What You Need To Know About Senate Cybersecurity Bill

What You Need To Know About The Senate Cybersecurity Bill
Fast Company
As currently written, the bill merely defines “critical Internet infrastructure” as anything “whose disruption from a cyber attack would cause mass death, evacuation, or major damage to the economy, national security, or daily life.

Fast Company 

White House, NSA weigh cybersecurity, personal privacy
Washington Post
The debate, which is surfacing as Congress considers landmark cyber-legislation, turns on what means are necessary and appropriate to protect vital private-sector systems from attack by China, Russia or other potential adversaries.

Cyber Legislation Will Cost Businesses and Hurt Economy
Forbes
Intended to help protect the nation against a major cyber attack by improving the security and resiliency of the computer systems of critical infrastructure companies, the Cybersecurity Act of 2012 (S. 2105) actually would put a federal agent inside ...

Cyber threats a game changer for the FBI
Computerworld
By Wayne Rash CSO - You know by now that cyber attacks are a growing threat to US government data facilities, critical infrastructure and American businesses. Thursday at RSA Conference 2012, FBI Director Robert Mueller will explain how the threat has ...

Invincea Addresses Evolving Spear Phishing Threat for Cyber Attacks With ...
MarketWatch (press release)
FAIRFAX, VA and SAN FRANCISCO, CA, Feb 28, 2012 (MARKETWIRE via COMTEX) -- Invincea, Inc., an innovator in advanced malware threat detection, end-user threat protection, and pre-breach forensic analysis, announced today at the RSA 2012 Security ...

Narus Cyber Survey: Situational Awareness Essential to Protect Critical ...
MarketWatch (press release)
SAN FRANCISCO, CA and SUNNYVALE, CA, Feb 28, 2012 (MARKETWIRE via COMTEX) -- RSA CONFERENCE -- Narus, Inc., the leader in real-time network traffic intelligence and analytics, today announced the results of its annual cyber security survey.

RSA Conference 2012: Cyber threats a game changer for the FBI
CSO
The rising tide of cyber threats has caused the FBI to change how it operates, FBI Director Robert Mueller will tell RSA Conference attendees Thursday. By Wayne Rash SAN FRANCISCO -- You know by now that cyber attacks are a growing threat to US ...

Cyber security expert finds new flaw in smartphones
SecurityInfoWatch
29 at the RSA conference in San Francisco, an annual cyber security gathering. The Shady Ratattack he disclosed last year targeted 72 government and corporate entities for as long as five years, siphoning off unknown volumes of confidential material ...

Anonymous, joining Wikileaks, hacks into the big time
GlobalPost (blog)
The US Senate too has taken notice and is debating passage of a bill known as the Cyber Security Act, which was introduced by Sen. Joe Lieberaman and aims to protect US infrastructure — like the power grid — against a cyber attack.

Cyber Pro Shortage Extends to Private Sector
Nextgov
For example, 79 percent of hiring managers globally said it was somewhat or very difficult to find qualified cybersecurity professionals, while 83 percent of federal hiring managers said cyberhiring was somewhat or very difficult. At the same time, ...

Cyber-security startup to flash major Android soft spots at RSA
Register
By Anna Leach • Get more from this author Three big-hitters in the world of cyber security have launched a firm that intends to unmask hackers and their motives, and they've scooped up $26m to get it started. As one of its first acts, CrowdStrike plans ...

Report: NATO needs more cyber capabilities
Nextgov
The Wall Street Journal and Washington Post reported on Monday that the National SecurityAgency has pushed for greater cybersecurity authority but has been rebuffed by the White House over privacy concerns. In 2002, NATO started a cyberdefense program ...

VP Binay pushes public-private partnership vs cybercrime
GMA News
Vice President Jejomar Binay on Monday pushed for a public-private partnership (PPP) approach to fight cyber-attacks and promote cyber-security, especially in the financial services sector. Speaking at a forum on cybersecurity, Binay said government ...

Treadstone 71 Announces Certified Cyber Intel and CounterIntel Analyst Boot Camps
Send2Press Newswire (press release)
The Cyber Intelligence Analyst and the Cyber Counterintelligence (CI) Analyst Certifications focus upon real world, practical activities coupled with theory. The certifications enhance the overall cybersecurity posture of the United States by ...

Send2Press Newswire (press release)

KEYW and Sensage Join Forces to Create Mission-Grade Cyber Intelligence Service
MarketWatch (press release)
HANOVER, Md., Feb 27, 2012 (GlobeNewswire via COMTEX) -- KEYW and Sensage, two leaders in security intelligence, today announced a strategic technology alliance to deliver "mission-grade" cyber intelligence services to commercial enterprises and ...

Cyber Warfare: The War Of Words
Science 2.0
Yet those ailments, unlike past examples of cyber "war," actually do kill people." No matter how many times I read that paragraph I still can't figure out what he's trying to say. I find the idea that only physical violence represents an act of war to ...

US SHOULD NOT FOLLOW CHINA'S EXAMPLE IN MERGING CYBER AND ELECTRONICWARFARE ...
Military & Aerospace Electronics
On November 14, Defense News ran an interesting story by Asia correspondent Wendell Minnick about how the General Staff of China's People's Liberation Army (PLA) manages cyber warfareactivities. Minnick quoted Australian security expert Desmond Ball ...

Guidance Software And FireEye Ally To Eliminate Advanced Malware
MarketWatch (press release)
"Determined hackers, hacktivists and cyber criminals have learned to evade traditional signature and policy-based approaches and the result is that the risk of data loss is higher than ever," said Alex Andrianopoulos, Guidance Software vice president ...

Sony Introduces Versatile New Lineup of Cyber-shot Cameras
Sacramento Bee
27, 2012 /PRNewswire/ -- With the ability to deliver impressive, high-resolution images while underwater, outside or inside, during both day and night, Sony's slim new line of Cyber-shots represent the ultimate in versatility for the compact camera ...

West Coast Labs and Spirent Collaborate to Define Cyber Security Test Methodology
MarketWatch (press release)
The increase in the number of cyber-attacks highlights the devastating effects they can have on revenue due to stolen assets, damage control, lost productivity and reduced brand confidence. With the migration to cloud computing, security becomes even ...

Senate considers Cybersecurity Act of 2012 (with related video)
Urgent Communications
has been pressing his colleagues to approve the Cybersecurity Act of 2012, a bill that would give the DHS regulatory authority over companies with computer systems crucial to the nation's economic and physical security. “The threat posed by cyber ...

Cyber Attacks: Not If or When, But Now
GovInfoSecurity.com
Credit Eligible No one - not even a security vendor - is immune to cyberattacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza. In an interview in advance ...

