US government says Stuxnet could morph into new threat

US government says Stuxnet could morph into new threat
Reuters
Roberta Stempfley, acting assistant secretary with the Office of Cyber Security and Communications, and Sean McGurk, director of the National Cybersecurity and Communications Integration Center, testified before a subcommittee of the House Energy and ...
Is it time for the Pentagon to turn cyberwar over to someone else?
ITworld.com
The number of service people working online has ballooned, as has the budget for cyber securityand cyberwar systems. Both are still far too small even maintain a secure posture online, let alone catch up to the neglect of the past, ...
US warns against modified Stuxnet virus
Computer Business Review
The US government cyber security experts have warned that the adapted versions of the Stuxnet virus could cripple power, water and other vital services of the West. The Department of Homeland Security of US said that the Stuxnet code is in the wild and ...
Cybersecurity moves to post-grad level at Mason
GCN.com
By William Jackson Virginia's George Mason University is joining the growing number of schools adding graduate programs in cybersecurity to their curriculum, offering a multidisciplinary Master of Science degree in management of secure information ...
Raytheon and SafeNet Team to Deliver Next Generation Malware Detection Technology
MarketWatch (press release)
"Cybersecurity requires a layered approach to protect data throughout its entire lifecycle and secures organizations from known and unknown threats. Raytheon's RShield is a critical part of this layered approach and is central to our larger vision of ...
U.S. Cyber Challenge and Commonwealth of Virginia to Host Cyber Security ...
DigitalJournal.com (press release)
More than 80 individuals, who are participating in the 2011 Virginia Regional Cyber Security Boot Camp at the college, will be attending the roundtable. Dr. Ernest McDuffie, Lead for the National Initiative for Cybersecurity Education (NICE), ...
Hacked society
Korea Times
Regulators and portal sites have been sloppy and are useless in cyber security. Hackers infiltrated the personal details of 35 million people Tuesday, over 70 percent of all South Koreans. It was the biggest incident in Korea, exposing users of popular ...
DoD launches website devoted to cyberspace strategy
Fort Leavenworth Lamp
The new website, online at http://www.defense.gov/cyber, is a tool that will help to explain and consolidate the Pentagon's cybersecurity accomplishments and the new way forward for military, intelligence and business operations in cyberspace, ...
No excuse for cyber theft
Buffalo News
This is enough of an issue that nearly 1z ye 1/2 r 1/3 ago President Obama directed his National Security and Homeland Security advisers to conduct “an immediate cyber security review.”A few months later, he observed—correctly—that the nation is at ...
Solving the Compliance Versus Security Conundrum (Opinion)
Government Technology
There's a growing apprehension within government that companies that own and operate the nation's critical infrastructures aren't doing enough to ensure that appropriate cyber-security controls are in place to protect the key resources society depends ...
U.S. Cyber Challenge to hold 2011 Cyber Camps
Dover Post
By Leigh Hunziker More than 200 participants from across the country will attend weeklong cyber security training events in July and August. The US Cyber Challenge announced the 2011 Cyber Camps, a series of weeklong “boot camps” designed to provide ...
Security experts urge governments to work together
Government News
Mr Campbell said cyber security is a much wider and global issue and the only way to address that is for governments, departments and businesses to “work together”. “I don't think this concept of the 'island nation' exists on the internet and that was ...
Two new data-breach bills introduced in the Senate
TechJournal South
WASHINGTON, DC – Two new bills centered on cyber security were introduced in the US Senate Thursday, although its a wonder anyone noticed with all the debt-ceiling debate brouhaha. Sens. Thomas Carper, D-Del., and Roy Blunt, R-Mo., introduced a bill ...
Controversial phone app offering background checks is back
The Star-Ledger - NJ.com
But cyber security experts and privacy advocates say BeenVerified is just one of many "information brokers" that are pushing the blurry boundaries of privacy in a new digital age. Social Intelligence, a startup that provides employers with background ...
TeleCommunication Systems Reports Second Quarter 2011 Results
MarketWatch (press release)
Services revenue was up 20% on higher volume from satcom, cyber security, and LBS technology deliverables. -- Gross profit was $38.1 million, up 15% from $33.2 million, and represents the company's highest quarterly gross profit to date. ...
Shared interest in online fraud makes strange bedfellows
Nextgov
"Cybersecurity is a problem in China. Fraud is a big problem. So there are areas where we can cooperate to improve the health of the ecosystem," Bruce McConnell, a counselor for the National Protection and Programs Directorate, said Thursday. ...
