Chinese Cybersecurity Report a reply to 'Operation Shady RAT' Claims?


Chinese Cybersecurity Report: Reply to 'Operation Shady RAT' Claims?
IBTimes Canada
By James Lee Phillips | August 10, 2011 7:52 AM PDT A Chinese security report claims that the country sustained half a million cyberattacks over the past year, with half of those coming from places like the United States and India. ...
Delaware County Tech schools to offer cyber-security classes | Philadelphia ...
Philadelphia Inquirer
"If I did that 8000 times, I'd be really rich," said Joseph Rach, president of Kestrel Information Securities in West Chester, a cyber security consulting firm. Rach will be one of the instructors this fall at a series of cyber-security classes for ...
David Hoffman, Intel's Director of Security Policy and Global Privacy Officer ...
PR Newswire (press release)
10, 2011 /PRNewswire/ -- The National Cyber Security Alliance (NCSA), a nonprofit public-private partnership focused on cybersecurity awareness and education for all digital citizens, today announced that David Hoffman, director of security policy and ...
Allied Minds Appoints John Serafini as Director of National Labs
SYS-CON Media (press release)
“His ability to identify attractive opportunities – especially within the high-growth sector ofcybersecurity – and collaborate with national labs and government officials will help us significantly grow our National Labs program activities. ...
BreakingPoint to Present on Cyber Security and US Cyber Range Strategy at US ...
Marketwire (press release)
AUSTIN, TX--(Marketwire - Aug 9, 2011) - BreakingPoint cyber security experts, including CTO Dennis Cox, will present at GFIRST and the Defense Research Engineering Network conference on cyber defense initiatives, cyber warrior training and the US ...
OpenLeaks Announces A Test Launch, Invites 3000 Hackers To Attack It
Forbes
I've covered the cybersecurity and privacy beat for Forbes since 2007, with frequent detours into digital miscellania like switches, servers, supercomputers, search, e-books, online censorship, robots, and China. My favorite stories are the ones where ...
iPhone can be hacked in 18 minutes
AHN | All Headline News
The 2011 Black Hat cybersecurity conference in Las Vegas revealed some alarming and unusual findings. Most noticeable was that your iPhone password can be hacked in as little as 18 minutes. Dino Dai Zovi, an independent security hacker and a well-known ...
Napolitano Visits Cybe Innovation Center
KTBS
“Threats to our homeland continue to change, especially in the emerging area of cyber security. Louisiana has stepped up to meet the 21st Century challenges that threaten our national security and economic stability,” Sen. Landrieu said. ...
Global Digital Forensics Offers Proactive Solutions to Secure US Cyber Assets
Virtual-Strategy Magazine
Global Digital Forensics can test your cyber security posture and offer detailed remediation solutions. Joseph Caruso, CEO/CTO of Global Digital Forensics, weighed in on the subject, “We've been called in as emergency responders to digital intrusions ...
Not an option: time for companies to embrace security by default
Ars Technica
By Christopher Soghoian | Published August 9, 2011 11:30 AM In this op-ed, a cybersecurityresearcher argues that major companies are leaving customers at risk by not enforcing security by default. The opinions expressed here do not necessarily ...
Date: Wednesday, 23 November 2011 from 9am-6pm
Siliconrepublic.com
HackEire is Ireland's premier Cyber Security Challenge, where teams compete against each other in a controlled environment to determine who will be the first to exploit weaknesses on a number of systems. The purpose of HackEire is to demonstrate how ...
Hackers target SKorea's unification ministry: report
Computer Business Review
An official at the ministry's cyber security centre Kim Young-Pil told Yonhap news agency that the hackers had planted malware in the email account of an official in the ministry. Kim added that the ministry has been subject to repeated cyber attacks. ...
Shady RAT: The Huge, Scary, Cyber Attack Operation You've Never Heard Of
Geekosystem
by Max Eddy | 12:20 pm, August 9th, 2011 Last week, cyber security firm McAffee exposed a massive cyber attack operation as an object lesson for individuals, companies, and world governments to show that everyone is at risk. In a post written by Dmitri ...
Sourcefire Announces Second Quarter 2011 Financial Result
Dark Reading
Sourcefire, Inc. (Nasdaq:FIRE), the creator of Snort(R) and a leader in intelligent cybersecuritysolutions, today announced financial results for its fiscal second quarter ended June 30, 2011. "The investments we are making to grow both our sales ...
ABB in North America announces Protective Relay School webinar series
PennEnergy- Energy News (press release)
Following in the tradition of the highly regarded ABB Relay School, the protective relay webinar series focuses on transmission and sub-transmission protection and control fundamentals, as well as an introduction to IEC 61850 and cyber security basics. ...
