Homeland Security Committee - Cybersecurity Bill

Homeland Security Committee Unveils Cybersecurity Bill
The New American
Members of the House Homeland Security Committee unveiled legislation Thursday that would authorize the cybersecurity functions of the Department of Homeland Security (DHS) and establish a quasi-governmental entity to coordinate cybersecurity ...

2012 Predictions: SEO poisoning, botnets, mobile malware ...
By Stephen Cobb
To round out ESET's series of malware and cybercrime predictions here are some of Stephen Cobb's thoughts on what the next 12 months will bring, from arrests to SEO poisoning.. ... I also admit to being influenced by one of the first documents to present 2012 cybercrime predictions, the Emerging Cyber Threats Report 2012 delivered in October at the Georgia Tech Cyber Security Summit 2011. Here is the opening paragraph from that report: Collaborative research, education and ...
ESET ThreatBlog

US gov split over new domain explosion
Register
The Federal Trade Commission on Friday became the highest-profile objector to the so-called new gTLDs program, saying it threatens to increase fraud and phishing. "A rapid, exponential expansion of gTLDs has the potential to magnify both the abuse of ...

Phishing Scam Targets MobileMe Customers
The Mac Observer
There's a new Phishing scam targeting Apple's MobileMe customers. The scam attempts to get users to send their MobileMe login information—which for some customers is the same as their iTunes account—by posing as a spoofed letter from Internet service ...

Microsoft flags malware that poses as police
ZDNet UK (blog)
Microsoft has warned people of a localised strain of malware that masquerades as a message from a country's local law enforcement. The 'ransomware' — malware that takes control of a user's device and demands payment to unlock the computer — was ...

ATO Phishing E-mails Aiming at Innocent Taxpayers, Reports 'Hallmark Accounting'
SPAMfighter News
Accounting firm Hallmark Accounting situated within Ballarat (Victoria, Australia) is alerting netizens for remaining watchful about phishing e-mails asserting they are from ATO (Australian Taxation Office), thus published thecourier.com.au in news ...

Malware authors rush to release Java exploit packs
Computer Business Review
Researchers at M86 are warning that exploits for a recently-discovered Java vulnerability are already available in the wild, meaning cyber criminals could target unpatched systems. The security firm also warned that this news shows authors are getting ...

NATO solicits bids to expand cybersecurity abilities
FederalNewsRadio.com
NATO is collecting bids from some of the world's top defense companies to help update and expand its cybersecurity abilities. The Wall Street Journal reports that Lockheed Martin and Northrop Grumman are among the defense contractors lining up for a ...

Scholarship aims to attract high schoolers to cyber career
FederalNewsRadio.com
By Jolie Lee A cybersecurity nonprofit is trying to attract the next generation of cybersecurityprofessionals — starting as early as high school. The International Informations Systems Security Certification Consortium, Inc. — or (ISC)2 &mdashl; ...

OAS Member Countries to Debate the Strengthening of Cyber Security at their ...
ISRIA (registration)
The Member Countries of the Organization of American States (OAS) today agreed to debate the theme, “Strengthening Cyber Security in the Americas,” during the XII Regular Session of the Inter-American Committee against Terrorism (CICTE), ...

Cybercrime on the rise, but not all cases getting reported
Livemint
Under the IT (Amendment) Act, 2008, Cert-In is designated to serve as the national agency in the area of cyber security. Statistics retrieved from Cert-In reveal that it tracked around 6.9 million bot-infected systems and 14348 website defacements in ...

Smart Card Alliance Wraps Up 2011 With Release of the First 'E-Yearbook'
MoreRFID (press release)
From the acceleration of EMV and mobile payments to the advancement of open transit payments and cyber security initiatives like the National Strategy for Trusted Identities in Cyberspace (NSTIC), 2011 has been a landmark year for the North American ...

Another Warning To Americans
WHTC (blog)
... sections 1031 and 1032, which declare the unconstitutional right to detain Americans indefinitely without trial, but it authorizes an Internet offensive and online Pentagon takeover under the pretext of cybersecurity and stopping online piracy. ...

NEC Showcases Safer Cities concept at IFSEC-2011
Siliconindia.com
CYBER SECURITY - NEC and our partner's cyber security solutions offer the world's first dedicated outbound monitoring solution for cloud and web services, ensuring internet and online security and protects against incoming threats, data leakage and ...

Norman Delivers Powerful and Effortless Protection with New Security Suite 9 ...
PRWire
Norman and Australia/Nz Master Norman Distributor Capital Security Solutions announced the availability of Norman Security Suite 9 for consumer personal computers, delivering unmatched cyber security protection with simplicity. ...

10 Main Internet Governance Developments in 2011
CircleID
An increasing number of security incidents and the fear of cyberwar put cybersecurity high on diplomatic agendas. Cross-border cooperation remains one of the main challenges in globalcybersecurity cooperation. Some analysts argue that cybersecurity ...

Iran intelligence system thwarts "infiltration mission", says CIA spy
Iranian Students News Agency
The mission of DARPA is strengthening the US Department of Defense's Cyber Securitycapabilities. “After DARPA, I was recruited by Kuma Games Company, a computer games company which received money from CIA to design and make special films and computer ...