Securitybyte 2011 All Set to Take Place
itVARnews.net (press release)
The conference will comprises of 25 plus talks with participation from various Corporations, Government & Private Cyber Security Agencies. These national & international speakers will share their wealth of knowledge and experiences on the various ...
KEYW Corp. to spend $30M on Mass. tech company
Bizjournals.com
The company, Flight Landata Inc., gives KEYW's cyber security technology offerings more of a focus on high-tech intelligence-gathering for the US military. It is Hanover-based KEYW's fourth acquisition since going public in October that is in the ...
Hard National Security Choices
Lawfare (blog)
by Raffaela Wakeman Congressional reporters may have been left with nothing to write about last night, but we sure have plenty to read about today in the world of national security, the war on terror, and cybersecurity. The Senate Select Committee on ...
Neustar Adds Symantec Alum To C Suite
Cable360.net
“Joining the company when it is building on its number portability and Internet infrastructure services by creating cloud-based digital-rights-management systems, rolling out advanced cyber-securityservices for both the government and private sector, ...
Jacoby: Relationships Drive Northcom, NORAD Missions
Department of Defense
If Jacoby is confirmed in his new role, having responsibility for defense of the homeland will make the issue of cybersecurity an important concern. “Like members of this committee and senior leaders across the military,” the general said, ...
Dr. Chandramouli of Stevens Gives Keynote on Dynamic Spectrum Access at ...
PR.com (press release)
Held in Princeton, NJ, NIKSUN WWSMC was a three-day conference covering cybersecurity, wireless communications, and mobility for industry and academic researchers. Dr. Chandramouli's keynote, for the conference's Wireless Summit track, was titled, ...
NXP Consolidates No. 1 Position in Worldwide ID Market
MarketWatch (press release)
Worldwide megatrends in mobility and connectivity, cloud computing, machine-to-machine (M2M) authentication, as well as physical and cyber-security threats are putting mounting pressure on businesses, governments and end users. ...
FAA Shutdown Widely Impacts Economy
Sacramento Bee
... and suppliers of civil, military and business aircraft, helicopters, unmanned aircraft systems, space systems, aircraft engines, homeland and cybersecurity systems, materiel and related components, equipment services and information technology. ...
Kroll Chairman William Bratton to Speak at Aspen Security Forum
ExecutiveBiz (blog)
... industry leaders, and others for three days of discussions on the state of aviation, maritime, border security, mass transit security, intelligence, critical infrastructure protection, cybersecurity, counterterrorism strategy and terrorism finance. ...
Push for patents
The Auburn Plainsman
Their efforts can be seen in a variety of fields including microbiology, health science, cyber securityand even water research and protection. Most of the work and research done by these groups is used in today's world, though most people don't notice ...
Fresno State to help train security pros
Fresno Bee
Plans include classes such as cybersecurity and border security. And experts say the down economy won't be an obstacle for graduates looking for work. Emergency management jobs are projected to increase by 22% by 2018 – more than twice as fast as the ...
BAE in buy-back surprise
Investors Chronicle
Of BAE's major divisions, only programmes and support, the UK maritime, and planes and cyber security unit grew sales - up 3 per cent to £3.1bn. So, with traditional defence markets in decline, BAE has its sights on such "fast lanes of growth" ...
Early Look: New Controls NIST Will Offer
GovInfoSecurity.com (blog)
"We're focusing on building more resilient systems, starting back at the architectural level, that, I think, is going to go a long way in really changing the whole way we're doing cybersecurity and risk management." There are 18000 banking institutions ...
The New World Order's Megadeath Plan For The World: The Five Theaters of Action.
OpEdNews
A false flag attack against the Internet by the military-industrial complex in order to shut down the free internet and phase in Internet 2 with a new Cyber Security System that will have tighter restrictions on blogs, alternative news websites, ...
Slash size of government? Think again
Albany Times Union
Try cybersecurity, ocean pollution, invasive species, illegal immigration, climate change, infrastructure renewal and medical research. I want to know about new and dangerous mosquitoes carrying tropical diseases that have invaded the United States. ...
Symantec: Power Grid at Risk -- the Disruptors
TheStreet.com
Cyber security is high profile at the moment thanks to a spate of headline-grabbing attacks in recent months which targeted defense contractor Lockheed Martin(LMT), Sony(SNE) and Citigroup(C), a trend which boosted Symantec's first-quarter numbers. ...
Initiatives Taken by The Institute of Chartered Accountants of India (ICAI)
Press Information Bureau (press release)
The Ministry of Information Technology has a Computer Emergency Response Team (CERT-In) which deals with cyber security in the country and also has a panel of IT Auditors & IS Auditors. Some CA Firms are also on this panel. ...
