Stuxnet: a glimpse of the U.S. cyber arsenal?

Security Expert: US 'Leading Force' Behind Stuxnet
NPR
by Tom Gjelten One year ago, German cyber security expert Ralph Langner announced he had found a computer worm designed to sabotage a nuclear facility in Iran. It's called Stuxnet, and it was the most sophisticated worm Langner had ever seen. ...
PwC Debuts Cyber Security Video Series on Fraud Forum
Sacramento Bee
26, 2011 -- /PRNewswire/ -- PwC's Fraud Forum has launched a Cyber Security Video series featuring overviews and insight on the cybercrime landscape and in-depth discussions of what organizations can do to protect themselves from compromise. ...
TRA organises cyber security workshops
Khaleej Times
The discussions focused on finding effective means to strengthen the cooperation between OIC countries on issues that threaten cyber security, in addition to providing a safe cyber environment for users. The delegation aims to protect users from cyber ...
Seventy-Three Percent of Business Owners Have Not Tested Their Websites for ...
MarketWatch (press release)
NEW YORK, Sept. 26, 2011 /PRNewswire via COMTEX/ -- Newtek Business Services, /quotes/zigman/84238/quotes/nls/newt NEWT -1.48% , The Small Business Authority with a portfolio of over 100000 business accounts, announced today the findings of its SB ...
Pershore's MP backs cyber security firms
Evesham Journal
CYBER security firms in Worcestershire that are keeping Britain's secrets safe need more government support, said a local MP. Harriett Baldwin, Mp for West Worcestershire, praised the work of Malvern's network of specialist technology firms during a ...
3 Data Breach Bills Pass Senate Committee
Insurance Networking News
A bill that includes several cyber security proposals proposed this year by the Obama administration was approved by a Senate committee today. The Personal Data Privacy and Security Act of 2011, S. 1151, introduced by Sen. Patrick Leahy, D-Vt., ...
Malaysia Encourages APEC TEL To Boost Cooperation In Cyber Security
Bernama
Secretary-General of the Ministry of Information, Communications and Culture Datuk Seri Kamaruddin Siaraf said such efforts were necessary as issues concerning cyber security and privacy were now becoming a major concern in most countries including ...
Five Ways to Profit from Cybersecurity Stocks
Money Morning
Companies without in-house cybersecurity teams have been on the hunt for a good takeover target to bring such expertise on board. Intel Corp. (Nasdaq: INTC) about a year ago paid $7.68 billion to buy out McAfee Inc., a leading global supplier of ...
University of Minnesota To Host Cyber Security Summit
Campus Technology
Barker is associate director and cybersecurity adviser to the Information Technology Laboratory at the National Institute of Standards and Technology. He plans, directs, and implements the institute's cybersecurity policies and programs, and implements ...
WV to host cyber security program
West Virginia Public Broadcasting
By John Hingsbergen & AP September 26, 2011 · West Virginia officials are holding a public, daylong program on information and cyber security. The state Office of Technology has scheduled an Oct. 5 event to recognize National Information and Cyber ...
Hackers may have had head start in Ottawa cyber-attack
CTV.ca
Last year the Conservatives announced a new cyber-security strategy, which set aside $90 million over five years, and $18 million in continuing funding toward beefing up existing systems. But the records suggest a request for better software that could ...
DoD expands cyber-protection pilot
DoD Buzz
Also, the legislation should say that companies can be protected from certain privacy and other laws in order to share information with the government for cybersecurity purposes, the official said. Wow, candor! Usually cyber-security discussions at the ...
Malaysia Urges APEC TEL To Intensify Cybersecurity Cooperation
Bernama
KUALA LUMPUR, Sept 26 (Bernama) -- Bilateral and multilateral cooperation among members of the APEC Telecommunications and Information Working Group (APEC TEL) needs to be strengthened to counter negative acts which threaten the stability of Government ...
Cyber warfare defended through forensics
Examiner.com
Hoog admits that cyber security is an incredibly difficult challenge. “It probably should have been discussions we were having six, eight years ago, (and now) we're behind the eight ball.” But with forensics “there is a very, very interesting ...
9-26-11: Tomorrow's Cyberdefenders
Maryland Morning with Sheilah Kast
Everyday, hackers hit government agencies and major corporations, and cybersecurity has become a bigger concern than ever. Governor Martin O'Malley's administration is trying to build acybersecurity industry here in Maryland. ...
Feds Give Kundra "B" Grade -- Ask VanRoekel to Focus on Operations
MarketWatch (press release)
When it comes to cyber security, respondents unanimously agree threats have increased in the last year (100 percent say yes). Feds say the most important priorities for cyber security going forward are: securing Federal networks (68 percent), ...
Hacking of arms firms worries Americans
New Brunswick Business Journal
"Cyber security must be a public-sector priority," US embassy spokeswoman Karen Kelley said. One industry source said Washington has been pressuring Japan to step up security against cyber assaults. The attacks on Japan's top defence contractor ...
Most Canadians have been victims of online viruses: study
Vancouver Sun
The findings appear in a major study of the knowledge and attitudes of Canadians towards cyber-security and safety done for Public Safety Canada by Ekos Research Associates. A report on the survey of 5048 Canadians, dated August 2011, has just been ...
Norman Delivers Powerful and Effortless Protection with New Security Suite 9 ...