GovInfoSecurity.com

Get Closer to The Action With New High-Zoom Sony Cyber-shot Cameras
Sacramento Bee
27, 2012 /PRNewswire/ -- Sony's new "H-Series" high-zoom Cyber-shot cameras make it easy to capture crisp, beautiful photos and HD videos from a variety of distances. Ideal for travel photography or simply capturing everyday content, ...

DARPA, MIT Research A Self-Healing Cloud
InformationWeek
Researchers aim to develop a cloud computing environment that could immediately recognize and fend off a cyber attack, much like the human body fights a virus. By Elizabeth Montalbano InformationWeek The Department of Defense (DoD) is funding research ...

An ISO27001-compliant ISMS helps combat cybercrime
EIN News (press release)
/EINPresswire.com/ IT Governance Ltd, the global leader in ISO27001 and cybersecurityinformation, books and tools, warns that cyber attacks could be the largest threat to businesses this year. It is a mandatory requirement for UK public sector ...

A Good Solid Model For Cyber Security | SocInfo2011.org
By mitchell
The main discrepancies between national, corporate and data cyber security then lie.in the condition of network security plus attack prevention applications applied. This is why it's fundamental that Nigeria builds its capability since the future wars could be fought differently. But if we don't have a plan, this is time to develop a good cyber security plus warfare roadmap that may ensure that all of our national prosperity is definitely secured. A quantity of the traits as well as strength threats ...
SocInfo2011.org

ACUS Event on NATO's Role in Cyber Security « Marvin Ammori
By Luke Pelican
Participants included IBM's NATO and European Defence Leader Leendert Van Bochoven, IBM's Vice President Security Counsel & Chief Privacy Officer Harriet P. Pearson, and the Director of the Atlantic Council's Cyber Statecraft Initiative, Jason ... Bochoven provided a brief introduction in which he noted that cybersecurity is one of NATO's top priorities, and that as member states continue to connect information systems to industrial systems and other platforms, we must be able to ...
Marvin Ammori

Join me for the IRMI Cyber & Privacy Risk Conference. « Corporate ...
By Scott Godes
IRMI Cyber & Privacy Risk Conference. Mark your calendar to join us in Baltimore, MD on May 16-17, 2012. Noted cybersecurity, homeland and national security expert Richard A. Clarke will deliver the keynote address. Discussing the last ...
Corporate Insurance Blog

Anonymous, joining Wikileaks, hacks into the big time | iPolitics
By GlobalPost
The U.S. Senate too has taken notice and is debating passage of a bill known as the Cyber Security Act, which was introduced by Sen. Joe Lieberaman and aims to protect U.S. infrastructure — like the power grid — against a cyber attack.
iPolitics

U.S. should not follow China to develop Cyber and Electronic Warfare
By admin
Minnick quoted Australian security expert Desmond Ball as speculating that the General Staff may have merged its offensive cyber and electronic warfare activities into an "integrated network electronic warfare" directorate within the General Staff's Fourth Department. If this sounds too arcane to matter, guess again: the way major military powers organize their network defense, exploitation and attack efforts could decide the outcome of the next big global conflict. Let's assume for the ...
China Military Power Mashup

Shadow Warrior: san jose merc news: how hacker group ...
By nizhal yoddha
The Times article detailed a cyber-attack by Anonymous, which has lashed out with attacks on a number of companies and government agencies over the past year, on the Vatican web site last August. The article, drawing upon reports from Redwood City online security company Imperva, describes Operation Pharisee, an unsuccessful denial-of-service attack organized in Latin America intended to protest the Catholic Church's ongoing child sexual abuse scandal. The Imperva report ...
Shadow Warrior

Activist Post: Official List Of Words Feds Monitor On Social ...
By Activist
Cyber security. Botnet DDOS (dedicated denial of service) Denial of service. Malware Virus Trojan Keylogger Cyber Command, 2600. Spammer Phishing Rootkit Phreaking Cain and abel. Brute forcing. Mysql injection. Cyber attack. Cyber ...
Activist Post

A self-healing cloud | Machines Like Us
By NLN
Researchers aim to develop a cloud computing environment that could immediately recognize and fend off a cyber attack, much like the human body fights a virus. The Department of Defense (DoD) is funding research to create a cloud ...
Top stories

Kaspersky Tablet Security Adds Anti-Theft Protection for Android ...
Cybercriminals have quickly adapted to this change in consumer computing, and are rapidly developing cyber-attacks for these favored devices, tweaking their attack methods to target tablet users. In addition, tablets are made to be small and ...
Virtual-Strategy Magazine - Your...

House looks at cybersecurity of electrical grid | Cyber Warzone
The Senate is preparing to vote on a cybersecurity bill that would give the Homeland SecurityDepartment regulatory authority over companies with computer ...
www.cyberwarzone.com/.../house-looks-cybersecurity-electric...

Government Warns of Cyber Attack to U.S. Power Grid - Fox ...
Cyber security expert Robert Siciliano on government efforts to protect the U.S. power grid from potential cyber attacks. You must have JavaScript enabled to ...
video.foxbusiness.com/.../government-warns-of-cyber-attack-t...

Senators sharply divided over bill to regulate cybersecurity ...
Don't miss the latest federal reports on cyber security threats. Find the latest news at FederalTimes.com.
www.federaltimes.com/article/20120217/IT01/202170301/

Cybersecurity Act of 2012 - Cybersecurity Collides with Risk
Cybersecurity Act of 2012 - Cybersecurity Collides with Risk This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, ...
infosecisland.com/.../20400-Cybersecurity-Act-of-2012-Cyber...

China Cyber Attack Threat « China Cyber Warfare Blog
Two recent NPR stories highlighted the continuing potential for cyber attacks. One focused on the threat that China poses and the other story on what we should ...
chinacyberwarfare.wordpress.com/.../china-cyber-attack-threat...

Michael Chertoff, Mike McConnell Discuss Cybersecurity Bill | C-SPAN
The Cybersecurity Act of 2012 is bipartisan legislation that would give the Homeland SecurityDepartment power to identify vulnerabilities in critical infrastructure ...
www.c-span.org/Events/Michael-Chertoff.../10737428454/

Cybersecurity and U.S.-China Relations - Brookings Institution
Kenneth Lieberthal and Peter Singer say the U.S.-China relationship is perhaps the most significant to the future of world politics. Lieberthal and Singer argue ...
www.brookings.edu/.../0223_cybersecurity_china_us_singer_l...

US in new cybersecurity push | Bangkok Post: breakingnews
US senators, warning of potentially catastrophic cyberattacks, introduced a bill Tuesday aimed at protecting critical infrastructure such as power, water and ...
www.bangkokpost.com/.../us-senate-in-new-cybersecurity-pus...