L-3 to Spin Off $2 Billion Unit as Whitworth Challenges
Bloomberg
L-3 will retain work on cyber security, intelligence and security contracts under a renamed unit to be called National Security Solutions, the company said. The company has decided to keep its aircraft maintenance and modernization unit that retrofits ...
Names & Faces
Gazette.Net: Maryland Community News Online
Previously, Suri was director of cybersecurity with the Maryland Department of Business and Economic Development, co-founded Beny Bigalos and worked for Yafo Networks, Cisco Systems, Honeywell and Charles Industries. ...
L-3 plans spin-off of units to boost growth
Financial Times
The divestments will leave L-3 with revenues of about $13.5bn and four main divisions, providing aircraft modernization and maintenance, electronic systems, intelligence and surveillance systems, and cyber security services to federal agencies. ...
GovWin Recon: July 29: DOD Insourcing Impacts; House Dems Stump for Contractor ...
govWin (blog)
L-3 to Spin Off $2 Billion Unit as Whitworth Challenges [Bloomberg] – L-3 Communications is spinning off its government services into a new company called Engility and will retain cybersecurity, intelligence and security contracts under its newly-named ...
In Vermont, Privacy Issues Raised By Smart Grid Technology
Vermont Public Radio
CEO David Hallquist says a big concern is cyber-security - how to prevent customer information from falling into the wrong hands. (Hallquist) "The potential we have now out there with all these ports out there all these smart meters, all this stuff in ...
Flying Drone Can Crack Wi-Fi Networks, Snoop On Cell Phones
Forbes (blog)
Perkins, an Air Force contractor focused on cybersecurity who once owned a airplane hobby shop, and Tassey, an ex-Air Force consultant with Engineering Systems Solutions, say they wanted to demonstrate the vulnerability of government and corporate ...
Vangent Risk & Talent Management Announces Integration with Taleo Business ...
PR Web (press release)
The company's risk focus also highlights ethics, information security, safety and other arenas to address cyber-security, insider threats, compliance issues and a range of other risk exposures. Vangent has supported the industry for more than 60 years ...
Aerial Vehicles Buzz Into Lewis County
WBOY-TV
"We collect that information, analyze it and feed it back to the right agencies, getting into cyber security those are the areas we should be involved with and I have great opens for this region and the tech based economic development that will come ...
Kundra: 'Golden source' of data center savings due in the fall
GCN.com
“Frankly, that was one of the biggest challenges and that is what worried me from a cybersecurityperspective; that there wasn'ta simple accounting of all the data centers that each department had,” Kundra noted. The GAO study was right-on in terms of ...
The US “cyber-revolutions” project is a perfect gift for terrorists
The Voice of Russia
In the wake of recent hackers' attacks, resulted in the resignation of the US cyber-security chief, the decision to provide the potential cyber-criminals with the cutting-edge technologies could only be described as weird. ...
PayPal Again And The Pwnies
Security Pronews
In light of such, organizations like Anonymous, Lulzsec, and Sony are nominees for the Pwnie awards next week which celebrate the achievements and failures of cyber security. Awards are given in areas of the best bugs, most innovative research, ...
Englobal Announces Second Quarter 2011 Earnings Date and Conference Call Webcast
GlobeNewsWire (press release)
The Automation segment provides services related to the design, fabrication and implementation of process distributed control and analyzer systems, advanced automation, information technology,cyber security and heat tracing projects. ...
Anonymous Hacks ManTech, FBI Cybersecurity Contractor ...
By Mike Lennon
Anonymous claims it has hacked ManTech, a contractor that provides cyber security services to the FBI and helps protect and secure the FBI's classified communications infrastructure.
SecurityWeek RSS Feed
Cybersecurity becomes an international initiative | Simply Security
By Simply Security
Malware, spyware, phishing attacks and computer viruses and the cyber criminals that purvey them are threats that stretch across the globe. No one country or internet user is safe, it seems, from the risks that come with surfing the ...
Simply Security
U.S. and India Sign Cybersecurity Agreement
During that visit, the countries agreed to create the memo to establish best practices for the exchange of critical cybersecurity information and expertise ...
www.shrm.org/hrdisciplines/.../USIndiaCybersecurityPact.aspx
US government pushes forward cybersecurity policy | Science ...
Cyberdefense policy has reached into the highest levels of government, military, legal theory around the globe. The US military alone will spend $12 billion ...
www.dw-world.de/dw/article/0,,15256345,00.html

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com