Sacramento Bee
26, 2011 -- /PRNewswire/ -- Norman today announced the availability of Norman Security Suite 9 for consumer personal computers, delivering unmatched cyber security protection with simplicity. Consumers are increasingly aware that a potentially ...
Taking iPads into battle
Los Angeles Times
The use of this and other smart devices is raising cyber-security concerns among military strategists. (Don Bartletti, Los Angeles Times / September 26, 2011) By WJ Hennigan, Los Angeles Times As a Cobra attack helicopter pilot, Marine Capt. ...
Network Intelligence Alliance Sees Membership Increase as Demand for Embedded ...
San Francisco Chronicle (press release)
NI technology is critical for communications, business and security applications, such as network traffic optimization, policy management, service assurance, market research and network and cyber security. NI Alliance members are providers of ...
On the Road with SenSage
TMC Net
... (News - Alert) had a chance to sit down with Joe Gottlieb, President and CEO of SenSage, a company who helps organizations collect, store, analyze and interpret complex information to identify new threats and improve cyber-security defenses. ...
747s as flying Unix hosts: SCADA in the sky
Boing Boing
By Cory Doctorow at 3:02 pm Sunday, Sep 25 From Craig S Wright, vice president of Global Institute for Cybersecurity + Research, a look at the use of SCADA systems that are connected to the Internet. You probably remember SCADA from the starring role ...
The Government Model
Wall Street Journal
Responsible for protecting computer networks for 400 US embassies and offices across 24 time zones, State faces a cybersecurity challenge that in many ways mirrors that of a multinational company. Its program scans computers throughout the department ...
First computer forensics firm with e-Crime lab established in Ghana
Ghana News Agency
Mr Antwi-Boasiako said apart from services in ICT infrastructure security and computer forensics being provided by the company, e-Crime Bureau would also develop training programmes in cyber security, incident response, internet investigations and ...
Barracuda Networks expands presence in the Middle East
AME Info
Barracuda Networks' research scientists have been analysing the latest cyber security threats landscape and will be sharing new research into the latest threats affecting consumers and businesses in the Middle East. The number of malware found on a ...
CSC touts cross-government security feed
iT News
According to CSC's cybersecurity services director Lawrence Ostle, the service could bypass organisational politics that hindered security in federated organisations like governments. He highlighted a NSW Audit Office report last October that found ...
Next Generation MDM Unlocks Wealth of Smart Meter Data
MarketWatch (press release)
Guided by the Smart Grid Cyber Security standard (NISTIR 7628), the access control design of the Ecologic MDM provides a high degree of security from unwanted external access to smart grid assets through the MDM application. These access and security ...
Coast Lines: Sept. 26, 2011
Santa Cruz Sentinel
Topics include Middle East Realignment, Cyberwar and Cybersecurity, Exit From Iraq and Afghanistan, Obstacles to Promoting Democracy, Mexico, Indonesia, Oceans and Energy Geopolitics. The group will be led by Laina Farhat-Holzman, local author, ...
CompTIA Washington Fly-In Will Provide Advocacy Forum for IT Solution Providers
PR Web (press release)
Discussion topics are likely to include health information technology; privacy; data breach notification; cybersecurity; workforce development; taxation; regulatory matters; access to capital; and government contracting opportunities for small IT firms ...
You May Be Fighting the Wrong Security Battles
Wall Street Journal
Dr. Gordon and Dr. Loeb are professors at the University of Maryland's Robert H. Smith School of Business and the authors of "Managing Cybersecurity Resources: A Cost-Benefit Analysis". They can be reached at reports@wsj.com...
Identity Ecosystem: Big Brother Logs On
Rutherford Institute
Touted by Howard A. Schmidt, President Obama's Cybersecurity Czar, for its convenience and so-called ability to enhance online trust and privacy, this Identity Ecosystem is yet another example of the collusion between government and corporate America, ...
Hackers should be hired, TED speaker urges: is this the best path to online ...
SmartPlanet.com (blog)
As he put it: “Despite the fact that we are beginning to pour billions, hundreds of billions of dollars, into cybersecurity — for the most extraordinary technical solutions — no one wants to talk to these guys, the hackers, who are doing everything. ...
Delivering on the Promise of Innovation to Help Prevent CyberBullying
The White House (blog)
We stand ready to assist in surfacing promising ideas, encouraging testing and validation, and scaling what works. Aneesh Chopra is US Chief Technology Officer and Howard Schmidt is the President's Cybersecurity Coordinator.
Estonia - President Toomas Hendrik Ilves at ICEGOV conference (International ...
ISRIA (registration)
Cyber-security has is today's growth field, with no better testamonial than the fact that both NATO's Cooperative Cyber Defense Center and the European Union's Home and Justice affairs data centre are located here in Tallinn. ...
BAE Systems looks to tap 'knowledge bank'
Financial Times
In 2008, for example, it spent £531m on Detica, a UK based company that specialises in data services and cyber security. And in the first half of this year it paid £177m for Norkom, which helps the financial services industry to combat money laundering ...
Education in cyberspace security | | Aggie CentralAggie Central
By AggieCentral Editor
15, Cameron's Department of Computing and Technology hosted a seminar about cyber security that focused on balancing technology, educating users and making policies to provide maximum information technology. The department ...
Aggie Central
Cybersecurity, An Introduction | Hoover Institution
Editor's note: This essay is the first in a series of three articles by the author about cybersecurityand cyber warfare. Hardly a day goes by without news of some ...
www.hoover.org/publications/defining-ideas/article/93736

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com