Greek teen arrested over ministry cyber attack - Yahoo! News
From Yahoo! News: Greek police said Monday they had arrested an 18-year-old suspected of hacking into the justice ministry's website earlier this month, ...
news.yahoo.com/greek-teen-arrested-over-ministry-cyber-atta...

Cybersecurity Act of 2012 (Proposed) - Council on Foreign Relations
The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012. The summary states, " Directs ...
www.cfr.org/cybersecurity/cybersecurity-act-2012.../p27479

When is a cyberattack a matter of defense?
Washington Post (blog)
But interviews and documents make clear that agency officials felt the scaling back of the authority to monitor for cyber threats and to push out countermeasures to industry was of great concern. It's unclear what kind countermeasures the NSA would ...

Department of Homeland Security's List of Watched Words on Social ...
By thegift73
The DHS monitor people's social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI). I have copied the search terms for Cyber Security below. Cyber Security. Cyber security; Botnet; DDoS (dedicated denial of service) ...
TechFleece

In Attack on Vatican Website, a Glimpse of Hackers' Tactics

In Attack on Vatican Website, a Glimpse of Hackers' Tactics
CNBC.com
The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony The attack, albeit an unsuccessful one, provides a rare glimpse into the recruiting, reconnaissance, and warfare tactics used by the ... The group’s attack on the Vatican was confirmed by the hackers and is detailed in a report that Imperva a computer security company based in Redwood City, Calif., plans to release ahead of a computer security conference here this week. It may be the first end-to-end record of a full Anonymous attack. . . .Their goal — according to YouTube messages delivered by an Anonymous figure in a Guy Fawkes mask — was to disrupt the event and draw attention to child sexual abuse by priests, among other issues. . . .

CNBC.com

Beware the Morphing Flashback Malware
TidBITS
by Adam C. Engst As TidBITS Security Editor Rich Mogull wrote in “Gatekeeper Slams the Door on Mac Malware Epidemics” (16 February 2012), the most significant security hole on the Mac stems from users being tricked into installing something malicious, ...

WikiLeaks Partners with Anonymous to Spill Millions of Security Firm's E-mails
New York Magazine
By Brett Smiley WikiLeaks is back at it, this time and for the first time with the assistance of global hacker group Anonymous. On Monday, the whistle-blowinggroup led by 40-year-old Australian Julian Assange began to release "millions" of e-mails ...

New York Magazine

New OS X malware variant attacks unpatched Macs
ZDNet (blog)
By Adrian Kingsley-Hughes | February 27, 2012, 4:13am PST Summary: A new malware variant sets out to punish those who haven't been keeping up to date with updates. Patching OS X is so simple, but yet there are people who still put it off.

Qualys Launches Enterprise Edition of Malware Detection Service
MarketWatch (press release)
Delivered as part of the QualysGuard Cloud Platform and suite of integrated applications for security and compliance, the new Enterprise Edition of the QualysGuard Malware Detection Service allows businesses to proactively scan their web properties for ...

Glimmerglass Showcases Cyber Security Solutions at RSA Conference 2012
SunHerald.com
The RSA Conference is a gathering of information security experts that meet, discuss, and share current challenges and accomplishments facing cyber security. The CyberSweep platform enables the dynamic selection of optical signal sources, ...

Android malware spreads via Facebook app
IBNLive.com
Android recently implemented a new program, called Bouncer to help keep malware off the Market, but it seems that there are some scammers who have found a way around the program, nevertheless. Security firm, Sophos have reported that there is malware ...

Netronome Enhances SSL Offering for Cyber Security Applications
MarketWatch (press release)
Netronome's flow processing solutions enable cyber security OEMs to offer high-density 1, 10 and 40 gigabit Ethernet network designs, supporting up to 100 Gbps of application performance. Over 56 billion instructions per second ensure that every ...

CrowdStrike CEO to reveal 'major mobile vulnerability' at RSA
Computerworld
By Wayne Rash CSO - A significant vulnerability affecting all versions of the Webkit mobile browser could give malware complete control of your phone. The malware could listen in on your conversations, view through your camera and record everything in ...

Harris Corporation to Discontinue Cyber Hosting Operation; Will Continue ...
MarketWatch (press release)
The company determined that although demand continues for cyber security and cloud-enabled solutions, its government and commercial customers currently prefer hosting mission-critical information on their own premises rather than remotely.

Android drive-by download attack via phishing SMS
ZDNet (blog)
By Ryan Naraine | February 27, 2012, 7:29am PST Summary: A new security start-up focused on helping businesses deal with targeted attacks plans to showcase a drive-by download that plans malware silently on Android smart phones.

Kenya signs MoU to boost cyber-security
Daily Nation
By NATION CORRESPONDENT Kenya has signed a deal with a United Nations agency to boost the country's efforts in enhancing cyber-security. In a memorandum of understanding signed in Geneva last week by the International Telecommunication Union (ITU) and ...

eMudhra to address online security issues in India and Mauritius
India Education Diary
Online security is a major concern in the present scenario. We are constantly working on addressing the security issues and I am sure, this tie-up with Watchdata will help us in significantly increasing the security levels in online banking", ...

Commtouch Launches Enhanced Antivirus for Email Solution
MarketWatch (press release)
27, 2012 /PRNewswire via COMTEX/ -- RSA Conference -- Commtouch® (UTD:CTCH) today announced the availability of its enhanced Antivirus for Email solution which uses a unique dual-detection approach to ensure malware identification from the zero-hour of ...

Hacker 'Codeine' is a headache for town council
Herts and Essex Observer
BISHOP'S Stortford Town Council has denied a computer hacker's claims that its website is vulnerable to cyber-attacks. The anonymous keyboard warrior, who goes by the nickname Codeine, claims to have broken into the server where the authority's site is ...

Herts and Essex Observer

Hacker cracks into Nigerian Twitter accounts
IT News Africa
The hacker is already tweeting from the Highlife singer's account @FLAVOURNABANIA and has promised to hack the accounts of D'banj, Donjazzy, Tuface, Wizkid and Banky as well as other celebrity Twitter and Facebook accounts he claims to have access to.

Flashback.G malware makes mark on Macs
SC Magazine Australia
It exploits holes in Java vulnerabilities to install the malware on a user's mac computer. In the event the user has up-to-date Java settings, the malware masks its installation using a social engineering trick, appearing as a digital certificate from ...

NoTW hacker 'had US numbers in files'
Irish Independent
By Mark Hughes in London AMERICAN telephone numbers have been discovered in the files of Glenn Mulcaire, the private investigator who was jailed for hacking voicemails on behalf of the 'News of the World', it has been claimed. Scotland Yard detectives ...

