How Digital Detectives Deciphered Stuxnet

How Digital Detectives Deciphered Stuxnet – the Most Menacing ...
By tzink
How Digital Detectives Deciphered Stuxnet – the Most Menacing Malware in History. MSDN Blogs > Terry Zink's Cyber Security Blog > How Digital Detectives Deciphered Stuxnet – the Most Menacing Malware in History ...
Terry Zink's Cyber Security Blog
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History | Threat Level | Wired.com: "What the inspectors didn’t know was that the answer they were seeking was hidden all around them, buried in the disk space and memory of Natanz’s computers. Months earlier, in June 2009, someone had silently unleashed a sophisticated and destructive digital worm that had been slithering its way through computers in Iran with just one aim — to sabotage the country’s uranium enrichment program and prevent President Mahmoud Ahmadinejad from building a nuclear weapon."

Prevent Damage When Cybersecurity Is Breeched
MarketWatch (press release)
MILPITAS, Calif., Jan. 13, 2012 /PRNewswire via COMTEX/ -- The Washington Post recently reported that hackers successfully accessed control of a Springfield, Illinois water plant. The hackers did significant damage to equipment by cycling pumps on and ...

US Business Defenses Against Hackers Are Like the 'Maginot Line,' NSA Chief Says
Wall Street Journal (blog)
“We need to become more active in our defense,” said General Keith Alexander, the director of the National Security Agency, on Thursday at the Federal Bureau of Investigation's International Conference on Cyber Security. Gen. ...

GAO: DHS floods critical industries with irrelevant cybersecurity advice
ITworld.com
By Kevin Fogarty 1 comment January 12, 2012, 5:58 PM — The Department of Homeland security has responded so enthusiastically and uncritically to Presidential orders that it keep companies in the "critical infrastructure" informed of cybersecurity ...

2011 in Cybersecurity
SYS-CON Media (press release) (blog)
2011 was a watershed year for cybersecurity, but it was evolutionary rather than revolutionary. Political hacking, industrial skullduggery, drones gone wild, and mobile malware all made 2011 a year, to borrow CrucialPoint amigo Matt Devost's phrase ...

China Not Deterred By US Cybersecurity Plans
China Digital Times
China Defense Daily lays out some of the reasons why Chinese experts think deterrence is hard, or to be more specific, why the US military will have difficulty achieving its deterrence aims. First, though, the article addresses all the “advantages” the ...

China to further safeguard cyber security
People's Daily Online
By Zhang Xinxin (China Youth Daily) Cyber security is becoming an increasingly severe and complex issue in China, demanding better regulation of the Internet industry, Gao Xinmin, deputy director of the Internet Society of China, said at the China ...

BSA Details Cybersecurity Priorities In Letter To Senate
Dark Reading
Washington — January 12 — In a letter to the 100 members of the US Senate, the Business Software Alliance today recommended six key focus areas for legislation to comprehensively upgrade America's cybersecurity capabilities. “The growing volume and ...

As Cyber-Attack Threat Grows, Cybersecurity Industry Booms
BrainTrack
Welcome to the Collegiate Cyber Defense Competition (CCDC), where students compete in a "cyber-war game" scenario to help prepare them for work in the growing cybersecurity industry. Teams defend a fictitious company's network, while skilled ...

Lunarline to Exhibit at Defense and Technology Conference West 2012
MarketWatch (press release)
Lunarline will feature its certified training at the School of Cyber Security. Courses offered at the school cover DIACAP, DIARMF, FISMA/NIST RMF, CNSS/NIST RMF, and Security+, as well as disaster recovery, and cybersecurity fundamentals and tools. ...

Quarri(TM) Technologies Executive Chairman Bill Morrow Donates Cash and Stock ...
MarketWatch (press release)
Morrow, an alumnus of the UTSA College of Business, is a strong supporter of UTSA cyber securityand has a history of giving to the university, dating back to 2001. "UTSA is extremely grateful to business leaders like Bill Morrow who are providing the ...

