Virus found in Mideast can spy on finance transactions

Virus found in Mideast can spy on finance transactions
Reuters
BOSTON (Reuters) - A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computersecurity firm, Kaspersky Lab. Dubbed Gauss, the virus may ... 

Critical U.S. Infrastructure Vulnerable to Cyber Attack, Congress Fails to Act
PBS
Since the internet has become so critical to daily life, systems like the electrical grid and water supply have become vulnerable to cyber attacks. Margaret Warner looks at Congress failed attempt to pass legislation that would beef up cyber security ...

Cyber-Attacks Constantly Hit Web Apps Hard, Fast: Imperva Study
eWeek
An analysis of security data compiled by Imperva finds that the typical Web application will be targeted with a high-volume attack every third day and that SQL-injection attacks are the most common.

Senate's defeat of cyber security bill shows willful ignorance
Bangor Daily News
It should not take a massive cyber attack to a nuclear plant or a train system to finally persuade Congress to agree on protective measures. The number of attacks against critical infrastructure reported to the Department of Homeland Security increased ...

NDP gives up: convention cyber attacker remains a mystery
CBC.ca
The source of the cyber attack that disrupted voting at the NDP's leadership convention in March remains a mystery, and further investigation to find out who was responsible has been dropped. The NDP was the victim of what's known as a distributed ...

CBC.ca

NSA bids to intensify cyber-security system
Times of India
But it could just as easily have been a cyber-attack, because, as with much else, India's critical infrastructure is poorly protected from such strikes, which could affect millions of Indians in ever more devastating ways. Jolted from their habitual ...

Obama might act on cyber security
Dubuque Telegraph Herald
"I think the administration is seriously frustrated over the lack of congressional action and may decide they have no choice" but to act administratively, said Roger Cressey, who served as acybersecurity and counterterrorism adviser in the Clinton and ...

Calling all geeks: Help wanted for US cybersecurity
Alaska Dispatch
... lack of qualified cyber experts is hamstringing US efforts to secure cyberspace. Last month, Jeff Moss, a prominent hacking expert who sits on the Department of Homeland Security Advisory Council, told a Reuters conference, “None of the projections ...

NASA Doesn't Monitor All Of Its Computer Networks, Report Finds
TPM
Still, the report does include new details on how NASA's cyber security efforts are proceeding. The NASA division in charge of cybersecurity, known as the SecurityOperations Center (SOC), was created in 2008 to coordinate all of NASA'scybersecurity ...

TPM

Are American Companies Ignoring Significant Cyber Threats?
PBS NewsHour (blog)
Last week Congress failed to reach an agreement on how to beef up cyber security. On Monday the NewsHour solicited your questions on this topic to ask Joel Brenner, the author of "America the Vulnerable: Inside the New Threat Matrix of Digital ...

Let the User Beware: You're Responsible for Your Cybersecurity
Heritage.org (blog)
There are cyber criminals out there who want steal your money or your identity, and there are hackers who simply want to mess with you. ... Upgrading often will allow you to take full advantage of all the security upgrades the software developers are ...

Heritage.org (blog)

Reuters Hacks Show Cyber Battle Over Information
Dark Reading
Reuters Hacks Show Cyber Battle Over Information. Hijacking of ... Twitter declined to comment on the hack and how it took place, and Reuters would not discuss how it plans to bolster securitymoving forward to avoid similar attacks. In both cases ...

Thinking Smartly About Cloud Computing
GovInfoSecurity.com
By Information Security Media Group, August 9, 2012. Save to My ... As CSC's lead cyber executive, Visner is responsible for the development of CSC's cyberposition, intellectual capital, market development and delivery of cybersecurityservices. He ...

GovInfoSecurity.com

Obama may act to stop cyber attacks
The West Australian
His comments reflect escalating US worries about cyber attacks and industrial espionage responsible for the theft of billions of dollars in high-tech data from US companies. There are concerns an attack could shut down critical water or power plants. A ...

The West Australian

New hacker group claims attack on Israeli data center
Israel Hayom
According to a Global Cyber Defense Report by McAfee and Security & Defense Agenda published in January, Israel, Finland and Sweden are the most cyberwar-ready nations in the world. Israel, despite its robust rating, is allegedly the subject of 1000 ...