Kindsight Unveils Security Platform to Boost Mobile Operator Security Services
MarketWatch (press release)
The new offering combines network-based malware detection with a mobile device security app that scans for malicious software before it can be installed. With Kindsight Mobile Security, mobile operators are able to offer a value-added security service ...

Kim Dotcom: Hacker Extraordinaire or Degenerate?
Daily Deal Media
Kim Schmitz, began his cyber career in 1992, when there was little information about cyber security and even experts were essentially groping in the dark. He was interviewed by Forbes, on a story on Cyber crime back then. He used the lack of knowledge ...

Daily Deal Media

AhnLab Unveils Anti-APT Solution with Innovative Threat Prevention Technology
MarketWatch (press release)
AhnLab TrusWatcher allows organizations to protect their IT systems and digital assets against APT attacks, employs an automated diagnostic feature that analyzes all executable files, and executes them on virtual machines to determine unknown malware ...

Panda Cloud Antivirus 1.5.2 improves on-demand scanning speed
BetaNews
Panda Cloud Antivirus is designed to minimize its impact on system resources by tapping into cloud-based processing power to do much of the security tool's leg work in analyzing, blocking and attempting to remove malware infections.

BetaNews

I Hope We're Hacking China And Russia, Too
InformationWeek
It's been many years that we've been hearing how Chinese hacker groups, perhaps connected with their government, have been hacking into US government and industrial systems. To a lesser extent the same is true of Russian hackers, who have battle-tested ...

Are you a cyber sleuth? Test your malware IQ
InfoWorld (blog)
By Woody Leonhard Malware comes in many guises. For most people it's a constant source of irritation. But for security mavens, the malware world offers all sorts of fascinating nooks and crannies -- charlatans and characters, flashes of brilliance, ...

Qualys Introduces New Services and Major Technological Innovations to Its ...
MarketWatch (press release)
Malware Detection Service, Enterprise Edition. Built on the popular free Malware Detection service, the enterprise version will allow customers to track malware on multiple web sites with advanced reporting and notification options.

UWO election hacker facing criminal charges
Varsity
By Mohammad Arshad The hacker who disrupted the University of Western Ontario's (UWO) student union elections will be criminally charged, the university's campus police have confirmed to The Gazette. Alumnus Keith Horwood admitted to hacking the ...

Compromised websites from a site owner's perspective
Help Net Security
... able to compromise legitimate websites without the site owners' knowledge: over 90% of respondents didn't notice any strange activity, despite the fact that their sites were being abused to send spam, host phishing pages, or distributemalware.

Help Net Security

extreme geekboy: Malware and Phishing Protection in Firefox
By Sid Stamm
For a while, Firefox has included malware and phishing protection to keep our users safe on the web. Recently, Gian-Carlo Pascutto made some significant improvements to our Firefox support for the feature, resulting in much more efficient ...
extreme geekboy

Twitter Hacker Targets Flavour, D'Banj, Don Jazzy, Wizkid, Others ...
By NET
By Osagie Alonge If last night's threats are anything to go by, then celebrities using social networks like Twitter need to be very worried. Big names.
Sturvs

SyScan, a true blue hacker conference, 8th edition in Singapore in ...
By Malgorzata
SyScan, a true blue hacker conference, will be running its 8th edition in Singapore in April 2012. Known for its deep knowledge technical tracks, SyScan'12 | SyScan, a true blue hackerconference, 8th edition in Singapore in April 2012.
PenTest Magazine

r00tw0rm leak United Nations Environment ... - The Hacker News
By THN Reporter
r00tw0rm leak United Nations Environment Programme database. THN Magazine and TheHacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, ...
The Hacker News [ THN ] - Updates...

Joel Grus » Hacking Hacker News
Hacker News, if you don't know it, is an aggregator / forum attached to Y Combinator. People submit links to news stories and blog posts, questions, examples, ...
joelgrus.com/2012/02/16/hacking-hacker-news/

Q&A: Hacker Historian George Dyson Sits Down With Wired's Kevin ...
George Dyson talks to Wired/cite> about the big bang of the digital universe and his new book, Turing's Cathedral.
www.wired.com/magazine/2012/02/ff_dysonqa/all/1

Hacker jailed for 'extensive' Facebook breach - Technology ...
A British student, who hacked into Facebook's internal network risking "disastrous " consequences for the website, was jailed for eight months on Friday in what ...
www.msnbc.msn.com/.../brit-hacker-jail-extensive-facebook-b...

News Corp. Hacker Said to Have U.S. Phone Numbers in His Notes ...
The former News Corp. private detective who hacked phones for the News of the World had U.S. telephone numbers among the details of British hacking victims ...
www.businessweek.com/.../news-corp-hacker-said-to-have-u-s...

avast! blog » Standard hacker tactics after Whitney Houston's death
There seems to be a playbook of standard hacker tactics after a celebrity death or an event of worldwide interest like earthquakes or tsunamis. Hours after the ...
https://blog.avast.com/2012/02/16/standard-hacker-tactics/

CIA Hunts For Malware In Binary Code - Government - Security ...
Although binary analysis tools like the company offers are widely used to find any strange code coming into the enterprise, most look for malware by identifying ...
www.informationweek.com/news/government/.../232601019

Mobile malware on the rise, McAfee Q4 Threats Report | The Hacker ...
THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking ...
thehackernews.com/.../mobile-malware-on-rise-mcafee-q4.htm...

National Security Association calls hacktivist group 'Anonymous' a threat to ...
Public Radio International PRI
The hacker group Anonymous uses the Guy Fawkes mask as their logo.The NSA has warned that the hacker roup Anonymous may pose a threat to national security. (From Anroir on Flickr/flickr) In Anonymous's move away from denial of service attacks and ...

WikiLeaks Tightens Ties To Anonymous In Leak Of Stratfor Emails
Forbes
WikiLeaks founder Julian Assange wearing Anonymous' iconic Guy Fawkes mask at a London protest last October. The leaderless collective Anonymous once acted as WikiLeaks' vigilante avenger, attacking the secret-spilling group's enemies while WikiLeaks ...

Forbes

WikiLeaks publishes 5m sensitive emails stolen by Anonymous hacking group
Daily Mail
WikiLeaks did not say how it acquired access to the vast haul of internal and external correspondence of the Austin, Texas company, formally known as Strategic Forecasting Inc. But Hackers linked to the loosely organized Anonymous hackersgroup said at ...

Daily Mail

Anonymous splinter group AntiSec wages war on 'profiteering gluttons'
The Guardian
At the same time, however, an aggressive and volatile faction within Anonymous has also flourished – and that is causing a degree of internal division. Made up of a small highly skilled hacker team which carries out attacks under the name Operation ...

