What You Need to Know About SOPA in 2012

What You Need to Know About SOPA in 2012
ReadWriteWeb
For instance, there are significant costs to SOPA, both for the startup ecosystem, the entertainment industry, regulatory bodies and individual citizens. There are significant cybersecurity risks to be considered as well. Stay tuned at ReadWriteWeb as ...

expri.com - technology: "Hackers on Sunday claimed to have stolen 200 GB of e-mails and credit card data from United States security think tank Stratfor, promising a weeklong Christmas-inspired assault on a long list of targets. "

Internet Expands to 220 Million Domains: VeriSign
eWeek
21 for a "short delay" before allowing applications due to cyber-security concerns. Members of the House Energy and Commerce Committee said gTLDs would make Internet users and businesses perhaps infinitely more susceptible to fraud. ...

What You Need to Know About the Stop Online Piracy Act in 2012
Huffington Post (blog)
On the other hand, there have been significant cybersecurity concerns raised about the bills because of what it would do to DNSSEC, including by DHS officials. The committee might take a classified briefing so that the government's own geeks from ...

Jobs issue likely to be focus of campaigns
Tallahassee Democrat (blog)
"We need policies that will focus on those countries who are doing reverse engineering and stealing our US technology, invest in cyber security and defense and invests in infrastructure improvements — jobs that will get people back to work sooner than ...

SOPA: the public debate
The Verge
"I think from cybersecurity to technical experts, the bill's impact on the security of the internet and the integrity of the basic infrastructure of the internet is very much at risk." "It is very dangerous to give the government, and the Attorney ...

The Internet and Latin America: The Rise Of The Virtual World And Emerging ...
Eurasia Review
Additionally, we are witnessing a rise in the importance of cyber security as cases of hacking and other cybercrimes proliferate. In terms of numbers, the level of internet use in Latin America is certainly not as widespread as it has been in Europe or ...

Cyber attacks “growing threat”, report warns
Radio Netherlands
Companies and ordinary citizens are more at risk than government departments, the service warns in its first Cyber-Security report. Cyber attacks are becoming more frequent and are expensive to combat, the report notes. Cyber crime, the report says, ...

China-Based Hacker Teams Threaten US Companies
Infoboom
Distinct group digital signatures have enabled US cybersecurity experts to link the teams to various cyber attacks, not just directed at the US government, but to US companies of all sizes. According to a USA Today article, the hacker teams are backed ...

Beware of the cyberthief
Wilkes Barre Times-Leader
Symantec Corp., the cybersecurity firm, estimates that cyberthieves steal data worth $114 billion a year. By comparison, the FBI said the take from all bank robberies in the US in 2010 was just $43 million. The global market in cocaine is an estimated ...

Congress puts spy world on money diet
Chicago Daily Herald
Congress left alone plans for new hires in cybersecurity and counter-terror threat finance. One change in the new measure: Families of intelligence officers will get the same financial help for burial expenses as those of uniformed military, ...

State defense contractors had record revenue in '11; cuts loom
TheNewsTribune.com
... company is diversifying its production and seeking to control costs as it looks ahead to likely defense cuts. He said the company is looking to increase international sales while building up hot programs related to cyber-security and unmanned aircraft.

Smartphones offer easy access to malware purveyors
Herald Sun
AVG security adviser Michael McKinnon said far too few Australians were ensuring their cyber security was up to scratch before taking to social media in the search for new customers. "All organisations must equate online security with corporate ...

News briefs
Federal Times
DHS is likewise required to assign a director of cybersecurity coordination to work with DoD. Lord said the authority to conduct offensive operations is clearly directed at DoD, not DHS or the Intelligence Community. Negotiations over the first union ...

Free educational website promotes cyber security and Intellectual ...
By admin
MANILA, Philippines — It is often said that “the best things in life are free”. In today's digital world, so much knowledge and data are available at.
World ngayon

Are Privacy Concerns For New US Cyber Security Bill Warranted?
PolicyMic
proposed a new cyber security bill that would enable US intelligence agencies “[t]o provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cyber security entities, and for other ...

PolicyMic

Is 2012 the year we get serious about cybersecurity?
GCN.com
We are currently facing many, many challenges – from the federal deficit to energy policy to aging infrastructure to cybersecurity – where easy answers no longer suffice. In IT, we face daunting problems related to authoritative data sources, ...

Cybersecurity expert Richard Clarke lands new gig
FCW.com (blog)
Former presidential adviser Richard A. Clarke begins the new year as a member of Identive Group's board of directors, according to an Identive press release. Clarke most recently served as chairman of risk management firm Good Harbor Consulting, ...

Cyber threats in 2012: 5 pain points
GCN.com
The one bright spot in the forecast is that the barrage of high-profile attacks and breaches has givencybersecurity a higher priority, Ahamad said. “I think we are taking the risks seriously,” Ahamad said. “There is recognition of the problem and more ...