ANALYSIS : Deus ex machina 3.0 — Harlan Ullman
Pakistan Daily Times
Suppose for argument's sake, each of these situations arose not from human or systemic error but from a premeditated cyber attack against vital infrastructure. Would our responses have been different? And would the Senate in its wisdom pass legislation ...

McAfee Awarded $12M DHS Contract
Channelnomics
McAfee partners could see a few more government opportunities coming down the pike after the Department of Homeland Security bestowed the company a multi-year Enterprise Level Agreement contract, with a value of up to $12 million. For the channel, the ...

Android Malware Increases 64% In Q1 2012, SMS-Based Trojans See Faster ...
International Business Times
F-Secure, a cyber security-related company, said in a report, titled the "F-Secure Mobile Threat Report," that in Q2 2012, more than 5000 pieces of malicious Android software received, which represents a massive 64 percent increase of Androidmalware ...

International Business Times

Cyber attacks global
The Province
The FinFisher spyware made by U.K.-based Gamma Group likely has previously undisclosed global reach, with computers on at least five continents showing signs of being command centres that run the intrusion tool, according to cybersecurity experts.

Executive Order On Cybersecurity Being Considered By Obama White House
Huffington Post
Brennan's comments, and similar suggestions earlier this month by White House press secretary Jay Carney, follow an August 2 procedural vote in the Senate that all but doomed a cyber securitybill endorsed by President Obama as well as current and ...

Obama Considering Executive-Branch Action on Cybersecurity Plan
Bloomberg
President Barack Obama is considering executive-branch action on U.S. cybersecurity after Congress failed to pass legislation to protect national security assets, a White House aide said. “If the Congress is not going to act on something like ... “But ...

Hacker Pays Homage to Terror Chief by Revealing Israeli Credit Card Information
Algemeiner
Iran's chief nuclear negotiator Saeed Jalili. Photo: Press TV. Lebanese MP: Iranian National SecurityHead Visits Beirut to Support Hezbollah ... hacker were not revealed, according to Israel's Channel 10. This is not the first time Israel has faced a ...

White House considers executive action to address cybersecurity
The Hill (blog)
The administration's counterterrorism chief did not go into detail as to what specific measures the White House may pursue under executive authority to mitigate the cyber threat. However, he did note that many of those possible measures would align ...

Addressing Cyber Instability Executive Summary
SYS-CON Media (press release) (blog)
On the technical side, the Internet was not designed with security in mind, and as for policy, the new technology evolves faster than the legal, doctrinal, organizational, and conceptual framework around it. As a result, the CCSA concludes that ...

Dem Rep. Markey presses Obama to address cybersecurity via executive action
The Hill (blog)
The moneyed minions behind Citizens United have driven Republicans to prioritize the interests of the wealthiest corporations over America's national security,” he said. Markey's letter comes after White House chief counterterrorism ... and Susan ...

Parsing Cyberwar – Part 1: The Battlefield
Fabius Maximus (blog)
Since it first became a popular term in the computer security landscape in 1996 with the publication of Winn Schwartau's science fiction novel, Information Warfare, cyberwar has served primarily as a hold-all encompassing cyber-crime, cyber-espionage ...

Fabius Maximus (blog)

Kingdom addresses personal attacks on social networking sites
Saudi Gazette
The cyber laws aim at combating cyber crimes by identifying such crimes and determining their punishments to ensure enhancement of information security, protection of rights pertaining to the legitimate use of computers and information networks ...

Anonymous attacks Ukrainian government after Demonoid bust
ZDNet (blog)
Following news of Demonoid's takedown, the hacktivist group Anonymous attacked the Ukrainian government on Tuesday with its usual technique: a Distributed Denial of Service (DDoS) attack. The collective targeted and took down the National Television ...

Stuxnet and Flame Indicate The Face of 21st Century Cyber Warfare
EON: Enhanced Online News (press release)
BUSINESS WIRE)--According to Veracode, Inc., the leader in cloud-based application securitytesting, the impact of the Stuxnet worm has highlighted how owners and operators of critical infrastructure are on the front line in the battle to keep their ...