The Guardian

WikiLeaks publishes 5 mn emails from thinktank Stratfor
TwoCircles.net
The messages were reportedly stolen by hacker group Anonymous. The emails could unmask the US firm's "sensitive sources" and "throw light on the murky world of intelligence-gathering", the Daily Mail reported. Stratfor said the release of its stolen ...

WikiLeaks publishes e-mails from Stratfor intelligence firm
Washington Post
The e-mails, which members of Anonymous claim to have obtained in December, date from July 2004 to December 2011, according to a press release from WikiLeaks. The group claims the e-mails reveal information about what it called the US government's ...

Wikileaks Pairs with Anonymous to Publish Intelligence Firm's Dirty Laundry
Wired News (blog)
By Quinn Norton In an unprecedented collaboration between Anonymous and WikiLeaks, the secret spilling site began leaking Sunday night portions of a massive trove of e-mails from the private intelligence firm Stratfor that Anonymous obtained by hacking ...

The Week | Hacker group Anonymous could cause power outage in ...
Washington: Hacker group Anonymous within the next year or two could bring about a limited power outage in...
www.manoramaonline.com/.../theWeekContent.do?...

Hacker group Anonymous claims hit on FBI partner site
Hackers claiming allegiance to the loose-knit Anonymous movement have claimed responsibility for vandalizing an Ohio FBI partner website.
www.it-networks.org/.../hacker-group-anonymous-claims-hit-...

LiveLeak.com - Anonymous group hacks Ontario police chiefs site
Anonymous group hacks Ontario Police Chiefs website as federal government's proposed ...
www.liveleak.com/view?i=211_1330280896

Cybersecurity 2.0

Cybersecurity 2.0
Wall Street Journal
The Cybersecurity Act of 2012, introduced by Sen. Joe Lieberman, ran into trouble by trying to set new rules on how companies would monitor cyber security. A regulatory approach is flawed because types of cyber attack change faster than regulations can ...

DARPA releases formal solicitation for HACMS cyber security initiative for...
Military & Aerospace Electronics
Earlier in the week, DARPA conducted its first industry briefings on the HACMS military cyber security program, which aims to develop a set of publicly available tools to help build embedded computing for high-assurance military vehicles with onboard ...

Military & Aerospace Electronics

Android bug opens devices to external control: experts
Technology Spectator
Cybersecurity experts have uncovered a flaw in a component of the operating system of Google Inc's widely used Android smartphone that they say hackers can exploit to gain control of the devices. Researchers at startup cybersecurity firm CrowdStrike ...

Android bug opens devices to outside control: experts
CIOL
BOSTON, USA: Cybersecurity experts have uncovered a flaw in a component of the operating system of Google Inc's widely used Android smartphone that they say hackers can exploit to gain control of the devices. Researchers at startup cybersecurity firm ...

When Do Social Networks Become a Burden?
Government Technology (blog)
... Intranet sites at work, online magazine communities, professional association portals, security and technology topical sites (like 'mobile security' or 'cybersecurity for government cloud computing' within sites like LinkedIn) and so many more.

News Digest: Feb. 27
Federal Times
The federal government, in partnership with the state of Maryland and Montgomery County, Md., will launch a National Cybersecurity Center of Excellence that aims to speed industry's development of secure information technology products.

Community - West County
Annapolis Capital
AP VIDEO more>> As an array of defense programs face significant cuts, the cyber security agencies at Fort Meade will likely see a modest increase in funding in the next fiscal year, director of the University of Maryland's Center for Public Policy and ...

Annapolis Capital

After big tech firms, cyber attackers target small companies
Times of India
SMEs are being targeted by cyber attackers on a regular basis, said cyber securityexpert Anshul Abhang. "The reason is that non-IT SMEs do not have much investment in IT security infrastructure or solutions. Also, they are not fully aware of the ...

Can we guard against cyber-attacks?
Dailyrecord.com
“If everything went through a firewall it would be easy,” said Joe Weiss, a blogger oncyber security and industrial control systems as well as a consultant to utilities. A refinery, power plant, or a water treatment plant has thousands of sensors, ...

ITU to Support Kenya Cybersecurity Efforts By Rebecca Wanjiku
By admin
February 23, 2012 — The International Telecommunication Union has announced that it will support Kenya's cybersecurity efforts through budgetary support and personnel. In a Memorandum of Understanding signed in Geneva by the ITU ...
KICTANET

Cybersecurity Hype | Cato @ Liberty
The approving response of an IT security professional last week pointed me to a story about cybersecurity in which I'm featured. The story and accompanying ...
www.cato-at-liberty.org/cybersecurity-hype/

NIST Establishes National Cybersecurity Center of Excellence
NIST Establishes National Cybersecurity Center of Excellence. ... “With our focus on K-12 STEM education, cyber-security specialties in higher education, and ...
www.nist.gov/itl/csd/nccoe-022112.cfm

Does The Cybersecurity Act Of 2012 Mark The Beginning Of The ...
Is Anonymous the next Al Qaeda? The Cybersecurity Act of 2012 is the latest effort by Congress to do something about the threat of cyber attacks and cyber ...
www.forbes.com/.../does-the-cybersecurity-act-of-2012-mark-...

Cyber security – A growing threat and a business opportunity ...
The Long Island Software and Technology Network and Long Island Forum for Technology recently held its “Growing Your Cyber Security Business?” event at ...
libn.com/.../cyber-security-a-growing-threat-and-a-business-o...

DHS takes the lead in Senate cybersecurity bill Alex Jones' Infowars ...
Infowars.com the home of the #1 Internet News Show in the World.
www.infowars.com/dhs-takes-the-lead-in-senate-cybersecurity...

Hackers vandalise US jail contractor site
Australian Techworld
The website of an international prison contractor has been defaced by hackers linked to the Anonymous movement. The website of an international prison contractor has been defaced by hackers who replaced the company's home page with a hip-hop homage ...

Hackers attack Ontario police chiefs' website
CTV.ca
However, Anonymous activists threatened to target federal Public Safety Minister Vic Toews over the Harper government's proposed online surveillance bill. The police chiefs association supports the contentious legislation. The hackers posted usernames, ...

CTV.ca

Hackers attack Ontario police site
UPI.com
26 (UPI) -- The hacker group Anonymous says it hacked into the Ontario Association of Chiefs of Police Web site and obtained personal information on the group's members.Hackers opposed to Canada's proposed Internet surveillance bill say they accessed ...

