Cybersecurity Bills Threaten Freedom

Cybersecurity Bills Threaten Freedom
Bay Area Indymedia
The 2008 FISA Amendments Act (FISAAA) authorized targeting only non-US citizens abroad. SECURE It lets NSA use alleged cyber threat information for national security purposes unrelated tocybersecurity. CDT calls doing so inappropriate and dangerous.

How Cyber Security Could Be a Winning Issue for Obama
TIME
Those are all potential, and entirely plausible, consequences of a cyber attack, according to a range of current and former national security officials, including the top American commander in charge of cyber security. But after months of inconclusive debate, Congress skipped town last week without passing a cyber security ...(MORE: On Cyber Warfare, the American Public Is Constantly Being Played by the Pentagon). At a minimum, this affords Obama a chance to bash a “do-nothing Congress” for taking a vacation ...

TIME

Mobile apps are new cyber crime attack vector
CSO
August 06, 2012 — IDG News Service — Mobile apps have emerged as a new cyber crime attackvector for phishing and malware, says RSA, the security division of EMC. To combat this issue, the company has introduced the RSA FraudAction Anti Rogue ...

Inexcusable failure to move on cyber threats
Kansas City Star
For years, cyber terrorism experts have warned about the potential for an attack to the nation's electrical grids, nuclear power plants, water supply, dams and transportation systems. Luckily, no such attacks have come to fruition. Nevertheless, we've gotten some hints of what could happen ifcyber security is not addressed. If WikiLeaks' exploits at purloining and posting highly sensitive and secret information aren't a convincing enough argument for better security measures, consider the recent headlines out of India.

Mobile apps are new cyber crime attack vector: RSA [Computer News Middle East]
Equities.com
Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says RSA, the security division of EMC. To combat this issue, the company has introduced the RSA FraudAction Anti Rogue App Service that can identify and take action ...

INFORMATION WARFARE: Why So Many Israeli Cyber Commandos
Strategy Page
Israel wanted to use this Cyber War unit to deal with the most difficult, and dangerous Cyber War situations. Thus if there's a Cyber War attack, using an unknown, and seemingly devastating new technique, you would have the Cyber War commando unit ...

Cybersecurity Laws Shouldn't Be Made by Executive Fiat
Heritage.org (blog)
Regardless, new cybersecurity regulations created as the result of legislation or an executive order are a poor policy choice because they cannot keep up with the dynamic cyber realm. By the timecybersecurity regulations are written, the power of computers ...

Basic Aussie services under threat
Herald Sun
“At the moment we see these systems failing every day and they just don't get reported,” Mr Kernick, the chief technology officer at Australia's largest independent cyber security consultancy CQR, said. “If something went wrong as there was no requirement to disclose, it makes ... The information can be used to develop an attack code and sent through the system - usually before the original developers are aware the vulnerability existed. “The attack code is usually developed within 24 to 48 hours,” Mr Ingram said.

Syria Crisis: Cyber War And Disinformation Growing In Conflict
Huffington Post
"It's not surprising that Syria has attempted to develop a cyber warfare capability. It's in line ..."Cyber attacks are the new reality of modern warfare," said Hayat Alvi, lecturer in Middle Eastern studies at the US Naval War College. "We can ... "The problem with these attacks is that they are always quickly noticed and even if they are successful in grabbing headlines and fooling people for a short period of time, they have very limited effect," said Tal Be'ery, web security research team leader at IT security firm Imperva.

Disinformation flies in Syria's growing cyber war
Reuters
Romney launching new attack on Obama over welfare law. 2:30pm IST ... "Cyber attacks are the new reality of modern warfare," said Hayat Alvi, lecturer in Middle Eastern studies at the US Naval War College. "We can expect ... "The problem with these attacks is that they are always quickly noticed and even if they are successful in grabbing headlines and fooling people for a short period of time, they have very limited effect," said Tal Be'ery, web security research team leader at IT securityfirm Imperva. "They are not ...

Cyber-Crook for a Day
PC Magazine
Snell warned strongly that on no account should we consider connecting any removable device to these systems, as it could become infected with malware. To start, we installed the Shark Trojan. Actually, the Shark ... Binding my Trojan attack to a legitimate (but outdated) McAfee antivirus tool was equally simple. Had the script called for it, I could have configured ...

