FBI Warning of Terrorist Cyber Attacks

FBI: Beware of Terrorist Cyber Attacks
DailyTech
During a Senate Appropriations subcommittee earlier in the week, FBI Director Robert Mueller had this to say, "While to date terrorists have not used the Internet to launch a full-scale cyber attack, we cannot underestimate their intent.
 
DailyTech

FBI on guard against terrorist cyber attacks
CNN International
"While to date terrorists have not used the Internet to launch a full-scale cyber attack, we cannot underestimate their intent," Mueller testified to a Senate Appropriations subcommittee in which lawmakers pressed him about what additional funding and ...

Cyber attacks signal dawning of a new military age
Haaretz
The Defense Ministry, correctly, did not elevate the threat level to the status of a "security situation": The attacks had neither the capability nor the effects of real cyber-terror. Even better: By the latter part of February, the Israeli-Arab ...

OMB: Slowing Federal Cyber Attack Growth Still 5X Greater than Private Sector
ExecutiveGov
The OMB said cyber attacks in the federal space were up by 5 percent over 2010 figures as federal agencies complied with 73 percent of cybersecurity policies. The agency conducted a report in cooperation with the US Computer Emergency Readiness Team ...

BBC Persian Service Suffers Sophisticated Cyber Attack
RedOrbit
British Broadcasting Corporation (BBC) director-general Mark Thompson reported on Wednesday that the site had suffered a sophisticated cyber-attack recently. Thompson said that hackers attempted to jam the satellite feeds of BBC services into Iran and ...

BBC Alleges Cyber Attack
NASDAQ
(RTTNews.com) - BBC director general Mark Thompson has claimed, without any substantial proof, that Iran is the culprit behind a cyber attack at the network. "It . . . may prove impossible, to confirm the source of these attacks, though attempted ...

Increase in cyber attacks on federal systems slows
Federal Times
Federal agencies suffered 43889 cyber attacks in 2011, up from 41776 the previous year, according to a report by the Department of Homeland Security's US Computer Emergency Readiness Team (US-CERT). Agencies have adopted more performance-based metrics ...

Middle East plans to build a cyber-stronghold
Help Net Security
The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world's oil and gas production and distribution operate from systems that are increasingly vulnerable. This means acyber-attack ...

Help Net Security

Cyber attacks on federal websites drop off
FederalNewsRadio.com
Cyber attacks against federal websites and networks went up only 5 percent between 2010 and 2011. That's a major improvement from the 40 percent jump in attacks between 2009 and 2010. Those are the latest numbers out from Homeland Security's US ...

Syria hack signals evolution of cyber warfare
Globe and Mail
“That could possibly be a significant turning point in the development of cyber warfare.” Some security experts doubt Syria's fragmented opposition would have had the capacity to access the e-mails without outside help, but others say those in power in ...

Globe and Mail

Cybersecurity Legislation Should Force US Government to Listen Less and Speak More
The Atlantic
There is even talk of forcing cyber monitoring by the National Security Agency upon them. Yet there are more effective and less constitutionally troubling options if the administration is bold enough to take them. Two recent articles by Ellen Nakashima ...

The Atlantic

Want to be a cyber pro? DOD might have a scholarship for you.
GCN.com
Colleges and universities have offered computer science programs since the days of punch cards, but the integration of computer science with security, law, law enforcement, public policy and all things cyber began getting under way in just the last few ...

Top training provider responds to the UK business challenge for delivering ...
Einnews Portugal
/EINPresswire.com/ Ely, England, 15 March 2012 - In the last few months there has been an ongoing discussion regarding the cyber security challenges faced by the UK in particular, but also by the rest of the world. It intensified with the publication ...

Energy Dept. Relaunches Job Board, Targeting Cyber Workforce
ExecutiveGov
The Energy Department has relaunched its job search site as it looks to add morecybersecurity and nuclear engineering talent to its ranks. Mike Kane, chief human capital officer, told Federal News Radio that online visitors to the department's website ...

WILLIS GROUP HOLDINGS PLC : Willis: Boards need to wake up to cyber threats ...
4-traders
London, UK, March 15, 2012 -Company Directors must wake up to cyber threats or they risk litigation from all sides, according to Francis Kean of Willis Group Holdings (NYSE:WSH), the global insurance broker. Speaking at a Willis-hosted cyber liability ...