Cybersecurity 2.0
Wall Street Journal
The US is experiencing mind-boggling violations of cyber security. Consider this sample of violations traced to China alone discovered over the past year: For a decade,hackers accessed the corporate computer network of Nortel, whose digital switches ...

Cyber attack doesn't change support for surveillance bill
Edmonton Journal
A cyber attack on the Ontario Association of Chiefs of Police has not dissuaded police from supporting a controversial federal bill on Internet surveillance, an association spokesman said Saturday. Joe Couto said the website of the Ontario Association ...

Police chiefs' website suffers cyber attack
Winnipeg Free Press
TORONTO -- A cyber attack on the Ontario Association of Chiefs of Police's website has only bolstered the organization's support for the government's controversial online surveillance bill, a spokesman said Saturday. The association took down the site ...

Hackers' anti-cop campaign targets US prison contractor
Oman Tribune
SAN FRANCISCO Hacker group Anonymous late on Friday vandalised the website of a major US prison contractor in the latest salvo in an anti-police campaign. Anonymoussubgroup 'Antisec' took credit for replacing The Geo Group website home page with a rap ...

Anonymous aids in European protests
Fudzilla
Many of the protest participants donned the Guy Fawkes mask which has been associated with the hacker group "Anonymous." The protests were reminiscent of similar protests in the United States against SOPA and Occupy Wall Street.

Anonymous targets Canadian police, politicians
GlobalPost
Anonymous protesters demonstrate against the Anti-Counterfeiting Trade Agreement (ACTA) on Feb. 25 in Paris. Internet users claiming to be part of Anonymous also hit a Canadian police chiefs website and threatened to release information about a ...

AnonOps Communications: #Anonymous #ACTA protests Freiburg ...
By Anonops
I see our ANONYMOUS friends & bros are kicking ass in europe,soon protests will be all over the world ANONYMOUS MILLIONS will over run the oppressers, never quit, never 4get never 4give,till the demands of millions ANONYMOUS are ...
AnonOps Communications

Ca: Police chiefs' website suffers cyber attack | Office of Inadequate ...
By admin
A cyber attack on the Ontario Association of Chiefs of Police's website has only bolstered the organization's support for the government's controversial online surveillance bill, a spokesman said Saturday. The association took down the site after it was hacked late Friday afternoon by people claiming to be linked to the groupAnonymous, association spokesman Joe Couto said. The identity of those responsible for the attack has not been confirmed, but activists allied to the loose-knit ...
Office of Inadequate Security

Anonymous Hacks Private Prison Company Website
After high-profile takeovers of recording industry and Justice Department websites last month, hackers affiliated with the Anonymous movement had a new target ...
www.huffingtonpost.com/.../anonymous-hacks-private-prison-...

Cybersecurity Hype | Cato @ Liberty
The approving response of an IT security professional last week pointed me to a story about cybersecurity in which I'm featured. The story and accompanying ...
www.cato-at-liberty.org/cybersecurity-hype/

Anonymous threatens to DDOS root Internet servers
An upcoming campaign announced by the hacking group Anonymous directed against the Internet's core address lookup system is unlikely to cause much ...
www.networkworld.com/.../022012-anonymous-threatens-to-...

Hackers dog LA police canine association
Members of hacker group Anonymous took credit Thursday for an online raid of the Los... The hackers claimed to have gotten the addresses of more than 1000 ...
www.physorg.com/.../2012-02-hackers-dog-la-police-canine.h...

PDF Malware Writers Keep Targeting Vulnerability | Symantec ...
We keep seeing new waves of PDF file-based attacks that exploit the Adobe Acrobat and Reader CVE-2010-0188 Remote Code Execution Vulnerability (BID ...
www.symantec.com/.../pdf-malware-writers-keep-targeting-vu...

Anonymous hits US prison contractor and FBI partner group; deface homepages

Anonymous hits US prison contractor and FBI partner group; deface homepages ...
Washington Post
LONDON — The website of an international prison contractor was defaced by hackers who on Friday replaced the company's home page with a hip-hop homage devoted to former death row inmate Mumia Abu Jamal. Hackers allied to the loose-knit Anonymous ...

Anonymous takes on prison industrial complex with latest hack
RT
The prison industrial complex is the latest victim of Anonymous' #FuckFBIFriday campaign. Hacktivists have compromised data from a massive correctional facility management firm and have defaced their website. The website for The GEO Group, Inc., ...

RT

Does Anonymous's Friday Routine Make Hacking Seem Dull?
New York Magazine (blog)
By Joe Coscarelli The "hacktivist" group Anonymous thrives on chaos and surprise, which makes their recent promise to schedule online attacks every Friday somewhat puzzling. Earlier this month, affiliates of the loosely organized group hacked an FBI ...

New York Magazine (blog)

Cyber security expert finds new flaw in smartphones
Los Angeles Times
Dmitri Alperovitch, the formerMcAfee Inc.cyber security researcher best known for identifying a widespread China-based cyber espionage operation dubbed Shady Rat, has used a previously unknown hole in smartphone browsers to plant China-based malware ...

Hackers dog LA police canine association
FRANCE 24
"Over the past three weeks, we in the cabin have been targeting law enforcement sites across the United States," hackers said in a message atop a file at Pastebin.com containing officers' addresses, phone numbers and more. "Be it for injustices they ...

FRANCE 24

Anonymous vandalizes US prison contractors' site
The Seattle Times
The website of an international prison contractor was defaced by hackers who on Friday replaced the company's home page with a hip-hop homage devoted to former death row inmate Mumia Abu Jamal. By RAPHAEL SATTER Associated Press No comments have been ...

Hackers, and Soda, Head to Madison Avenue
New York Times (blog)
The Mountain Dew brand has a music initiative, Green Label Sound, and one of its bands, MNDR, will play during the hack weekend “while the hackers hack,” Mr. Henderson said, laughing. Also on hand will be copious quantities of Mountain Dew because of ...

Hackers from Anonymous strike again
Richmond Times Dispatch
LONDON — Hackers allied to the loose-knit Anonymous movement have claimed responsibility for vandalizing the website of an international prison contractor. The GEO Group's website was defaced and replaced with a hip-hop song devoted to former death ...

Android bug opens devices to outside control-experts
Reuters
* Cybersecurity experts to demonstrate flaw next week * Experts say they can secretly take control of Androids * They infect devices using tainted links in emails, texts By Jim Finkle BOSTON, Feb 24 (Reuters) - Cybersecurity experts have uncovered a ...

Cyber security – A growing threat and a business opportunity
Long Island Business News
By Pedram Tabibi ⋅ February 24, 2012 ⋅ Post a comment The Long Island Software and Technology Network and Long Island Forum for Technology recently held its “Growing YourCyber Security Business?” event at the Morrelly Homeland Security Center in ...