RSA and Bit9 Team to Accelerate Cyber Forensics Investigations
EON: Enhanced Online News (press release)
“By combining Bit9 Cyber Forensics Service with RSA NetWitness Spectrum Live service, NetWitness Spectrum Live subscribers are provided with enhanced situational awareness and the advanced security solution they need to help secure their enterprises ...

Warning: Ramadan-themed phishing targets Muslim Internet users
GMA News
As Muslims continue to observe the holy month of Ramadan, cybercriminals are exploiting the occasion to mount a Ramadan-themed phishing attack. The scams started as early as July 20, the start of the holy month, according to a blog post by security ...

SCADA systems in Australia easy target for malware warns expert
CIO Magazine
Legal obligations: ensure you meet your customers' increasingly complex legal obligations for cyber security. Business continuity: plan for ... "Therefore, the business has a very good incentive to protect these systems so they don't have to disclose ...

Critical Infrastructure Vulnerable to Cyber Attack, Congress Fails to Act
By Matt Ball
America is increasingly exposed to the threat of cyber-attacks, as hackers go after money, intellectual property and other data from individuals, the financial industry, corporations, government and the defense business. Last Thursday, the U.S. ...
Informed Infrastructure

July 2012 Cyber Attacks Statistics « Hackmageddon.com
By Paolo Passeri
Here we are with the statistics from the Cyber Attack Timelines for the first and the second half of July 2012. The sample included ... Cyber Warfare is positioned at the bottom of the chart with a “poor” 4% of the occurrences. The Distribution Of ...
Hackmageddon.com

Gauss: Virus that can spy on financial transactions found in Mideast ...
By hidden
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program. ... Boston: A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab. Dubbed Gauss, the ...
Firstpost

In Syria's Civil War, Cyber Attacks are the "New Modern Warfare ...
The Syrian Electronic Army, an arm of the embattled regime's intelligence service, is engaging incyber warfare. According to a report by Reuters,. "Cyber attacks are the new reality of modernwarfare," said Hayat Alvi, lecturer in Middle Eastern ...
TechPresident

Critical U.S. Infrastructure Vulnerable to Cyber Attack - Greatest Blog
By Joseph Elliot
This entry was posted in News Videos and tagged attack, computer, cyber, electric, hacking, internet, Joel Brenner, national security agency, NSA, PBS newshour, security, virus, water by Joseph Elliot. Bookmark the permalink.
Greatest Blog

Prepare for National Cyber Security Awareness Month | EDUCAUSE ...
Use the graphics below or the National Cyber Security Alliance graphics on your college or university website. Consider linking the ... Plan to join us for the October 4 National Cybersecurity Kickoff webinar at 1:00 p.m. (ET). Registration is free ...
EDUCAUSE | Blogs

UMUC Team Places in Top Three of National Cybersecurity ...
By Ashley Boarman
The team was led by Dr. Jeff Tjiputra, academic director of Cybersecurity and Computer Networks &Security in UMUC's Undergraduate School; UMUC alumnus Chris Kuehl served as the team's technical advisor. The two-day, 20-hour online competition consisted of a series of challenges with varying degrees of difficulty in cyber-related categories such as computer networking, cryptography, forensics, reverse engineering and Web server exploitation. For more information on the ...
Aberdeen Patch: Latest Announcements

GOP Senators Block Obama's Cybersecurity Act | The Moral Liberal
By admin
“Many corporate security directors believe their own businesses are better able to protect themselves from cyber attacks. If the government wishes to assist, the Obama administration can offer grant money to upgrade cybersecurity programs,” ...
The Moral Liberal

Brazil steps up cyber defenses -- Defense Systems
Army General José Carlos dos Santos, commander of the Cyber Defense Center, anticipates the center's staff to soon grow to about 100. In a published interview, he described cyber warfare as an asymmetric challenge and identified future ...
Defense Systems: News and Blogs

Senate cybersecurity push continues - Commissioner voting with ...
THE SENATE CYBERSECURITY PUSH CONTINUES -- The Senate gets back to action today at 2 p.m., and later in the evening it will adopt a motion to proceed ...
www.politico.com/morningtech/0712/morningtech521.html

Critical U.S. Infrastructure Vulnerable to Cyber Attack - YouTube
Since the internet has become so critical to daily life, systems like the electrical grid and water ...
www.youtube.com/watch?v=Vnrh3eEuKvM

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com