DHS Cyber Lead Plans to Hire 'All-Star' Staff
ExecutiveGov
Since then, Weatherford appointed John Streufert director of the department's nationalcybersecurity division Jan. 17. Weatherford told GovInfo Security in a recent interview at the RSA Conference 2012 that he aims to create an all-star cyber team for ...

Governments must recruit underground for cyber security
TechEye
The Indian government will continue to be attacked until officials begin to recruit hackers from the underground, a cyber security specialist has said. Speaking to TechEye, our source, under anonymity, said: "As wars and disputes rage, the underworld ...

'Protect you computer NOW': Anti-virus experts in red alert over new breed of ...
Daily Mail
By Rob Waugh A new cyber attack found on Chinese websites can overwhelm Windows PCs - and the only way to stop it is to ensure your machine has the latest security 'patch'. Security experts Sophos say that all PC users should be on 'high alert'.

Daily Mail

Broadband minister launches Cyber Defence University Challenge
CSO Magazine
Australia's first national cyber security competition, the 2012 Cyber Defence University Challenge, was launched today by broadband minister Senator Stephen Conroy. The Challenge runs for 24 hours on 3 to 4 April, and will test the cyber ...

Exponential Growth in Internet Usage Across Varied Segments Boosts Security ...
Technology Digital (press release)
Increased usage of internet and the presence of abundant cyber attack prone devices, is primarily stimulating growth in the security software market. The report commences with an overview of the overall market in India, listing of key reasons for ...

NNSA CIO Prioritizing Cloud, Cyber
ExecutiveGov
National Nuclear Security Administration Chief Information Officer Robert Osborn has developed a three-step plan for improving the agency's information technology infrastructure, Federal News Radio reports. Osborn, in office for a year, ...

NSA calls for more cybersecurity research
FederalNewsRadio.com
Moving Target is research and development that aims at creating a "dynamic attack surface to an adversary" that will increase the work needed to launch a successful cyber attack. The symposium will attempt to answer the question: "Is there scientific ...

2012: The Year of Cold Cyber Warfare
CSO Magazine
Today, we are escalating towards a far darker cold cyber war era, 2012 is going to have a dark side. In any war, forces normally take time to align and marshal. In the cyber world, the most powerful organisations have been doing this for years.

US Serious About Cybersecurity--Several Measures Proposed
Infoboom
Top government officials appear to finally begin paying much more attention to cyber threats. In a series of public meetings and classified closed-door meetings, FBI Director Robert Mueller, members of the Defense Department, and White House National ...

IRS warns of tax season cyber scams
FederalNewsRadio.com
One of the newest threats involves a phishing attack. A phony email that appears to be from IRS tells recipients that they will be fined up to $10000 for failing to file their tax return on time. It then directs you to a fake website where scammers and ...

InfoSec Institute Outlines Todays Top IT Security Threats and the Most ...
Broadcast Newsroom
A risk-based, continuous approach to security can make risk visible, measurable and actionable. Through proper training and best practice adoption, security professionals can protect their IT environments today and tomorrow. Cyber-crime continues to ...

FBI Tells Corporate Execs To Defend While DARPA Prepares To Attack
Security Pronews
While DARPA contends it is not abandoning the concept of defense, they admit it is "easier to play offense than defense in cyber." Their evidence is convincing as well, pointing out that security software can consist of nearly 10 million lines of code ...

USEUCOM Facebook page breached by Chinese spies
OhMyGov! (blog)
By Jack B. Winn Mar 16 2012, 11:16 AM Military officials in Britain, Canada, Australia and the United States are eating humble pie, following the penetration of NATO's Facebook page by Chinese cyber spies. According to Australian website “The Age”, ...

Assessing the Impact of an Israeli Attack on Iran
TheStreet.com
We may also learn that Israel will have paired these strikes with cyber initiatives and other measures in an unprecedented display of tactical ingenuity. America's role may be unknown at first, but Iran's response would deepen the sense of crisis...

TheStreet.com

Stephen M. Walt: Robert Kaplan to the rescue?
Foreign Policy (blog)
I've never paid much attention to forecasts and analysis from Stratfor, the for-profit strategic analysis firm that was rocked by a cyber-attack in December 2011 that compromised its customer data base. I wasn't willing to pay their premium prices,...

Foreign Policy (blog)

Anonymous Denies Authoring Linux OS
Sci-Tech Today
By Barry Levine Graham Cluley, senior technology consultant at security firm Sophos, said more than 20000 users may have already downloaded the Anonymous OS. He wondered "why would anyone want to put their trust in a piece of unknown software, ...

