Cybersecurity: Why You Aren't Protected

Conversations On Cybersecurity Part 3: Why You Aren't Protected - Forbes: " their second step is to send a spoofed e-mail (one that looks like it comes from a trusted friend or client) to one of your key employees or partners and the e-mail includes an infected attachment. Here’s where your firewall or your anti-virus or your fully patched operating system would be expected to help; but they don’t. The firewall doesn’t stop the e-mail because the spoofed e-mail looks just like every other e-mail you get. If the firewall stopped this one, it would have to stop them all and that would disable your business. The firewall doesn’t strip the infected attachment because that’s not what firewalls generally do . . . "

This Week in Tech: Senate set to tackle cybersecurity
The Hill (blog)
plans to introduce cybersecurity legislation ahead of a hearing this week, a committee aide told The Hill. The legislation is expected to give the Homeland Security Department regulatory authority over companies with computer systems crucial to the ...

Learning about Cybersecurity from an Unnatural World
ComputerworldUK (blog)
I was listening to the rerun of File On 4 [1] this evening, and a chap from the FBI said something very sensible about Cybersecurity. Albeit the programme itself was nothing to do with cybersecurity and its tone was mildly hysterical in conflating ...

Do You Have A False Sense of Cybersecurity for Mobile?
NewsReleaseWire.com (press release)
Nearly three-quarters of Americans have never installed data protection applications or security software on their mobile devices to prevent data loss or defend against viruses and malware. 72% of us have unsecured smartphones, to be exact, ...

NewsReleaseWire.com (press release)

'Israel Must Defend Itself Against Hacker Attacks'
Arutz Sheva
The 2012 CyberSec conference on cyber security was held in Israel, in the midst of the cyber war between pro-Arab and pro-Israeli hackers. By Elad Benari & Yoni Kempinski CyberSec 2012: The International Conference on Cyber Security, Cyber Warfare and ...

ANTONY 2LAST
IBNLive.com
PTI | 03:02 PM,Feb 13,2012 Observing that cyber security was a critical area of Observing that cyber security was a critical area of concern, Antony said nations must take serious and prompt note and cooperate with each other to strengthen seamless ...

Washington Post Editorial on Cybersecurity Legislation
Lawfare (blog)
by Paul Rosenzweig The lead editorial in the Washington Post today, just adds to the political salience of the cybersecurity issue. Calling the existing status quo “unacceptable” the Post lends it support to the Senate bill (now dubbed ...

Hacking attempts delay new parliament website
Technology Spectator
Hacking attempts and cyber security concerns put a 12 month delay and a blowout cost of $614000 on the Australian Parliament's new website. According to ZD Net, a senate hearing this morning unveiled that the website – which was set to open in the ...

News Digest: Feb. 13
Federal Times
Three senators are expected to introduce a long-awaited cybersecurity bill next week that will overhaul the way the government protects critical networks. Sens. Susan Collins, R-Maine, Joe Lieberman, I-Conn., and John Rockefeller, DW.

In Cyber, Losers Ignore, Survivors React, and Winners Predict
Forbes
There are three different approaches to cyber security. The first is to ignore the threat. Practically every outbreak of a worm or malicious virus has been preceded by warnings from the security community. The CodeRed worm targeted a vulnerability in ...

Protect Yourself from Online Hackers: Irvine
MyFox Chicago
Jerry Irvine, of the National Cyber Security Task Force and CIO of Prescient Solutions, said any website can get hacked these days, but there are ways people can protect themselves. Irvine recommended when online, you never use your email as a user ID, ...

Trustwave Announces Healthcare Partnership With JGo Labs
MarketWatch (press release)
"In my eyes Trustwave is on the leading edge of cyber security, providing one of the few end-to-end solutions in the general market," said John Gomez, Chief Executive Officer, JGo Labs. "Now if you take that knowledge and ability and bring it to the ...

The week in security: Would you notice if you were hacked?
CSO Magazine
The crims have other tactics – which is why the European Union is moving to [[xref:http://www.cso.com.au/article/414777/eu_stengthen_its_cybersecurity_watchdog/ |strengthen itscyber security arm|]], the European Network and Information Security ...

Dutch Authorities Start Investigation Into Hacker Attack at KPN
BusinessWeek
8 that a hacker broke into the server domain within the company's information technology network and informed government authorities and the National Cyber Security Council. The company decided not to inform the public. The company in December was put ...

