radio and television, ...
6 New Technologies That Could Be a Target For Cyber Attacks ...
By LS
Which also means, they will be more and more vulnerable to cyber attacks. Here are 6 existing and new technologies that ... It's in important to always update security applications and core operating system to make sure you back up everything and keep things operating the safest they can operate. Phones. Recently text message spam has been ... More and more apps will be downloaded and will increase the threat of cyber attack on your system. Home Electronics. One of the biggest ...
Federated Networks
TechnoLlama | Are smart buildings the next cyber-threat?
By Andres
Usually a harmless extended flexibility it enabled Stuxnet to play back to the main system recorded process data as if the device was working normally and not under attack. In once sense Stuxnet is... Stuxnet may not be the best example in which to build new cyber-fears, as it is considered to be a spook operation. But the lessons must be there for those who ... Galactica survives the attack. Perhaps it is time to consider security and openness into embedded chips and smart buildings.
TechnoLlama
As Cyber Goes, so Goes the Army | AFCEA SIGNAL Scape
By Max Cacas
At a time when more and more computers are interconnected across the globe and more and more people are trying to exploit their vulnerabilities, the U.S. Army is shifting to meet the cybersecuritychallenge. ... Rhett Hernandez, USA, the first commanding general of the U.S. Army CyberCommand, told keynote luncheon attendees at the TechNet Land Forces East conference that his new command is an integral part of the Army's shift to an active defense of the Internet. At the same...
AFCEA SIGNAL Scape
Read more - SpearTip - Cyber Counterespionage - Incident Response
By jkolthoff
As a result, they said the two pieces of malware are likely not connected. Read more from http://arstechnica.com/security/2012/08/shamoon-malware-attack/. « Cyber Command struggles to define its place on a shifting battlefield ...
SpearTip, LLC
US Smart Grid Cyber-Security Update, Zpryme Reports
By Zpryme
US Smart Grid Cyber-Security Update, Zpryme Reports. As utilities ... The gaps in cybersecuritypolicy have created an environment where early editions of smart grid technology are not adequately protected from security threats. Currently, the ...
Zpryme Smart Grid Insights: Intellige...
Here's Shamoon! « Hackmageddon.com
By Paolo Passeri
So, it looks like that the destructive impacts of the cyber attack targeting Aramco, where definitively true. In the same hours in which the first details about the malware were disclosed, Kasperky Lab, McAfee and Symantec have dedicated ...
Hackmageddon.com
Cyber Attack Knocks Offline Saudi Aramco - Slashdot
wiredmikey writes "Saudi Aramco, Saudi Arabia's national oil company and the largest oil company in the world, confirmed that is has been hit by a cyber attack ...
yro.slashdot.org/.../cyber-attack-knocks-offline-saudi-aramco
Executive Order On Cybersecurity Being Considered By Obama ...
By Jasmin Melvin WASHINGTON (Reuters) - The White House is exploring whether to issue an executive order to protect the nation's critical computer ...
www.huffingtonpost.com/.../executive-order-cybersecurity-ob...
World's largest oil company under cyber attack | Electronista
The largest oil company in the world, Saudi Aramco, has acknowledged that it has been struck by a malware infestation on nearly all its user workstations.
www.electronista.com/.../saudi.aramco.disconnected.from.inter...
American Cybersecurity is a Ticking Time Bomb | Bit9 Blog
Hacking is becoming an industry. It's one that is employed by several nation- states, with the sole goal of attacking intellectual property, or compromising ...
www.bit9.com/.../american-cybersecurity-is-a-ticking-time-bo...
Infosecurity - Blog - Deploying Advanced Cybersecurity Intelligence
During a speech in June 2012, Jonathan Evans, the chief of the UK's home security agency MI5, stated that it was “fighting 'astonishing' levels of cyber- attacks”.
www.infosecurity-magazine.com/blog/2012/8/14/.../623.aspx
Follow @sobeqorg