China suspected of Facebook attack on Nato's Chief

China suspected of Facebook attack on Nato's supreme allied commander
The Guardian
Nato's most senior military commander has been repeatedly targeted in a Facebook scam thought to have been co-ordinated by cyber-spies in China, the Observer has learned. The spies are suspected of being behind a campaign to glean information about ...

The Guardian

How spies used Facebook to steal Nato chiefs' details
Telegraph.co.uk
Some hawkish figures in the US also fear that a hostile country or terror group might launch a "cyber war" against them attempting to attack and destroy military and civil infrastructure using viruses or other electronic weapons.

Telegraph.co.uk

China stole secret fighter jet plans
The Australian
Details of the attack on BAE have been a closely guarded secret within Britain's intelligence community since it was first uncovered nearly three years ago. But they were disclosed by a senior BAE executive during a private dinner in London for cyber ...

What a WWII battle can teach about cybersecurity
FCW.com
“In many respects, in cyber that's where we're at today – we've got a very broad battle space that constitutes DOD's cyberspace, surrounded by a broader, expanding Internet.” Simpson spoke March 9 at an event sponsored by AFCEA's Northern Virginia ...

Analysis: Incremental approach on cyber legislation more effective
FederalNewsRadio.com
called the SECURE IT Act, and the other introduced by a trio of senators from across the aisle called the Cybersecurity Act of 2012. The House, meanwhile, has even more cyber bills circulating, although most of them are much smaller in scope than ...

The Circuit: Cybersecurity, search privacy, Chris Hughes takes over the New ...
Washington Post (blog)
By Hayley Tsukayama White House cybersecurity: Senior Obama administration officials walked some 50 US senators through a cyber-attack scenario Wednesday evening, The Washington Post reported, to bolster their case for legislation that would give the ...

EFF warns about vague cybersecurity bill in Congress
Afterdawn.com
The Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523) was introduced by Rep. Mike Rogers and Rep. Dutch Ruppersberger, and is one of many bills proposed in the US Congress to address the growing threat of cyber attacks.

Cyber criminals or super villains?
Hindu Business Line
Cyber attacks are having a devastating impact on networks, causing immense financial losses and posing major threats to national security. APT or Advanced Persistent Threat is a relatively new, lethal form of attack that is sending shivers down the ...

Hindu Business Line

Lieberman warns of a cyber 9/11
TheDay.com
He is working to make his last great legislative victory the approval of the Cybersecurity Act of 2012, which he says could prevent a cyber 9/11. He chairs the Homeland Security and Governmental Affairs Committee. "I think this is maybe the last really ...

Photo Release -- Kratos RT Logic Introduces the First Cyber Security Event ...
MarketWatch (press release)
The continued integration of IP-enabled equipment throughout satellite and ground control environments is introducing more attack points and vulnerabilities to mission operations and sensitive information. CyberC4:Alert constantly monitors for cyber ...

Crouching Tiger, Hidden Chinese Hackers
DaniWeb (blog)
According to one newly published report into the threat from Chinese state-sponsored espionage activity, the true scale and nature of these cyber-attacks is really quite interesting. Context Information Security argues in the 'Hidden Tiger, ...

UAE TRA organises homeland cybersecurity event
ITP.net
The TRA will be running the last day of the conference with a focus on cyber security, as part of its commitment to ensuring robust communications to support the securityof the UAE. The cyber security track will focus on the theme of Countermeasures ...

ITP.net

Anonymous hacker James Jeffery admits attack on abortion website
Metro
James Jeffery, a member of the Anonymous hacking collective, has pleaded guilty to being behind a cyber attack on the British Pregnancy Advisory Service. The 27-year-old, of Wednesbury, West Midlands, admitted two offences under the Computer Misuse Act ...

Metro

'He turned against the very people who trusted him most' - The story of Sabu ...
Scotsman
TO THE shadowy band of virtual outlaws who belong to LulzSec, Sabu was a hero – the brains behind a series of cyber attacks so audacious they struck at the heart of banks, multinational corporations and even governments. Today, however, they are facing ...

Scotsman

Attack the Hackers
New York Post
Authorities struck a big blow for law and order last week with their transatlantic busts of members of the hacking network behind last summer's global cyber-attacks. Five hackers — leaders of LulzSec and its broader anarchist affiliate, Anonymous ...

New York Post

Telecom execs warn Congress about excessive regulation in cyber bills
Infosecurity Magazine
A US House bill introduced on Wednesday would lift legal barriers to sharing of cyber threat information between the US government and private sector. US telecom executives came out strongly against government regulation of cybersecurity in the private ...

