Cyber attacks, cyber infection, and cyber security

Iran and the era of cyber infection
Washington Post (blog)
Within the Defense Advanced Research Projects Agency (DARPA), there are already steps afoot to integrate hacking into the defense arsenal of the nation, as well as efforts to take on offensivecyber-attack capabilities. There are obvious advantages to ... 

Defence groups move to cybersecurity
Financial Times
Cyber attacks by well-resourced, highly capable and relentless, usually state-sponsored attackers – so called advanced persistent threats – are growing. The best known example is Stuxnet, which was aimed at Iran's nuclear centrifuges and is widely...

Financial Times 

Richard A. Clarke on “Cyber War” Engagement | The State of Security
By David Spark
He's also the author of the new book, “Cyber War: The Next Threat to National Security and What to Do About It.” Clarke's book “Cyber War” introduces the concept of how future militaries could usecyber attack tools, not merely for disruption, ...
The State of Security 

What a WWII battle can teach about cybersecurity | AHDN Newswire
By Larrie Wright, AHC
“In many respects, in cyber that's where we're at today – we've got a very broad battle space that constitutes DOD's cyberspace, surrounded by a broader, expanding Internet.” Simpson spoke March 9 at an event sponsored by AFCEA's ...
AHDN Newswire

Chinese Cyber Attacks on Britain's biggest Defence Company ...
CHINESE spies hacked into computers belonging to BAE Systems, Britain's biggest defence company, to steal details about the design, performance and ...
cyberwarzone.com/.../chinese-cyber-attacks-britains-biggest-d...

Cambridge student wins 'Hack Idol'
Register
Exercises included advising a start-up on cyber security during a role-playing exercise and fending off a 50-minute-long simulated cyber attack. The simulated attack involved port scans, followed by attacks on a vulnerable webserver, defacement, ...

Cyber spies attack Nato using Facebook
Inquirer
By Robert Jaques CYBER SPIES allegedly based in China have been accused of using social networking web sites to target Nato's top-ranking military commander. Admiral James Stavridis, Supreme Allied Commander Europe (Saceur) was attacked repeatedly via ...

Cyber snoopers target NATO commander in Facebook attack
Register
By Phil Muncaster • Get more from this author NATO's most senior military official has come under a concerted cyber attack from hackers believed to be operating from the People's Republic of China. The Observer reported on Sunday that cyber fiends had ...

Meet the next generation of bright sparks ready to save us from cyber attack
The Independent
Instead this is the dramatic final of the Cyber Security Challenge, an annual competition held on an industrial estate on the outskirts of Bristol to find seemingly ordinary people with extraordinary IT skills. More than 4000 amateurs entered this year ...

UK cyber-security 'champion' announced
TG Daily
A teenage student has been crowned Britain's cyber-security champion, following a competition helpd by government intelligence organization GCHQ. The competition, open only to non-professionals, was designed to attract new talent into thecybersecurity ...

TG Daily

GCHQ-backed competition names Cyber Security Champion
BBC News
By Leo Kelion Technology reporter A 19-year-old university student has been named the UK's "Cyber Security Champion" following a competition sponsored by the intelligence agency GCHQ and several leading tech firms. Judges said Jonathan Millican had ...

BBC News

Teenager crowned UK cybersecurity champion
ZDNet UK (blog)
By Tom Espiner , 12 March, 2012 14:35 A teenage university student has won a GCHQ-backed competition designed to find and encourage UK cybersecurity skills. Jonathan Millican has been named the UK Cyber Security Challenge (UKCSC) winner.

ZDNet UK (blog)

Amateurs hunt malware, perfect firewalls and fend off mock hacks in UK cyber ...
Washington Post
The exercises, dubbed the Cyber Security Challenge, are intended to help bridge that gap, drawing thousands of participants who spent weeks shoring up vulnerable home networks, cracking weak codes and combing through corrupted hard drives in a series ...

Feds need to elucidate cyber threat before demanding more power
FierceCIO
Discussions surrounding the latest cyber-related initiatives on Capitol Hill are no exception. TheCybersecurity Act of 2012, introduced in February by Sen. Joe Lieberman (I-Conn.), would create risk-based security standards by giving the Department of ...

Teenager wins government-sponsored hackathon
Sydney Morning Herald
AP Cambridge University student and UK Cyber Security Champion Jonathan Millican poses with his trophy at the Science Museum in Bristol, England on March 11, 2012. UK-sponsored cyber security challenge draws 4000 would-be hackers.