A Long, Hot Summer for Corporate Cybersecurity
Corporate Counsel
During a summer in which the head of the National Security Agency revealed that cyberattacks on business and government have increased 1700 percent—and in which said NSA chief openly invited hackers to join forces with the U.S. government at a ...Private companies will have to adopt these defensive solutions any way to protect their own operations and profits—and, believe me, the downtime, damage and litigation costs resulting from a sophisticated cyber attack far outweigh the expense of securing your ...

Corporate Counsel

Governor Announces CyberMaryland 2012
Virtual-Strategy Magazine
State hosts convention, competition and recognition during National Cybersecurity Awareness Month in October ... "This conference is geared for individuals and organizations who are – or who want to be – working in the information security sector," said Larry Letow, Convergence Technology President and Cyber Maryland Board member, adding, "It's crucial for industry leaders and policy makers, programmers and educators – to connect with one another and learn what trends, challenges and opportunities are ...

More Than Six Million New Malware Samples Were Created In Q2 2012 ...
Dark Reading
The report also covers the latest cases of cyber-crime, such as a hacker attack on Wikipedia users, the exploitation of a major security hole in Iran's banking system, and the new ways found by law enforcement agencies to fight data theft. It includes information ...

Cyber Hype: Flame, Stuxnet, and Boeing 787's Falling from the Sky
Atlantic Council
Cyber Warfare. These last few months have been some of the most exciting, depressing, and troubling times for those interested in the phenomenon of cyberwar. As a cyber skeptic deeply engaged in this emerging debate I want to take a step back and analyze what we ... Beware thecyber hype. Cyber security is a contemporary problem that needs to be dealt with, but it is a problem that has its limits in the international affairs realm and should be securitized, contained, and tackled with evidence, theory, and analysis.

More Executive Branch End Runs, This Time With Cybersecurity
Firedoglake
I'm not a big fan of the cybersecurity bill because it uses that threat of cyber attacks as a back door to information sharing of private communications. In this instance, executive action would be preferable, since it would probably only lead to the core goal of ...

Cyber security: Imperatives for India
InformationWeek India
The number of cyber attacks and crimes are rising globally and India is no exception. There have been cyber attacks on PMO, CBI website, T3 terminal, etc. Stuxnet, the deadliest attack vector that has been designed so far, that destroyed a nuclear reactor in ...

Defenseless against cyberattacks
Washington Post
The government has unique capabilities to help firms improve cybersecurity but needs the legislation to act in concert with the private sector. Gen. Keith B. Alexander, the commander of the U.S. CyberCommand and the National Security Agency, has warned ...

Global Cybersecurity Experts Propose Adaptive Strategy
The Epoch Times
For these reasons, some of the top names in the cybersecurity industry converged at Queen's University Belfast in March for the Second World Cyber Security Summit. After a series of brainstorming sessions, they composed a new strategy to secure global ...

Weak cyber protections lead to personal, institutional risk
CPJ Press Freedom Online
When the tech reporting site Gizmodo's Twitter account was taken over on Friday, it was through anattack on one of its former reporters, Mat Honan. Gizmodo's reporting has made it unpopular in some quarters, but Honan says ... The organizations that employ them need to invest resources and training to improve their cyber-security; not least because when one person's security is compromised, everyone who relies on that person is also under threat. San Francisco-based CPJ Internet Advocacy Coordinator Danny ...

US Cyber Challenge and San Jose State University to Host Cyber Security ...
IT News Online
6, 2012 /PRNewswire-iReach/ -- Keith Tresh, California Director and Chief Information SecurityOfficer and Karen Evans, National Director of the U.S. Cyber Challenge will host a roundtable discussion featuring national experts from government, technology and ... The Executive Roundtable will include Dr. Ernest McDuffie, Lead for the National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology (NIST); Sean Catlett, COO, iSight Partners (National Technology Partner); David ...

Best cyber defence in the region…
Kipp Report
The country was ranked 1st regionally in cyber security and, according to the International Institute for Management Development report, moved up several ranks on the global map as well. Not to discredit the efforts of cyber security and the TRA, who have established a strong team of emergency ... Now Kipp is no hacker, but isn't it logical that the more doors that are closed, the less chance of a surprise attack? In other countries where free surfing is available and web users are allowed to download torrents and VoIP ...

Kipp Report

Gizmodo Journo's Data in iGadgets Gets Hacked, Wiped Out by Hackers: Find ...
Mobile & Apps
A cyber-attack on iGadgets put Gizmodo reporter Mat Honan through thirty minutes of virtual ordeal. Data from ... Honan informed that the hacker got past Apple's tech support "and some clever social engineering" allowed them to "bypass securityquestions".
 