Computer security: How to keep hackers at bay
Patriot-News
On the same day, cybersecurity giant McAfee said it uncovered a coordinated five-year attack in which thousands of networks, including the United Nations, defense contractors and federal government agencies, were accessed by hackers. ...
Potpourri: Washington's A-List of Cyber Power Brokers
GovInfoSecurity.com (blog)
The new federal chief information officer Steven VanRoekel and Phillip Reitinger, who until June was the top cybersecurity official in the Department of Homeland Security, both joined the Obama administration in early 2009 and both held key jobs at ...
IBM files protest challenging VA's awards on IT contract
Federal Times
More than 90 companies bid on the contract to provide the department with systems and software engineering, cybersecurity, training and facilities support. The 15th spot was later awarded to SAIC after an earlier protest with GAO was resolved. ...
Award Winning Smart Grid Security Services Unveiled by UtiliWorks and Digital ...
Insurance News Net (press release)
Digital Defense, Inc. (DDI), today announced they will be joining UtiliWorks Consulting , LLC (UtiliWorks) at the DOE Smart Grid CyberSecurity Information Exchange in Chicago on August 23rd to discuss the deployment of effective security solutions for ..
Cyber Risk & Privacy Liability Forum Set for October, HB And NetDiligence Announce
PR Newswire (press release)
"Cyber security mishaps, including the mishandling and use of private data, are among the top often devastating threats impacting companies, individuals, governments and other organizations today," said Greisiger. "With everything from accidental leaks ..
Steptoe & Johnson | 'To the Point' Radio Interviews Michael Vatis on Cybersecurity
Linex Legal (press release) (registration)
Mr. Vatis was a guest on a segment titled “Massive Breach Spurs Cybersecurity Fears,” which addressed a recent McAfee report identifying dozens of organizations and governments that were compromised by a massive five-year international cyber attack ...
DRS, AccessData to showcase computer forensics at IDC Security Roadshow 2011 ...
ITWeb (blog)
During the conference, DRS and AccessData will showcase several cyber security and digital investigations technologies, including its computer forensics Lab solution, the Mobile Phone Examiner Plus product, a new forensic Triage product and its network ...
OMB directs agencies to expand CIO powers
FierceGovernmentIT
When it comes to commodity IT, the memo says agency CIOs shall eliminate duplication across agency components in spending areas such as data centers, networks, cybersecurity, web infrastructure and business systems. As for program management, .
Taiwan Opposition Party Alleges Chinese Hacking
Wall Street Journal
He added that the campaign had done its best to ensure cyber security, including delivering some sensitive information only in paper form. The reported attacks come as alarm about cyber securityhas risen following the release of a white paper by US ...
Cisco report sheds light on advanced persistent threat trend
Siliconrepublic.com
The report went into more detail about advanced persistent threats, a type of malware fast becoming part of cyber-security language but for all the publicity around it, Cisco said it is not well understood. “The key lies in its ability to remain ...
Moody's: US Budget Cuts Likely To Pressure Defense Firms
Wall Street Journal
Sectors less likely to be affected include cybersecurity and unmanned aviation, which are more likely to see recent growth trends accelerate as potential threats and risks are more clearly understood, while historical spending in these areas has been ...
DHS Holding, Co. to Acquire Data Health Systems, Inc.
MarketWatch (press release)
These include Cyber Security, Authentication and Identification, Specialty Medical Devices, Medical Banking and Electronic Funds Transfer (EFT)/Electronic Remittance Advice (ERA) and proprietary software solutions for healthcare payers and providers ...
DIRECTROOMS.COM – MENA ISC TAKE PLACE IN JORDAN DURING 18 TO 19 SEPTEMBER 2011
TravPR.com (press release)
The theme of this year's conference is 'The Future of Cyber Security.' (TRAVPR.COM) THAILAND - August 10th, 2011 - The Conference will be based at the Kempinski Hotel in the Jordanian resort of The Dead Sea. This important conference is being organised ...
Former exec at Attain, SRA joins new firm
Washington Technology
The company specializes in identity resolution, cybersecurity and data analytics and was founded in 1996. In 2010, the private equity group Arlington Capital Partners acquired the company through its portfolio company Data Technologies and Analytics ...
Hackers can help inmates break out of prison
Ubergizmo
While they haven't put the theory to the test on a real prison, they believe it is possible because prison guards don't take basic cyber security measures. During a US prison tour, a researcher even noticed a prison guard checking his email using the ...
MS-ISAC Annual Meeting Focus 2011: Strengthening Partnerships
Government Technology (blog)
From the initial meeting overview and charge given by Will Pelgrin to the welcome messages Bobbie Stempfley, acting assistant secretary of the DHS Office of Cyber Security and Communications, the meetings highlighted the cyber risks and partnership ...