Sydney Morning Herald

Commentary: The government needs to step up efforts to protect cyber ...
Washington Post
For instance, the bipartisan Senate Bill 2105 would require owners of the most critical infrastructure to meet certain cybersecurity requirements and give regulatory authority to the Department of Homeland Security. Among other things, it would ...

Kratos RT Logic Introduces the First Cyber Security Event Manager Designed for ...
defpro
CyberC4:Alert provides network administrators and information security officers with real-time situational awareness and incident response for cyber security situational awareness and mission assurance. RT Logic is a leading provider of innovative ...

Chinese cyber-spies set up fake Facebook profile to 'friend' top NATO officials
National Post
Using similar ploys, Chinese spies are believed to have breached the cyber-defences of the British defence contractor BAE, and over a period of 18 months stolen vast details of the F-35 Joint Strike Fighter, a multinational effort including Canada to ...

National Post

Lancope StealthWatch Integrates with Cisco Identity Services Engine to Expand ...
Sacramento Bee
Additionally, to help mutual customers with contextual awareness for advanced cyber threats, the StealthWatch platform will access feeds on identity and device data from the Cisco ISE. "Alongside Borderless Networks and a seamless user experience, ...

Cybersleuths battle malware, hackers
News24
The woman behind Britain's second annual cyber security challenge says the games are intended to pull talent into Britain's undermanned electronic defence sector. Event director Judy Baker says the expansion in cybersecurity work was threatened by a ...

Who should protect networks? Lawmakers are deadlocked
Federal Times
With two vastly different Senate cybersecurity bills — one of which is expected to reach floor debate in the next several weeks — circulating in Congress, the tactics that would best slow the advance ofcyber attackers are the subject of fierce ...

Former hacker explains why websites are targeted
BBC News
James Jeffrey from the West Midlands told magistrates he launched the cyber attackon the British Pregnancy Advisory Service after two women he knew decided to have abortions. His arrest came after seven alleged hackers based in the US, the UK and the ...

BBC News

Anonymous's Anti-Abortion Raid: Anon Admits to Attack on Service's Website
IBTimes UK
By Alastair Stevenson: Subscribe to Alastair's RSS feed A hacker alleging to have links to the Anonymous collective has confessed to a recent pro-life attack on the UK's largest abortion service. James Jeffery, a 27-year-old from the West Midlands ...

IBTimes UK

Anonymous Hacks Islamist Party's Facebook Page
AllAfrica.com
... was hacked last night by a Tunisian group claiming affiliation with the international cyber activist collective Anonymous. A representative of the Tunisian Anonymous group, calling himself "CaliforniaKB," said that the attack was motivated by the ...

Demi Lovato Lashes Out At Haters On Twitter
Hollywood Life
Demi took it to Twitter to speak out about cyber bullying! Do you think she went too far? Demi Lovato wants haters on the web to stop bullying. The 19-year-old went off on a Twitter rant early in the morning today, March 12, about how awful cyber ...

Your Employees May Be Causing That Data Drip, Drip, Drip You're Hearing
TechNewsWorld
"Despite growing concerns about cyber crime, only 8 percent report an external attack as the primary root cause of a data breach experienced by their organizations," the researchers wrote. After flipping the leader of LulzSec, an offshoot of the hacker ...

Pregnancy Advisory Service hacker pleads guilty
Inquirer
The BPAS web site was hacked and defaced on 8 March, 2012 in what looked like a sophisticatedcyber attack by an anti-abortion extremist. "This incident appears to be the most extreme example of what is now a very concerning escalation in anti-abortion ...

Phishing Scam Attacked OSU Faculty and Staff
SPAMfighter News
Faculty and staff at Oklahoma State University (OSU) are receiving phishing e-mails and calls fromcyber crooks in the guise of American Express Credit Card, and being questioned over private information related to their OSU purchase card, or P-card, ...

Mobile Malware Multiplies 150 per cent
MobileMarketing Magazine
“Cyber criminals attack where there is profit,” says Eddy Willems, G Data security evangelist. “It may therefore be no surprise that malware writers are focusing more attention on smartphones and tablets, as more and more people are using these devices ...

DOE proposes cybersecurity risk management process for electric energy industry
FierceGovernmentIT
... Security Management Act implementation; however, neither document specifies a set of securitycontrols. Rather, both documents describe a method organizations are supposed to use when framing, assessing, responding to and monitoring cyber risk.
Anonymous Defaced New York Ironworks Website & Leaked Source ...
By VOGH Reporter
VOGH- VOICE OF GREYHAT| Leading Resource of Cyber-Security & Hacking News. VOGH- ... As a result New York Ironworks, a supplier of police equipment and tactical gear based in New York City became the victim of cyber attack. Where ...
VOGH- VOICE OF GREYHAT| Leading...