Exclusive: State's John Streufert moving to DHS
FederalNewsRadio.com
By Jason Miller The Homeland Security named John Streufert as the new director of the NationalCybersecurity Division, according to an email obtained by Federal News Radio and confirmed by DHS as authentic. Streufert comes to DHS from the State ...

Cyber security panel: what's in store for 2012?
ABC Technology and Games
There are predictions that 2012 could be the biggest year yet for cyber crime: the number of threats are set to increase as hackers improve, and the rest of us struggle to keep pace. In recent times we've read about attacks on Iranian nuclear reactors, ...

NYU, Banks to Establish Cyber Security Center
eSecurity Planet
The plan is for banks to share information with the center, which will then analyze the data to look for suspicious activity. New York University's Polytechnic Institute is working with several leading US banks to create a center designed to detect ...

Microsoft preparing global real time cyber security intelligence feed
SmartCompany.com.au
The feed will distribute cyber security threat information collected by the company in real time to ISPs, business partners, emergency response teams and governments. The announcement was made by TJ Campana, from Microsoft's Digital Crimes Unit, ...

Pace Launches Cyber Institute
GovInfoSecurity.com
Credit Eligible New York's Pace University recently announced its new SeidenbergCyber Security Institute, which plans to leverage public-private partnerships - an ongoing challenge for educational institutions. How does the institute plan to help the ...

GovInfoSecurity.com

Government Turns Its Attention to Protecting the Power Grid
IT Business Edge (blog)
In its attempts to improve cybersecurity, the federal government announced this week a plan to better protect the power grid from a cyber attack. The new initiative, the Electric SectorCybersecurity Risk Maturity Model Pilot, is a joint effort between ...

Security trumps secrecy in cyber fight, prosecutor says
Reuters
Speaking at a cyber security conference in New York on Thursday, Manhattan US Attorney Preet Bharara said companies should trust in the discretion of prosecutors and the FBI and come forward with information about a security breach, rather than keep it ...

DNSSEC Adoption Needs to Grow to Secure Core Internet, Protocols
eWeek
NEW YORK — Internet stakeholders need to move forward with securing the core infrastructure by adopting DNSSEC, a security expert said at the International Conference for Cyber-Security. DNSSEC, or Domain Name System Security Extension, does not solve ...

Draft cyber bill gives DHS controversial authorities
FederalNewsRadio.com
By Jason Miller The draft version of the comprehensive cybersecurity bill could give the Homeland Security Department the ability to take "any lawful action" against contractors if their systems are under attack. Bob Dix, a former staff director for ...

Microsoft is preparing a real-time threat feed
Inquirer
TJ Campana, a senior program manager in Microsoft's digital crimes unit described the system at the International Conference on Cyber Security as a 70 node cluster running the Apache Hadoop framework on top of Windows Server. Although this feed won't ...

Internet piracy bill divides industries
Bend Bulletin
Darrell Issa, R-Calif., the chairman of the House Oversight and Government Reform Committee, has scheduled a hearing for next Wednesday in which cybersecurity experts and technology entrepreneurs will testify. “An open Internet is crucial to American ...

City of Sarasota emails secretly deleted, tech says
Sarasota Herald-Tribune
6 meeting at CIty Hall, City Manager Bob Bartolotta, center, listens as John Jorgensen, of SylintCyber Security, Intelligence & Analysis, lower left, presents findings on a review of city computers and deleted emails during a City Commission special ...

US, Russia arms negotiators plan stability talks
Chicago Tribune
WASHINGTON (Reuters) - US and Russian negotiators will hold talks this year on issues ranging from missile defense to cyber security, hoping to set the stage for a renewed arms control push once elections are over in both countries, the top US arms ...