China Suspected of Facebook Attack on Nato Commander
China Digital Times
The latest disclosure will add to growing fears in the UK and US about the scale of cyber-espionage being undertaken by China. As well as targeting senior figures in the military, the tactic has been blamed for the wholesale theft of valuable ...

Hackers busted after 1 becomes FBI informant
Albany Times Union
The hacker that federal authorities say launched cyber-attacks on big corporations and despotic governments, then shocked the Web by informing on his accomplices, lived in a shabby public housing project where the elevator stinks of urine, ...

US plans spy plane use during Seoul forum: report
Hindustan Times
"Military readiness will be maintained at the highest level to guard against potential attacks via land, sea and the air as well as cyber attacks," Yonhap quoted an unnamed senior Seoul military official as saying. J-STARS aircraft fly as high as 12 ...

Relax, America! You have little to fear now
Gulf Times
Just think of terrorists, rogue states, dangers arising from Middle East revolutions, cyber attacks, Iran's nuclear ambitions, the rising power of China. The list goes on. It makes for a world “more unpredictable, more volatile and more dangerous”, ...

Gulf Times

Tunisia's GayDay magazine hacked.
Bikya Masr
The threats were anonymous and it has not been possible to identity who is behind the cyber-attack. Hackers succeeding in accessing most of GayDay magazine's internet accounts (E-mail, main site and Twitter). GayDay, Tunisia's first gay magazine was ...

Bikya Masr

Downer: Changing the face of war
Adelaide Now
For a start, the remote systems used to fly them are vulnerable to cyber attacks. Recently, an American drone flying over Iran on a surveillance mission landed in Iran and was seized by the Iranians. A manned aircraft would not have been as vulnerable; ...

The Voice: Christina Aguilera workplace bullying Adam Levine? (History)
Green Celebrity Network
Has she officially become a cyber stalker, using her star power to tank his product sales by playing a cat and mouse game with him on Twitter? As the lead singer of Maroon 5, Adam Levine has become a powerful man in the music industry.

Jamming signals disrupt IRIB broadcast
Press TV
In addition to jamming IRIB signals, US and Israeli hackers have launched several cyber attacks against Press TV's website. The first such attack came on December 9, 2011, when American and Israeli hackers attacked the Press TV website after the ...

Press TV

US threatens to use 'mother of all bombs' against Iran
Pakistan Observer
Lieutenant General Herbert Carlisle, the US Air Force deputy chief of staff for operations was quoted as saying that “The Massive Ordnance Penetrator (MOP) is a great weapon,” and suggested that the bomb might be used in any attack on Iran ordered by ...

Killing of 4 youths horrifies central Mexico city
Las Vegas Sun
The new, 700-million-peso ($55 million) facility will have DNA, ballistics and fingerprint labs as well as a cyber-crime unit. Calderon said that Mexico has made progress in detaining top drug traffickers, but that street-level violence between ...

Deterring State-Sponsored Cyber Attacks: Intelligence and the ...
By jdiamond
Until a state casts off plausible deniability and unilaterally claims responsibility for a cyber attack, we may safely assume that imperfect attribution will remain an integral feature of cyber conflict. We may likewise reasonably assume that states will not reveal their actions in ... to American lives, financial resources, and international standing. Thus, counterinsurgency-style deterrence built on strong, reliable intelligence should form the basis for future U.S. cyber security policy. References ...
Sigma Iota Rho Journal

Iranian Media Continues to be Attacked by Foreign Entities :
By Alex
More recently, the Press TV website was hit by another cyber attack on March 5, reportedly by the same hackers. Press TV reports that both of these attempted attacks were thwarted by securitycountermeasures taken by their technical team.

Press TV again reports jamming of IRIB satellite signals
By Andy Sennitt
“Also on March 5, the Press TV website was subject to another cyber attack by the same hackers. Both attacks were foiled by effective security countermeasures taken by the Press TV technical team.” Related stories. Posted in: For Consumers, ...
Media Network

Cyber War between Bangladesh & India: Why, What, How? | ARAZ's ...
By Araz Rahaman
Cyber War. We all are known to the word Cyber War now. It means the war begins and ends inCyber War. By this the Cyber Battle Field not became a bloody field, but the victims became helpless some times for this reason. No a days Internet is no more safe for the newbie people. ...Everyday Indian Border Security Force [BSF] is killing and torturing Bangladeshi people in the border area. .... Today I am going to tell you about "How to make a DDoS attack from your Computer?
ARAZ's TEN Blog