Operation Facebook video is likely fake, but Anonymous' mission to 'kill' is not
Digitaltrends.com
Skepticism about the video was first expressed by cyber security expert Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, who tweeted early today that the Operation Facebook attack “most probably is fake.” (Interestingly, Kaspersky's tweets about ...
CACI Awarded Prime Contract on $12 Billion,...
defpro
These services will include program management, strategic planning, systems and software engineering, cybersecurity, operation and maintenance, and IT facility support. CACI's selection to support this major contract is consistent with the company's ...
A new life, far beyond the Beltway- Local Jews - and the many reasons they ...
Washington Jewish Week
cyber security consultant for the State Department, Housing and Urban Development, Department of Defense, Transportation Security Administration and other agencies, Garternberg hopes to become a consultant based in Sfat for governments and businesses ...
Offensive Cyber Tools to Get Legal Review, Air Force Says
Secrecy News (blog)
Keith Alexander of US Cyber Command said: “President Obama's cybersecurity sixty-day study highlighted the mismatch between our technical capabilities to conduct operations and the governing laws and policies, and our civilian leadership is working ...
Eastern India's first cyber lab in Kolkata
Times of India
Add to it another 1366 people from banks, IT and central excise departments, military, bar associations, and schools and colleges who have participated in outreach programmes on cyber security awareness held at these labs. ...
Local and state agencies are more vulnerable to hacker attacks
Los Angeles Times
Make lawmakers and organization leaders aware of cyber security's important so they receive an appropriate budget. Have or hire competent security experts who are up to date on the latest trends in cyber defense.
MicroTech Wins $10 Billion STARS II Federal Contract
Techzone360
STARS II provides a variety of IT solutions like Cybersecurity, Information Assurance, Virtualization, Sustainability, Health IT, Cloud Computing, IPV6, VoIP, and Web 2.0 across the government. MicroTech is a certified and verified Service-Disabled ...
URS's CEO Discusses Q2 2011 Results - Earnings Call Transcript
Seeking Alpha
This acquisition provides us with access to a $40 billion market for high-end IT services such ascybersecurity and cloud computing. This further diversifies URS in a new and growing portion of the federal market. Just last month, the DoD released its ...
Debt Deal Could Be a Blow for Cybersecurity
By Elizabeth Hyman
A look at the week of August 8 in public advocacy for the IT channel: This week, cuts in the debt deal could hurt federal cybersecurity programs. Steven VanRoekel, formerly of Microsoft, is the new White House CIO. Experts offered.
CompTIA Blog
David Hoffman, Intel's Director of Security Policy and Global ...
10, 2011 -- The National Cyber Security Alliance (NCSA), a nonprofit public-private partnership focused on cybersecurity awareness and education for all digital citizens, today announced that David Hoffman, director of security policy ...
ITbriefing.net
The Blog @ Homeland Security: Secretary Napolitano visits Louisiana
By Homeland Security Blog Team
Today, Secretary Napolitano and Senator Landrieu visited the Cyber Innovation Center in Bossier City to meet with teachers and students in the cybersecurity field—underscoring the Department's efforts to strengthen cybersecurity and ...
The Blog @ Homeland Security
Intel's David Hoffman Joins NCSA Board of Directors - The New New ...
By Molly Mulrain
NCSA is a nonprofit public-private partnership focused on cybersecurity awareness and education. Hoffman is an expert in cybersecurity issues and will support the organization's mission to to create a culture of cyber security and ...
The New New Internet
Internet espionage: Cyber-security shriek | The Economist
Cyber-security shriek. Aug 3rd 2011, 17:02 by G.F. | SEATTLE ... Cybersecurity: Hacked off · A security breach at Booz Allen Hamilton: Hackers strike at a ...
www.economist.com/blogs/babbage/.../internet-espionage?fsrc...
Schneier on Security: "Taxonomy of Operational Cyber Security Risks"
The taxonomy of operational cyber security risks, summarized in Table 1 and detailed in this section, is structured around a hierarchy of classes, ...
www.schneier.com/blog/archives/.../taxonomy_of_ope.html
Cybersecurity solutions (data security, privacy, data protection ...
No longer does the idea of a “hard outer shell” constitute an adequate approach to cybersecurity. The term cybersecurity aptly defines the length and ...
www.grantthornton.com/cybersecurity/
Czech Cyber Security Strategy for 2011-2015 published — ENISA
Recently, the Cyber Security Strategy of the Czech Republic for the period of 2011-2015 was published. Please find an English language version available ...
www.enisa.europa.eu/media/news-items/czech.../image_mini

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com