'Anonymous' and the question of authenticity | AntipodeFoundation.org
By Antipode Editorial Office
Anonymous's action – what's known as a 'distributed denial of service' (DDoS) – was widely decried in the popular media as a cyber-attack (see, for example, Williams 2012). Writing about DDoSs, lawyer Jay Liederman argues that: “There's ...
AntipodeFoundation.org

FedCyber News for 3/12/12: FBI Cyber Chief Retiring, VA's Mobile ...
By AlexOlesker
Shawn Henry, the FBI's Executive Assistant Director of Criminal, Cyber, Response, and Services Branch, announced his retirement to take a job in the private sector. Henry is the latest in a string of top cyber ... More here; The Department of Energy is seeking comment on their cybersecurity risk management plan for the electrical grid, based on NIST guidelines. More here. Share this: Email ...Previous post: FedCyber News for 3/9/12: New U.S. CTO, Chinese Cyber Warfare, and More ...
FedCyber.com

Cyber snoopers target NATO commander in Facebook attack ...
NATO's most senior military official has come under a concerted cyber attack from hackers believed to be operating from the.
ManmadeMag Tech RSS

ACLU warns of expanded spying powers in new GOP cybersecurity ...
By GottaLaff
Apparently the ACLU agrees, because they're not thrilled with John McCain's new cyber security bill, saying that it would set a new precedent… a bad one. We do need a way to protect ourselves fromcyber attacks, but again, the arguments ...
The Political Carnival

Amateurs battle malware, hackers in UK cybergames - seattlepi.com
The games are intended to pull badly-needed talent into the country's burgeoning cybersecuritysector, according to former security minister Pauline Neville-Jones, who spoke at a closing ceremony held Sunday at the Science Museum in the ... The exercises, dubbed the Cyber Security Challenge, are intended to help bridge that gap, drawing thousands of participants who spent weeks shoring up vulnerable home networks, cracking weak codes and combing through corrupted hard ...
Business Heds Index

cryptogon.com » DOJ Asks Court To Keep Secret Any Partnership ...
By Kevin
DOJ's legal team said that acknowledging whether NSA and Google formed a partnership from a cyber attack would illuminate whether the government “considered the alleged attack to be of consequence for critical U.S. government ...
cryptogon.com

Il mercato dei cyber-armamenti (parte terza) | Silendo
By Silendo
Il Financial Times ritorna ad occuparsi degli investimenti crescenti che grandi aziende di armamenti* effettuano nel settore cyber e delle risorse che gli Stati dedicano alla sicurezza informatica. The end of a decade of war and prosperity is proving ... In doing so, they will have to adapt to a faster moving, more dynamic business than they are used to, says William Beer, PwC's director of the information and cybersecurity practice. But, he added: “If they [defence contractors] make the ...
Silendo

Georgetown Security Law Brief: ACLU warns of expanded spying ...
By Georgetown CNSL
McCain's bill, the Secure IT Act, would encourage companies to share information about cyberthreats with government agencies, including the National Security Agency and US Cyber Command. HT to Neal R. Sonnett. March 12, 2012 at ...
Georgetown Security Law Brief

GOM Media Player v. 2.1.37 vulnerable to Buffer Overflow Attack | e ...
By BreakTheSec
... News Organization. EHN delivers the latest news on Security breaching, vulnerability,Cyber Security and Penetration testing tools and more. ... 2.1.37 vulnerable to Buffer Overflow Attack ...Version 2.1.37 found to be vulnerable to this attack.
E Hacking News | Hacker News...

Amateurs battle malware, hackers in Britain's cybergames ...
By Jimmy Peterson
The simulations were part of a challenge - called the Cyber Security Challenge - which is essentially aimed at attracting thousands of non-professionals in the cybersecurity arena who make relentless attempts not only to shore up vulnerable ...
TopNews Singapore

Shining LIGHTS on ICS Cybersecurity
Shining LIGHTS on ICS Cybersecurity. As we wrestle through our critical infrastructurecybersecurity conundrum we talk a lot about Big Electricity, Big Oil and ...
www.infosecisland.com/.../20649-Shining-LIGHTS-on-ICS-C...

Cybersecurity malware hackers computer viruses infrastructure ...
Last Wednesday, in an attempt to bolster support for cybersecurity legislation, the White House staged a mock cyberattack on New York City's power supply for ...
www.homelandsecuritynewswire.com/dr20120311-nyc-cyber...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com