Android bug opens devices to outside control: experts
Reuters
By Jim Finkle | BOSTON (Reuters) - Cybersecurity experts have uncovered a flaw in a component of the operating system of Google Inc's widely used Android smartphone that they say hackers can exploit to gain control of the devices.

FCC Urges ISPs to Take More Active Role in Cybersecurity
Tom's Guide
In a speech given at the Bipartisan Policy Center on February 22, FCC Chairman Julius Genachowski called on Internet service providers to take a more active role in cybersecuritywhile appearing to defend the principles of an open Internet.

YouPorn security breach exposes thousands of usernames, emails
DigitalJournal.com
Los Angeles - A security breach has exposed the emails and passwords of thousands of users of the chat service of the popular pornographic site YouPorn.com., an incident that might have caused embarrassment to some users of the site.

DigitalJournal.com

Cyber Security Expert Proves Smartphones' Vulnerability to Malware Attacks
International Business Times
By Swaty Sharma: Subscribe to Swaty's RSS feed Dmitri Alperovitch, former McAfeecyber security researcher, has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user ...

International Business Times

Deputy Secretary of Defense Dr. Ashton B. Carter to Present on Enhancing ...
MarketWatch (press release)
Dr. Carter will offer his insights into the Department of Defense's role in providing cybersecurityand describe how and why the government and private sector can partner closely to meet our shared security needs. He will also address the pending ...

New Mac malware grabs users' passwords
GMA News
A new malware is out targeting computers Apple Inc.'s OS X operating system, scavenging an infected computer's files for usernames and passwords. Mac security firm Intego said the new "Flashback Mac" Trojan Horse variant uses "novel techniques" to ...

McCully hackers have score to settle
New Zealand Herald
By Fran O'Sullivan Someone with an enormous sense of humour and a score to settle must surely be leaking Foreign Affairs Minister Murray McCully's emails to the media. TV3 reported rather breathlessly this week that a group calling themselves The ...

StopTheHacker Launches Official VAR Program
MarketWatch (press release)
With the threat of malware, hackers and other online abuse, website protection is vital for the majority of today's business owners. StopTheHacker's patent-pending artificial intelligence engine provides a new type of protection for websites, ...

Porn site Youporn breached by hackers
Insideireland.ie
By David Richardson Porn website YouPorn, which is one of the top 100 most-visited websites in the world, has been attacked by hackers who exposed the user names and passwords of some 6400 users. YouPorn has acknowledged the breach, shut down the ...

Citigroup: Cyber Attack Gave Access to Customer Data
NewsMax.com
Citigroup Inc., the third-largest US lender, said cyber attackers got into customer accounts last year as the threat of electronic intrusions increased. The bank cited data breaches that gave outsiders access to account information or interrupted ...

RSA Newsflash: Security is Not Working
EON: Enhanced Online News (press release)
(EON: Enhanced Online News)--As the leaders in the global information security industry gather on Monday at the signature event of the year, the annual RSA Security conference in San Francisco, the amount of malware generated during the event will ...

Beware Android flaw
MyBroadband
Cybersecurity experts have uncovered a flaw in a component of the operating system of Google's widely used Android smartphone that they say hackers can exploit to gain control of the devices. Cybersecurity experts have uncovered a flaw in a component ...

MyBroadband

Skype malware used in Syrian confilct
GMA News
A new nasty piece of malware is now being used in the ongoing conflict in Syria, with the ability to take over an infected computer or steal documents from it. Computer security firm Trend Micro cited reports the malware, dubbed DarkComet, ...

Flashback malware uses new infection technique
The H
Source: Intego A new variant of Mac malware Flashback is using a new installation method. When a user visits a crafted web page, the new variant either tries to exploit two old security vulnerabilities or deploys a Java Applet which tries to trick the ...

Azerbaijan airline websites, TV hit by cyber attack
The Daily Star
BAKU: Hackers calling themselves the “Iranian Cyber Army” and “Cocaine Warriors from Persia” have hit the websites of Azerbaijan's national airline AZAL and television station AzTV, the second such attack on Azeri state portals, officials said Thursday ...

The Daily Star

10.8 million Android devices infected with malware
Help Net Security
In 2011, newer and more advanced forms of malware have successfully infected an estimated 10.8 million Android devices worldwide. This is expected to increase throughout 2012. "Smartphones and tablets are finally delivering consumers with these ...

Help Net Security

Civil liberties groups: Proposed cybersecurity bill is too broad
CNET (blog)
The cybersecurity bill introduced last week in the Senate is too broad, say privacy experts who worry that it could authorize wiretapping and curtail civil liberties. The Cybersecurity Act of 2012, introduced last week by Sens.

Microsoft Testifies on U.S. Senate Cybersecurity Legislation - Cloud ...
By trusted-cloud
Microsoft Malware Protection Center ... Leaders from both chambers and both parties have contributed to the national discussion about cybersecurity by introducing helpful legislation and advocating for new statutory authorities.
TechNet Blogs

Sen. Lieberman Praises UConn Cybersecurity Labs | UConn Today
By Colin Poitras
Lieberman chose UConn to discuss the bipartisan Cyber Security Act of 2012 because of the University's leadership in developing advanced technologies to identify and protect against cyber security threats. More than 20 faculty members and ...
UConn Today

Android Malware increase 3325% in 2011 | WMPoweruser
By Surur
Juniper Networks Mobile Threat Center reports Android malware samples had increased from 400 to 13302 during the last 6 months of 2011, a growth rate of 3325%. The worst offenders were Spyware, at 63%, but 36% could have cost you ...
WMPoweruser

Hackers explained.
As most people are afraid of "hackers" but actually don't know what a hacker is anyway. What's a hacker? A hacker is someone who gathers digital informantion and also shares it with other people. As piratebay users we all are hackers but it ...
SuprBay: The Pirate Bay Forum...