Cyber criminals innovate like businesses, forming global industry: report
ZDNet (blog)
The report, Cyber Security Strategies: Achieving Cyber Resilience, addresses security issues that companies are facing today and a look at the key trends in security for 2012. Among other security threat leftovers from 2011 (ie hacktivism, ...

Antony Inaugurates the 14th Asian Security Conference
Press Information Bureau (press release)
Cyber security is a critical area of concern. With digitisation of world and various services, the world is becoming increasingly dependent on internet and information technology. However, security of networks has become an urgent concern, ...

Antony calls for joint combat against WMDs
Firstpost
Observing that cyber security was a critical area of concern, Antony said nations must take serious and prompt note and cooperate with each other to strengthen seamless  cyber security. “Security of networks has become an urgent concern, ...

Firstpost

US Senate Trying To Sneak In New SOPA Bill?
Gizmodo Australia
Guess not though, because it looks like Senate Majority Leader Harry Reid still wants to censor the internet with a new bill hidden under the mask of cybersecurity. SOPA in sheep's clothing. According to The Daily Caller, details about the bill are ...

Cryptome Infected with Blackhole Toolkit
Cryptome.org
... Santa Barbara net_match('67.217.0.0/16',$ip)==0 && many companies net_match('188.93.0.0/16',$ip)==0 many companies A2 comments 13 February 2012: Hi Cryptome, (CC to Dutch National Cyber Security Center) The afg.php "Blackhole Virus" you disclosed ...

Cryptome.org

Bowie Man Pleads Guilty to Gambrills Burglary
Patch.com
Spera, who teaches cyber-security at the US Naval Academy, admitted breaking into his former girlfriend's home and will spend two weekends in jail and be on probation for 18 months, reported The Baltimore Sun. Court records show that Erin McNamara ...

Anonymous sets its sights on Greece
Inquirer
There are some governments that should be very, very concerned about coming events and the state of their cyber-security. #Justsayin "Taken down: Major TV channel, the Greek Prime Minister, the National Police, the Ministry of Finance, ...

Gov't memo downplays WCIT-12 danger to Internet governance
FierceGovernmentIT
"In an effort to establish the ITU as an operational authority on international cybersecurity, some more authoritarian countries have proposed to include cybersecurity and cybercrime provisions into the ITRs" said Larry Strickling, head of the National ...

India-ASEAN talks to focus on economics, security
domain-B
Apart from terrorism, the non-traditional security threats include climate change, water and food security, piracy, pandemics, and cyber security. The two sides will seek to work out mechanisms to jointly counter these challenges.

Five critical hacking myths
Technology Spectator
With companies spending billions on cyber security, you wouldn't be blamed for believing that any commercial company is impervious to hacking. But last year's hacks of Sony and Lockheed Martin proved this is not the case. Jason Pearce, director of ...

Chicopee's Westover Air Reserve Base may fall victim to federal budget squeeze
MassLive.com
For Massachusetts as a whole, Romitti said, the good news is a stated objective on the part of the Obama administration to create a high-tech military force, especially when it comes to cybersecurity. “We are going to devote ourselves to maintaining ...

MassLive.com

Small Mobile business helps train cyber investigators across the globe
al.com (blog)
Dimitrelos, 44, imparts knowledge gleaned from years of experience: He's been a member of an elite cyber security team run by the Secret Service, spent a stint leading the Alabama Computer Forensic Laboratory, and served as a private consultant.

al.com (blog)

U.S. Navy Awards Northrop Grumman $37 Million for Next Phase of CANES ...
MarketWatch (press release)
"CANES will enable critical C4I capabilities with integrated, flexible cybersecurity capacity to quickly address evolving threats and missions using our adaptable information technology platform," said Linda Mills, corporate vice president and ...

In Symantec's shoes
iT News
Cyber security analyst Jeffrey Carr expected the episode to continue to be a fiasco for Symantec. “Symantec shouldn't have offered a penny for their code," Carr said. "It's the equivalent of Obama asking if Iran would return our drone to us -- it's ...

Kaspersky maintains profitability and control as they move into 2012
The Tech Herald
Mr. Kaspersky called it the International Cyber Security Agency (ICSA), an acronym that might have to change if Verizon Business has any say, as they have ICSA Labs. Still, his point was that something needs to be done to combat cyber crime.