China suspected of Facebook attack on Nato's supreme allied ...
By SPECIAL CORRESPONDENT
Nato's mοѕt senior military commander hаѕ bееn repeatedly embattled іn a Facebook scam thουɡht tο hаνе bееn co-ordinated bу cyber-spies іn China, thе Observer hаѕ learned. Thе spies аrе supposed ... Nato hаѕ warned іtѕ top officials аbουt thе dangers οf being impersonated οn social networking sites, аnԁ awarded a £40m contract tο a major defence companionship tο bolster securityаt thе organisation's headquarters аnԁ 50 οthеr sites асrοѕѕ Europe. A Nato official confirmed ...
Zimbabwe Guardian

ACLU warns of expanded spying powers in new GOP cybersecurity ...
By admin
McCain's bill, the Secure IT Act, would encourage companies to share information about cyberthreats with government agencies, including the National Security Agency (NSA) and U.S. CyberCommand. “The bill would allow the NSA to ...
Prison Planet.com

The Total CIO | Andy Blumenthal: Taking Down The Internet--Not A ...
By Andy Blumenthal, MBA, CIO, CEA, PMP, ITIL, A+
While The Cybersecurity Act of 2012, which encourages companies and government to share information (i.e. cybersecurity exchanges) and requires that critical infrastructure meet standards set by The Department of Homeland Security and industry are steps in the right direction, I would like to see the new bills go even further with a significant infusion of new resources ... Time is of the essence to get these cyber capabilities to where they should be, must be--and we need to act now .
The Total CIO | Andy Blumenthal

Episode 616 – Weekend Wrap-up with Dr. b0n3z | InfoSec Daily
By Dr Bones
Security 504: Hacker Techniques, Exploits & Incident Handling – Matt Romanek. When: June 20 – 27, 2012 ... "It was a highly targeted and precise attack, against known bad guys, randoms were left totally unscathed," The Jester blogged. The operation was intended to snare .... I agreed with others and personally participated in cyber attacks on the systems of HBGary and Fox resulting in a loss of more than $5000, and I knew my conduct was illegal. And so it went, down the list of ...
InfoSec Daily

SOSi wants to meet these professionals on March 16th at McLean ...
By Staff Editor
SIGINT Analyst – Darmstadt, Germany – TS/SCI. ~ Cyber Intelligence (CI) Analyst – Heidelberg, Germany – TS/SCI ... TONIGHT Sun 3/11 .. Ex #Mossad chief: #Iran rational; don't attack now -http://t.co/LCQBie6U ... Says Iran rational albeit not ...
USADefenseIndustryJobs.com

Cyber False Flag to Push for More Restrictive Laws? | NO LIES RADIO
By noliesradio
LulzSec was allowed to continue precisely for the reason Sabu mentioned – to provide the propaganda narrative required for a government push for draconian cybersecurity legislation. James Ball makes the argument for us. “From June to ... Sabu did not admit that he worked for the CIA. But it is interesting an FBI operative would tell a journalist that it makes sense for government to roll out acyber false flag in order to push for more restrictive laws designed to control the internet.
NO LIES RADIO

DailyTech - ACLU Attacks John McCain's Cybersecurity Bill
ACLU believes the bill would give U.S. government agencies access to civilian Internet activity.
www.dailytech.com/article.aspx?newsid=24181

More On CSA And Secure IT - Crossroads - Cyber Security Law and ...
Quick reminder: CSA=Cybersecurity Act of 2012, a cybersecurity bill from Senate Democrats that would put cybersecurity responsibility in the DHS' hands.
blog.cybersecuritylaw.us/.../more-on-csa-and-secure-it-.html

Senators Participate In Cyberattack Simulation - Dark Reading
U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New ...
darkreading.com/.../senators-participate-in-cyberattack-simulat...

White House wages mock cyberattack on NYC to push security bill ...
Senior White House officials late Wednesday held a mock cyberattack on New York City's power grid for a group of US senators, as part of the Obama ...
news.yahoo.com/white-house-wages-mock-cyberattack-nyc-p...

Splunk and the Cybersecurity Act of 2012 | Splunk Blogs
The bill was developed, “…in response to the ever-increasing number of cyber attacks on both private companies and the United States government.” The bill is ...
blogs.splunk.com/.../splunk-and-the-cybersecurity-act-of-201...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com