NIST plans $70M multi-award contract
Washington Technology
NIST is looking for multiple contractors to provide technical expertise and consultation in the areas ofcybersecurity and information security, according to the notice posted Dec. 23. The contract's purpose also is to ensure the Acquisition Management ...

IP Protection Bills Might Not Work as Intended
GovInfoSecurity.com
As a fellow in governance studies at Brookings, Friedman wrote a policy briefing -Cybersecurity in the Balance: Weighing the Risks of the Protect IP Act and the Stop Online Piracy Act - on how IP protection laws could endanger cyberspace security. ...

GovInfoSecurity.com

Homeland Security issues advisory to nation's critical infrastructure industry
Examiner.com
In November, Cyber security expert Joe Weiss published the details of an alleged cyber attack culminating in the "burn out of a water pump." after obtaining the “Public Water District Cyber Intrusion” report, released by the Illinois Statewide ...

US Marine from Laredo Explains His Role in Training and Educating Marines
Laredo Sun
As Academics Officer, I am responsible for overseeing course content development and review for nine entry-level, intermediate, and advanced courses in Computer and Information Technology Systems, Tactical Data Networking and Cybersecurity. ...

Laredo Sun

Countdown to Compliance
BankInfoSecurity.com
This week, Bill Wansley , a financial services risk management and cybersecurityconsultant at Booz Allen Hamilton, talked about how prepared US banks and credit unions are for conformance with updated online authentication issued in June by the ...

BankInfoSecurity.com

Study Shows Fraud Threat Remains Significant Deterrent to eCommerce via Social ...
Daily Deal Media
On Friday, the team at ThreatMetrix – a provider of integrated cyber security solutions – published the startling findings of a joint study with The Ponemon Institute. The “Mobile Payments & Online Shopping Survey of US Consumers” reveals that a large ...

'Cyberbegging' is a growing trend for the poor
Tbo.com
Cyber Security Analyst Mary J. McLaughlin of the Florida Department of Law Enforcement said this form of begging is legal. Going online to ask for money wasn't Hare's first step. Before she saved enough money to rent an apartment, she was on the ...

IEEE's Hans Karlsson Standards Award 2012 for Paul R. Croll
InfoQ.com
There he is in charge of research, development and deployment of practices in software engineering in general, and cybersecurity in particular. Croll has more than 35 years of experience in mission-critical systems and software engineering, ...

It's Christmas, you can't find your smartphone, where did you leave it?
BetaNews
US-CERT would like to encourage users to review the following US-CERT Cyber Security Tips. Following the security practices suggested in each tip will help to keep your portable devices secure during the holiday season and throughout the year. ...

BetaNews

Wikileaks, Patents, Cyber-Attacks Lead Week's Security News
eWeek
“I wish I could delight in the schadenfreude some must feel knowing that a lobbying group who openly opposed tightening cyber-security laws themselves became a poster child for one of the most high-profile intrusions in the news in 2011," Andrew Brandt ...

China, Russia and the new digital spy game
Washington Post (blog)
14 piece by Bloomberg reporters Michael Riley and John Walcott labeled it a “Cyber Cold War,” whilecybersecurity expert Richard Clarke, quoted in the piece, referred to Chinese actions as “using a vacuum cleaner to suck data out in terabytes and ...

Los Alamos National Lab, EMC Sign Research Deal
Albuquerque Journal (subscription)
By AP on Fri, Dec 23, 2011 at 11:24 am Tweet Under the agreement signed this week, Los Alamos and EMC will design and test new technologies in data storage, cyber security, and high-performance computing. The agreement also calls for them to ...

GOP presidential candidates' security advisors have ties to $40b in federal ...
Washington Post
Schneider also serves on the board of Falls Church, Virginia-based Defense Group Inc., whose focus includes intelligence research and analysis and cybersecurity. Defense Group has received about $208 million in contracts since 2008 from agencies that ...

The silent attackers...
Gulf Daily News
Creating cyber security awareness amongst children by schools and employees by their organisations is crucial to detect and prevent internal or external fraud and improve security, which will keep organisations and our society digitally secure. ...

Robert D. Vander Lugt, Director of Export Compliance, Northrop Grumman ...
PR.com (press release)
The firm's core competencies are aligned with the current and future needs of its customers and address emerging global security challenges in key areas, such as unmanned systems,cybersecurity, C4ISR, and logistics that are critical to the defense of ...

SSUET's technical sessions
The News International
... NY on “sensor network programming and applications”, Dr Muhammed Moinuddin from Iqra University on “collaborative spectrum sensing for cognitive radio networks”, Dr Jawwad Shamsi from SUNY Fredonia, NY on “understanding cyber security”, ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com