The Tech Herald

Cyber Protestor Threat Gains Ground on Physical Counterparts
Security Debrief
Cyber security has therefore taken on a whole new front. Not only must companies assess and manage the risks to their data centers, payment systems and finances, which tend to be better protected than the rest of the company, the penetration of the ...

UpTech Announces Judges for Start-Ups in Business Accelerator Contest
MarketWatch (press release)
The judges will examine seed-level ideas that support five sectors of informatics: health information technology, cloud computing virtualization, business analytics, digital media, and cyber security. UpTech has been accepting applications for ...

League of Women voters to discuss foreign policy during Summit program
Independent Press - NJ.com
March 7: Cybersecurity (Bruce Rights). How will the United States and its democratic allies face challenges such as cybercrime and authoritarian control of networks? How does this new domain figure in US strategic interests?

6 Green Data Centers that Could Survive a Zombie Apocalypse
CleanTechnica
The Swiss Fort Knox data center, a repurposed 1960s Cold War bunker, takes cyber security to an almost ridiculous extreme. The data center's first layer of defense in case of war or battles against the undead is the very mountain beneath which it's ...

The week ahead: Budget day is here
The Hill (blog)
... Affairs Committee is looking at Iran's ambitions in Latin America; the Senate Homeland Security Committee is taking up cybersecurity legislation; and the House Foreign Affairs Committee is hosting its second day of hearings on the Arab Spring in Egypt.

Financial lobby stuck in holding pattern
Politico
There are relatively minor legislative battles in the offing — a transaction tax for financial firms and measures to strengthen cybersecurity are examples. But two industry lobbyists likened activity there to a sports team in the midst of a rebuilding ...

Politico

Conversations On Cybersecurity Part 3: Why You Aren't Protected ...
By Blackmere
Alan Paller is director of research for the SANS Institute, a provider of security training and certification. Also read: Conversations On Cybersecurity: The Trouble With China, Part 1 and Conversations On Cybersecurity: The Trouble With .
Blackmere Consulting

Is Harry Reid Slipping SOPA Into A New Cyber-Security Bill? » The ...
By Infowars.com
Is Harry Reid Slipping SOPA Into A New Cyber-Security Bill? Permalink | Shortlink | Comments (0) | Trackback | PrintFiled in Big Brother, Infowars.com. WebProNews | Whispers of the untimely return of SOPA, PIPA, and even Kill Switch View ...
The Final Stage

CyberSec 2012 : The International Conference on Cyber Security ...
By admin
CyberSec 2012 : The International Conference on Cyber Security, Cyber Warfare and Digital Forensic. February 13, 2012, 12:26 pm. Read More » · Tweet. Category: Arutz Sheva ». Leave a reply: Daily Jewsletters. Subscribe for Blogs: ...
JewPI.com

Audit finds rush to update smart grid left system vulnerable | Simply ...
By Simply Security
Audits have found cybersecurity vulnerabilities within power grid upgrades. Modernizing the nation's power grid has been a top priority among both the U.S. government and utility companies charged with overseeing the delivery of energy ...
Simply Security

Cyber Security Legislation - C-SPAN Video Library
James Lewis talked about cyber security threats to individuals, and he responded to telephone calls and electronic communications. Mr. Lewis, who testified on ...
wwww.c-spanvideo.org/program/JJam

The Blog @ Homeland Security: The Administration's Cybersecurity ...
Posted by Deputy Secretary Jane Holl Lute Today, we are more interconnected than ever before - in an instant, we can communicate with a fr...
blog.dhs.gov/2012/02/administrations-cybersecurity.html

Security experts speak out against proposed cyber security ...
Cyber security experts on Wednesday warned members of a House ... 4 Ways to Prevent Domain Name Hijacking · Cybersecurity Report Stresses Need for ...
www.infoworld.com/.../security-experts-speak-out-against-pro...

Integrated Security - Industry Solutions - Cisco Systems
An architectural approach to cybersecurity provides information assurance and ... IOS Cyber Security Features for Your Network (PDF - 1.0 MB); Cybersecurity: ...
www.cisco.com/web/strategy/us.../fed_security.html

Groups warn of privacy concerns in cybersecurity bills - Nextgov
Civil liberties groups are on the Hill Thursday to warn of the dangers they say cybersecurityproposals could pose to privacy and other civil...
www.nextgov.com/nextgov/ng_20120209_6119.php

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com