Sci-Tech Today

Total Defense 2011 Threat Report: An Open Door to Malware
MarketWatch (press release)
"The malware landscape is changing at a rapid pace with cyber-criminals producing newmalware variants at an exponential rate," said Lipman. "The proliferation of consumer digital devices for convenient Internet access coupled with our global ...

Total Defense 2011 Threat Report: An Open Door to Malware
Business Wire (press release)
(BUSINESS WIRE)--Total Defense, Inc. today announced the findings of its 2011 InternetSecurity Threat Intelligence Report, which indicates Android's rise in market share was only surpassed by the amount of malware targeted at Android devices.

Nuclear Regulatory Commission Chairman Jaczko to Speak at GovSec on Critical ...
MarketWatch (press release)
His speech -- which will focus on the NRC's approach to physical security for nuclear reactors, fuel cycle facilities and nuclear material, as well as new initiatives in cybersecurity and counterintelligence -- will take place on Wednesday, ...

Apple Safari Patch Shows Products Not Hacker Proof
CRN
"There are a couple of takeaways from this, the first being that Apple products are 'hacker proof' is a myth," Marcus Carey, security researcher at Rapid7, said in an e-mail. The second takeaway is the need to manage the use of Apple laptops, ...

Middle East's First Online Restaurant Gateway Launched at Taste of Dubai 2012
Sacramento Bee
Dr. Baggili, who brings with him more than 13 years experience in the technology realm, including a PhD in Cyber Forensics and his family's extensive involvement in the catering industry within the UAE, leveraged his expertise to apply some of the most ...

FBI on guard against terrorist cyber attacks – CNN Security ...
By crattyc
"While to date terrorists have not used the Internet to launch a full-scale cyber attack, we cannot underestimate their intent," Mueller testified to a Senate Appropriations subcommittee in which lawmakers pressed him about what additional ...
CNN Security Clearance

Black Hat 2012 and Space Cybersecurity | Space Safety Magazine
By Rachel C. Samples
The focus for security can extend from mobile devices to computer networks to GPS. The conference hosts a number of representatives from web browsers like Mozilla, and those that run anti-viruses, but many are not aware of the recent cyber ...
Space Safety Magazine

eConflicts: Report - Occupying the Information High Ground
By Daniel Ventre
eConflicts, blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare. Total Pageviews. Sparkline. Friday, March 16, 2012. Report - Occupying the Information High Ground. A new report is available, titled "Occupying the information High Ground: Chinese capabilities for Computer Network Operations and Cyber Espionage" (Report prepared fir the U.S.- China Economic and Security Review Coommission by Northrop Grumman Corp.) (March 7, 2012.
eConflicts

IT Security: Physical, not Just Cyber | isssource.com
By gHale
Cyber Security Bill Launches in Senate ... Later in the night when an attack on the network launches, the attacker can have a higher degree of confidence immediate response on the part of the IT team may not be forthcoming, he said.
isssource.com

Top training provider responds to the UK business challenge for ...
By Blackmere
Top training provider responds to the UK business challenge for delivering core cybersecurityskills – PR Inside. Published March 16, 2012. EINPresswire.com/ Ely, England, 15 March 2012 - In the last few months there has been an ongoing discussion regarding the cyber securitychallenges faced by the UK in particular, but also by the rest of the world. It intensified with the publication of the ... Read More. Comments are closed.
Blackmere Consulting

Concurring Opinions » Cyber stalking and cyber harassment, a ...
By Danielle Citron
Cyber stalking and cyber harassment often involve explicit or implicit threats of violence, calls for others to hurt victims, privacy invasions, defamation, impersonation, and/or technological attacks. The abuse tends to ... According to the Bureau of Justice Statistics, an estimated 850000 people in 2006 experienced stalking with a significant online component, such as threats over e-mail and text, attack sites devoted to victims, and/or harassment in chat rooms and blogs.[i] A special 2009 ...
Concurring Opinions

CIA and the intelligence components of the things | Security Affairs
By paganinip
Security is everyone's responsibility. Home · Contact me ... Obviously, these aspects should be studied and should be called a cyber strategy that takes into account the intelligence components of the things that surround us. CIA Director David ...
Security Affairs

BBC Persian service victim of 'sophisticated cyber-attack' by Iran ...
The BBC boss Mark Thompson (pictured) is expected to discuss what he described as the Iranian government's attempt to 'undermine' the service tonight.
www.dailymail.co.uk/.../BBC-Persian-service-victim-sophistica...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com