FBI Exec. Asst. Dir. Warns of Dangers Online
ticklethewire.com
Shawn Henry, executive assistant director of the FBI, had some dire warnings for attendants of the International Conference on Cyber Security, in New York, the Huffington Post reported on Thursday. Criminal hackers pose risk that are ”existential,...

ticklethewire.com

Project to make Qatar 'botnet free'
Gulf Times
“Partnerships have been established with service providers in this regard,” explained Khalid Sadiq al-Hashmi, executive director of Cyber Security at ictQATAR, in his welcome address at the event attended by various stakeholders. ...

Gulf Times

Cyber attacks among biggest threat to global stability: WEF
Times of India
The report, which foresees business risk in the upcoming ten years, pointed out that it is difficult to ensure cyber security taking into account the speed of technological developments. The UK has already taken an initiative to ensure cyber security, ...

Cyber-Crimes Pose 'Existential' Threat, FBI Warns
Huffington Post
If hackers were able to tamper with critical infrastructure such as the power grid, "it could actually cause death," Henry said in remarks at the International Conference on Cyber Security in New York. To highlight the growing threat, ...

Obama Assigns “CyberSecurity” to Commerce Dept.
By MG
STANFORD, Calif.--President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID.
DarkGovernment

China to further safeguard cyber security – People's Daily Online ...
By Blackmere
Cyber security is becoming an increasingly severe and complex issue in China, demanding better regulation of the Internet industry, Gao Xinmin, deputy director of the Internet Society of China, said at the China Internet Industry Annual ...
Blackmere Consulting

Prevent Damage When Cybersecurity Is Breeched - from ITbriefing.net
Prevent Damage When Cybersecurity Is Breeched.
ITbriefing.net

Cyber Security Awareness: Make Security The Entire Department's ...
By Lee
For a lot of people, the inner workings of a computer are very boring. And when you start to talk about computer security for them it gets even worse. The best way to be able to hold their attention is to show them how an attack would affect them ...
Security FAQs

Even experts use bad passwords - Terry Zink's Cyber Security Blog ...
By tzink
A blog about fighting spam and malware by a member of Microsoft Forefront Online Security anti-spam team.
MSDN Blogs

2012 Resolution: A Healthy Computer! | Blog Central
By Tracy Mooney
About Me. Tracy Mooney Chief Cyber Security Mom Tracy, a mother of three from a Chicago, Illinois suburb, is a regular mom with the same ... Read More. Feeds & Podcasts. Consumer Blog Feeds · Corporate Blog Feeds · Enterprise Blog ...
Blog Central » Cyber Security Mom

QuarriTM Technologies Executive Chairman Bill Morrow Donates ...
Morrow, an alumnus of the UTSA College of Business, is a strong supporter of UTSA cyber securityand has a history of giving to the university, dating back to 2001. “The researchers in UTSA College of Business are some of the best in the ...
Enterprise Communications and...

US military increases cyber security - Military & Aerospace Electronics
NASHUA, N.H., Jan. 9, 2012. This week on the Military and Aerospace Electronics Report, Skyler Frink reports on the U.S. Army's new cyber brigade and the ...
www.militaryaerospace.com/.../us-military-increases-cyber-sec...

The Blog @ Homeland Security: Make Cybersecurity Part of Your ...
Posted by Stop. Think. Connect. If you're still looking for a New Year's resolution, it's not too late to join the Stop.Think.Connect.™ C...
blog.dhs.gov/.../make-cybersecurity-part-of-your-2012.html

Building Cyber-security into Your Organization: Eliminating the “D ...
The title was “Closing the Cyber-Security Skills Gap.” [1] Data privacy is ... Tags: breach consumer privacy cyber risk cybersecurity data breach privacy security ...
www2.idexpertscorp.com/.../building-cyber-security-into-your...

Automating Cybersecurity: Scoping The Problem | The State of ...
A rough scope of the problems we face when considering automation of cybersecurity process. The people, processes, and space of automating cybersecurity.
www.tripwire.com/.../automating-cybersecurity-scoping-the-pr...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com