Malware error in a thread
By Diesta
Got this while I was trying to browse the GIF thread, I don't know if it is of any importance, but a notification is better than nothing. http://i.imgur.com/uC5Fo.jpg.
MMO-Champion

Home Malware Cleaner scam. Removal video | Trojan Killer
By andy
Is your system still infected with Home Malware Cleaner rogue security program? If this is the case, then here is a good tutorial we've developed to instruct.
Trojan Killer

Malware for Mac Targeting Passwords and Crashing Applications ...
By Steve Ragan
Should Flashback find that Java is fully updated, it will attempt to social engineer the malware'sinstallation, by presenting an applet with a self-signed certificate. The certificate claims to be signed by Apple, but is clearly marked as invalid.
SecurityWeek RSS Feed

Sourcefire Corporate Blog: Would you like some malware with your ...
By Oliver Friedrichs
One of the core tenets of Sourcefire's FireAMP product, introduced just one month ago now, is unmatched visibility - specifically with a focus on how malware was introduced, when it got there, and how it spread COMBINED with the ability to ...
Sourcefire Corporate Blog

Updated DHS Cyber Security Tool | isssource.com
By gHale
Critical infrastructures are dependent on information technology systems and computer networks for essential operations. Reliability and resiliency of the.
isssource.com

bwtech@UMBC Thrives as Cybersecurity Hub « CyberMaryland
By CyberMaryland
But now, a 71-acre community space houses bwtech@UMBC Research and Technology Park, acybersecurity powerhouse at the University of Maryland, Baltimore County. bwtech@UMBC is home to nearly 90 technology and life science ...
CyberMaryland

Civil liberties groups: Proposed cybersecurity bill is too broad | the ...
By the Net economy
By Elinor Mills – The Cybersecurity Act of 2012, introduced last weekby Sens. Joe Lieberman (I-Connecticut), ... The measure gives authority for monitoring and defending against cybersecuritythreats to “any private entity.” more> http://is.gd/ ...
the Net economy

Senators launch new push for cybersecurity bill - Yahoo! News
WASHINGTON (Reuters) - Leading senators introduced a cybersecurity bill on ... have warned often only have the most rudimentary protections against hackers.
news.yahoo.com/senators-launch-push-cybersecurity-bill-174...

Nortel was penetrated by hackers for decade: report
The hackers, using seven passwords stolen from top executives, including the company's .... 0; China hackers behind cyber attack on Canada: report created ...
www.physorg.com/.../2012-02-nortel-penetrated-hackers-deca...

The New School of Information Security » New Cyber Security Bill ...
New Cyber Security Bill: Crowdsource Analysis? ... vulnerabilities of critical infrastructure systems—whose disruption from a cyber attack would ... DHS to consolidate its cybersecurityprograms into a unified office called the National Center for ...
newschoolsecurity.com/.../new-cyber-security-bill-crowdsourc...

Hackers probably stole Steam transaction data, Valve says
Valve found evidence that suggests Steam hackers copied encrypted credit card ... In November 2011, Valve announced that hackers gained unauthorized ...
www.networkworld.com/.../021312-hackers-probably-stole-st...

How Hackers can Track your Mobile phone with a cheap setup ...
How Hackers can Track your Mobile phone with a cheap setup ?. THN Magazine and The ... on the rise. Mobile malware on the rise, McAfee Q4 Threats Report ...
thehackernews.com/.../how-hackers-can-track-your-mobile-ph...

Cell phone hackers can track your physical location without your ...
Minneapolis MN (SPX) Feb 21, 2012 - Cellular networks leak the locations of cell phone users, allowing a third party to easily track the location of the cell phone ...
www.gpsdaily.com/.../Cell_phone_hackers_can_track_your_p...

A Moment of Zen: Meet the Hackers
Meet the Hackers. This past week, I've started to get back into photography a bit more (thanks, Nina!) and started taking my camera into the office with me every ...
jeffreystedfast.blogspot.com/2012/02/meet-hackers.html

Summary Box: Anonymous Vandalizes Site
ABC News
ANOTHER ATTACK: The website of an international prison contractor, GEO Group Inc., was defaced by hackers who replaced the company's home page with a hip-hop homage devoted to former death row inmate Mumia Abu Jamal. BEHIND IT: Hackers allied to the ...

Anonymous hits Ohio FBI partner website
CBS News
(AP) LONDON — Hackers claiming allegiance to the loose-knit Anonymous movement have claimed responsibility for vandalizing an Ohio FBI partner website, replacing its homepage with the video for rap hit "Gangsta's Paradise." The hackers said Friday ...

Anonymous pwns InfraGard yet again
TG Daily
Indeed, Anonymous kicked off 2012 with a bang, having managed to obtain a "sensitive" FBI-Scotland Yard conference call while jacking various police department sites, including those run by law enforcement officials in Syracuse (New York), ...

TG Daily

Anonymous hacks Infragard again
Inquirer
By Dave Neal HACKTIVIST COLLECTIVE Anonymous has attacked the FBI affiliate Infragard for the second time, this time taking over and defacing the web site of its Dayton, Ohio chapter. Thehackers took over the web site, changing it totally and ...

What is InfraGard? Anonymous Hackers Attack Dayton, Ohio, Chapter of FBI ...
International Business Times
By Jacob Kleinman: Subscribe to Jacob's RSS feed 'Hacktivist' group Anonymous continued their weekly cyber-assault on the Federal Bureau of Investigation, nicknamed #F--KFBIFRIDAY, on Feb. 24, temporarily hacking the homepage of the Dayton, ...

Hacker campaign targets US prison contractor
AFP
SAN FRANCISCO — Hacker group Anonymous on Friday vandalized the website of a major US prison contractor in the latest salvo in an anti-police campaign.Anonymous subgroup "Antisec" took credit for replacing The Geo Group website home page with a rap ...

AFP

So Much For Bouncer: New Android Malware Uses Facebook To ...
By Sarah Perez
Even though Google recently introduced a malware-blocking system called Bouncer to keep the Android Market safe from malicious software, crafty spammers and fraudsters are still managing to find ways around the restrictions to get their ...
TechCrunch » Mobile

Security Breach Reported At John F. Kennedy International JFK ...
By Jesse
The breach occurred at around 5:20 a.m. A passenger flagged by the Transportation Security Administration went through a security checkpoint without being pulled aside and screened.
CBS New York

AnonOps Communications: #FFF #Anonymous hits Ohio #FBI ...
By Anonops
#FFF #Anonymous hits Ohio #FBI partner website. Anonymous delivered another blow on the Federal Bureau of Investigation (FBI) by taking down the Web site of the Dayton Ohio Chapter of InfraGard Friday. The Ohio site was replaced with ...
AnonOps Communications

Android malware spreads via Facebook [VIDEO] | Naked Security
By Vanja Svajcer
Android malware! On Facebook! Caught on camera! If you're using Facebook on your Android smartphone, you should be just as careful clicking on links as you would (hopefully) be on a desktop computer. ... New Android Market web store could open backdoor for phone hackers · bbc-news-logo ...
Naked Security - Sophos

Hackers Post 'Gangsta's Paradise' Music Video On FBI Partner Web ...
Hackers allied to the loose-knit Anonymous movement on Friday claimed responsibility for vandalizing an Ohio FBI partner website, replacing its homepage with the video for rap hit "Gangsta's Paradise." The hackers said on Twitter that they ...
Central Ohio News Headlines | WBNS 10TV

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com