Mobile & Apps

White House Considers Executive Order for Cybersecurity Rules
Game Politics
That seems to be the mantra coming out of the White House this week following Friday's defeat of the Cybersecurity Act of 2012. According to The Hill, President Obama is weighing the possibility of issuing an executive order to deal with cyber threats to ...

IT security: How do you deal with the unknown-unknowns?
IT-Director.com
The term used in the industry is zero day attack. Security ... These are all advanced securitypractices that businesses should be considering as they heed reports such as that issued by the UK's MI5 recently that records 'astonishing' level of cyber-attacks.

Cybersecurity Bill Defeated, President Obama Considers Executive-Order Option
Legit Reviews
The White House could still issue an executive order if Congress doesn't act on the issue of strengthening our nation's cyber defenses. White House Press Secretary Jay Carney in an email has said “In the wake of Congressional inaction and Republican stall ...

Legit Reviews

Congress Shelves Cybersecurity Bill
Discovery News
Last month, with the hopes of encouraging Congress to pass the cybersecurity law, President Obama penned an op-ed ed piece for the Wall Street Journal that began with a realistic scenario of what could happen if private sector companies were cyber attacked. “Across the country ... The bill originally contained minimum security requirement measures for infrastructure providers like water treatment facilities and electricity plants, based on information collected on their high susceptibility tocyber attacks. The Senate ...

Hacked Again!
AOL
The Latest cyber gate crashing took place on Thursday. The timing of this cyber attack was in accordance to hackers' previous unpleasant visits, that is, this time they chose to strike when MPhil entrance results were to be announced. Instead of looking up ...

Critical Read: Breaking down cybersecurity silos
FCW.com
Why: Over a five-month span last winter, more than 50000 cyberattacks on private and government networks were reported to the Department of Homeland Security. According to the report's authors, “public/private cyber information sharing can bolster and ...

Computer security startups catch venture capitalists' eyes
Bend Bulletin
Patrick Morley, CEO of Bit9, a cyber security company, says companies are paying closer attention to security. Evan McGlinn New York Times News Service ... RSA was the victim of such anattack last year. So were the military contractors Lockheed Martin ...

Weak cyber protections lead to personal, institutional risk - Internet ...
By Danny O'Brien/CPJ Internet Advocacy Coordinator
When the tech reporting site Gizmodo's Twitter account was taken over on Friday, it was through anattack on one of its former reporters, Mat Honan. Gizmodo's reporting has made it unpopular in some quarters, but ... The organizations that employ them need to invest resources and training to improve their cyber-security; not least because when one person's security is compromised, everyone who relies on that person is also under threat. San Francisco-based CPJ Internet Advocacy ...
Committee to Protect Journalists

More Than Six Million New Malware Samples Were Created in Q2 ...
By Panda Security
The report also covers the latest cases of cyber-crime, such as a hacker attack on Wikipedia users, the exploitation of a major security hole in Iran's banking system, and the new ways found by law enforcement agencies to fight data theft.
Press Panda Security

Obama Considers Executive Action After Defeat of Cybersecurity Bill ...
By admin
President Obama is considering whether to use his executive authority to impose new rules regardingcyber-security following the defeat of Senate legislation aimed at doing the same thing.
The Moral Liberal

Mobile apps are new cyber crime attack vector: RSA | Computer ...
By IDG Reporter
Mobile apps are new cyber crime attack vector: RSA. by IDG Reporter - August 7th, 2012. Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says RSA, thesecurity division of EMC. To combat this issue, ...
Computer News Middle East

Cyber criminals cast a wider net – SME Advisor Middle East
By Joumana Saad
Cyber criminals have increased their focus in targeting individuals and organisations of all sizes to steal personal and financial information according to the security roundup report for the second quarter of 2012 released today by the global cloud ... scares the victim into revealing personal information by using the victim's local police force as a threat; More sophisticated attack tools, like the automatic transfer systems, allow criminals to steal banking information when they are not online...
SME Advisor Middle East

US cybersecurity experts advocate for improved ... - Simply Security
By Simply Security
Sachs will be joined on the panel by AT&T chief security officer Edward Amoroso as the duo discusses their companies' roles in threat prevention and resolution. One of the major points of contention in the Cyber Intelligence Sharing and ...
Simply Security

CyberWars: Caught in the Crossfire @CyberWars | SiliconANGLE
By Bert Latamore
Traditional cyber-crime is often “smash and grab” – a short term penetration or attack designed to either grab valuable information or do some damage and get out. These penetrations are designed to go on for months or years and are often ...
SiliconANGLE

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com