California Fights Cybercrime with New eCrime Unit
Criminal Justice Degree Schools
Cyber-security is becoming more important as more of the world's business, banking and commerce data are shifted to the cloud, and more transactions become dependent upon the use of networks and third-party servers with which there is not tangible ...

Criminal Justice Degree Schools

Parliament site zapped by botched IT upgrade
Sydney Morning Herald
In the recent Gillard Government cabinet reshuffle, the Department of the Prime Minister & Cabinet assumed responsibility for cyber-security, taking over the role from the Attorney-General's department. Visitors to the aph . gov . au site were greeted ...

Sydney Morning Herald

6 credit mistakes that can ruin your holidays
CreditCards.com
The Web address prefix "https" denotes a secure site; the "s" stands for secure, explains Stan Stahl, president of Citadel Information Group, a Los Angeles-basedcybersecurity firm. To protect your home computer, download software updates regularly. ...

CreditCards.com

Social media usage increases cyber risks – a competing point of view?
Lexology (registration)
a workforce educated on the importance of cyber security and adherence to legitimate social media usage policies remains the best alternative to protect a business' IT future. Not just a companywide review of the company's cyber security policies, ...

Industrial Control Systems Security: Recommendations for Europe & Member States
PR Newswire (press release)
ENISA, the EU's 'cyber security'agency, has today issued the results of a study on Industrial Control Systems (ICS) security. The report describes the current situation on ICS security and proposes seven recommendations for improving it. ...

DHS - Readout of Secretary Napolitano's Meeting with Swedish Deputy Foreign ...
ISRIA (registration)
Secretary Napolitano also highlighted progress between the two nations on information sharing agreements to increase bilateral cooperation and international travel security, and enhance collaboration on cybersecurity.

The global IT sector and Sri Lanka
The Island.lk (subscription)
... "ICT for Faster Collaboration" by Mr. Yasas Vishuddhi Abeywickrama, "Web 2.0 as a Catalyst in Creating Advanced International Relationships" by Mr. Chanuka Wattegama, "Cyber Security and Legal Aspects" by Mr. Vasana Wickremasena, and "Social Media ...

The Island.lk (subscription)

S. Korea Bumps up Cyber Security watch in wake of Kim Jong-il death
By Lee J
Kim Jong-il, Passed away today and it has been a hot topic all across the social media and press in general, We have come across a alert on the yon hap News website that is alerting Korean's to be on the watch for malicious activity.
Cyber War News
Telexplainer: Cyber Security Threat Protection In the Cloud
By T1 Rex
Cyber Security Threat Protection In the Cloud. In days of yore, when castles were in vogue, the nobles found that massive stone fortifications were not enough to secure them from determined invaders. What they did was to ring the castle ...
Telexplainer

Criminal Minds ~ Researchers Explore How Cyber~Attackers Think ...
By Staff Editor
Both are members of the Maryland Cybersecurity Center. Their work is the first look at the relationship between computer-network activity patterns and computer-focused crime trends. “We believe that criminological insights in the study of ...
USADefenseIndustryJobs.com

10 Main Internet Governance Developments in 2011 | Dotgreen
By admin
An increasing number of security incidents and the fear of cyberwar put cybersecurity high on diplomatic agendas. Cross-border cooperation remains one of the main challenges in globalcybersecurity cooperation. Some analysts argue that ...
Dotgreen

'Fierce' Competition for New NATO Cyberwar Contract; US Firms ...
The North Atlantic Treaty Organization is collecting contract bids today from more than 300 companies across its 28 member nations to expand the alliance's cybersecurity capabilities, the Wall Street Journal reported today. The initial award is ...
GovCon Wire

White House Gets Its Cybersecurity Research Ducks in a Row
"Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and ... It also assumes the NITRD Cyber Security and Information Assurance ...
www.technewsworld.com/story/cyber-security/73954.html

DHS | Blueprint for a Secure Cyber Future
With this guide, stakeholders at all levels of government, the private sector, and our international partners can work together to develop the cybersecurity ...
www.dhs.gov/files/.../blueprint-for-a-secure-cyber-future.shtm

Technical Cyber Security Alert 2011-350A ≈ Packet Storm
Technical Cyber Security Alert 2011-350A - Adobe has released Security Bulletin APSB11-30, which describes multiple vulnerabilities affecting Adobe Reader ...
packetstormsecurity.org/files/107960/TA11-350A.txt

US-CERT Technical Cyber Security Alert TA11-350A -- Adobe ...
Adobe has released Security Bulletin APSB11-30, which describes multiple vulnerabilities affecting Adobe Reader and Acrobat.
www.us-cert.gov/cas/techalerts/TA11-350A.html

Crisis Mapping and Cybersecurity – Part II: Risk Assessment | Diary ...
This blog expresses only my personal views, and not the one of any organization or institution I have worked or currently work for. I have a background in human ...
crisismapper.wordpress.com/.../crisis-mapping-and-cybersecur...

Missouri Ranks among Top States for Cyber Security Website
Missouri Ranks among Top States for Cyber Security Website ... and information about cyber security in Missouri state government, go to cybersecurity.mo.gov. ...
oa.mo.gov/.../Missouri_Ranks_among_Top_States_for_Cyber...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com