Hardware imported from China could leave US open to cyber-threats

Hardware imported from China could leave US open to cyber-threats
ZDNet (blog)
By Adrian Kingsley-Hughes | March 30, 2012, 6:13am PDT Summary:Cybersecurity advisor Richard Clarke warns that imports of chips, routers and hardware from China and other foreign suppliers could leave the US open tocyber-attacks and cyber-threats.

ZDNet (blog)

FBI's Outgoing Cyber Cop Says Americans Don't See Size Of Threat
NPR (blog)
by Carrie Johnson The FBI's top cyber cop retires today after nearly a quarter century in federal law enforcement. Shawn Henry started looking into computer issues in the run up to Y2K (the arrival of the year 2000). He says that experience left him ...

China refutes cyber attack charge
Firstpost
The Chinese defence ministry, while refuting the allegations, has stressed that it is in the common interests of the world to responsibly safeguard international cyber security, the China Daily reported. A report by US Northrop Grumman for the US-China ...

Firstpost

North Korea cyber attack capabilities seen as a threat to west
domain-B
North Korea has now added cyber attack capabilities to its arsenal of threatening weapons and this year, could offer plenty of opportunities for military provocations from Pyongyang, starting with a controversial rocket launch next month, ...

FBI's Outgoing Cyber Cop Says Americans Don't See Size Of Threat
North Country Public Radio
As he retires and heads into the private sector, Shawn Henry looks back at the growth in the cyber crime problem. Republican Gov. Scott Walker ran into voter backlash last year after he signed a law stripping public employees' unions of collective ...

Cyber attack on Pak's FTO website by 'Indian' hackers
Oneindia
Islamabad, Mar 30: A section of Pakistan's Federal Tax Ombudsman (FTO) website has been hacked on Friday, Mar 30 by Indian hackers, said media reports. According to media reports, the hackers have hacked one section of the website titled 'About FTO' ...

Oneindia

Who's Responsible For Meeting The Cyber Threat?
Scientific American (blog)
By Alan Woodward | March 30, 2012 | Recently an old colleague, Dr Andrew Rogoyski, came to lecture to our MSc students on how government deals withcyber security. Dr Rogoyski has studied the interactions between government and industry and his talk ...

Scientific American (blog)

Federal Watchdog Criticizes BPA's Cyber Security
OPB News
The federal auditor is concerned BPA is not well-enough equipped to handle a cyber attack. And the years-long review also dinged BPA for security gaps. That could jeopardize the regional electricity grid and in the worst case black out customers.

Cyber attacks on India linked to a Chinese hacker: Trend Micro
Hindu Business Line
Information technology security solutions firm Trend Micro has claimed that a Chinese hacker is responsible for cyber attacks on Government of India, military research organisations and shipping companies. According to Mr Baburaj Varma, Head (Technical ...

Hindu Business Line

Expert Says US May Be Losing Cyber War
Social Barrel
A report in the Smithsonian magazine today said at least one US counter-terrorism expert has warned that America must wake up to the fact that cyber terrorism is the most persistent threat the US is facing today, and may already be losing it if waking...

Social Barrel

Is Iran using hackers to attack the foreign press?
GlobalPost (blog)
The BBC said Thursday it was targeted in an Iran-based cyber-attack on March 1. Thought to be a DDoS attack, some parts of the BBC were unable to access their email or other internet services. BBC Director General Mark Thompson said the internet attack ...

Latta to talk Cyber Crime with FBI in Perrysburg
WTOL.com
Cyber Crimes have become a top priority in national security and Latta says they want to help area businesses from getting attacked. The FBI says the challenge is detecting Cyber Crime in it networks that have been hacked and determining where the ...

China claims to be victim of rising global cyber attacks
Press TV
China has been accused of doing massive cyber espionage. However, a recent computer security report says that China becomes the victim of the global cyber attack. Some experts are in fact convinced that Chinese cyber defense is not so efficient.

Press TV

SECURING AMERICA: BRACING FOR ANOTHER CYBER ATTACK
FOX News Radio
According to investigators at Symantec, a California-based computer security firm, the discovery of a new strain of DUQU shows the attackers are still active. DUQU acts like an advance team, one that steals data to lay the foundation for a majorcyber ...

FOX News Radio

Online voting not secure, cyber experts say
Washington Times
Lulz Security has stolen mountains of personal data in about a dozen different hacks, embarrassing law enforcement on both sides of the Atlantic. (Associated Press) Thirty-three states are planning to allow some form of Internet voting in November's ...

Washington Times

FBI: 'We are losing to hackers'
RT
Henry has gone on record saying hebelieves “the cyber threat is an existential one, meaning that a major cyber-attack could potentially wipe out whole companies,” said Henry on the FBI news website. The special agent since 1989 echoed his thoughts ...

RT

M'sia loses RM2.75 billion to cyber crime in five years
The Borneo Post
To make matters worse, Malaysians have an average awareness of cyber security that leaves plenty of room for enhancement. CyberSecurity Malaysia head of business development Mohd Anwer Mohamed Yusoff said loss of information particularly that involving ...

Threat of a Bullet in the Face Keeps Cybercrooks Cautious
PCWorld
Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. But it was the head of the USCyber Consequences Unit's take on why cybercriminals are actually ...

Cyprus ready for any net attack by Anonymous
Cyprus Mail
Cyber-security experts tell the Mail that while crippling the 13 top-level DNS servers is theoretically possible, it's a long shot. Even if Anonymous did pull it off, the disruption would last a few hours, if that. “ISPs possess the countermeasures to ...

Co-sponsors Top 100 for the Rogers-Ruppersberger Bipartisan Cyber Bill
DirectionsMag.com (press release)
The Rogers-Ruppersberger Cyber Security Bill continues to gather broad based bipartisan support. Chairman Mike Rogers and Ranking Member CA Dutch Ruppersberger today announced that over 100 Members of Congress are supporting The Cyber Intelligence ...

Former Pentagon Official Says All US Military Electronics From China Could ...
Business Insider
Clarke recently spoke to Ron Rosenbaum at Smithsonian Magazine and told him the government is slipping up again, that while we now have the ability to coordinate a successful cyber war, like slipping the Stuxnet virus into Iran's nuclear system, ...

Business Insider

Cybersecurity a growing issue for utilities
PennEnergy- Energy News (press release)
The US has seen a growing interest in cybersecurity even over the past year, with a number of high-profile cyber attacks occurring in 2011. Risk magazine reports that the country's electric power distribution system has become an important focus of ...

House Republicans' cyber bill promotes information sharing
Federal Times (blog)
Two Republican congresswomen introduced a cybersecurity bill this week that promotes information sharing and aligns closely with legislation sponsored by Sen. John McCain, R-Ariz. Reps. Mary Bono Mack, R-Calif., and Marsha Blackburn, R-Tenn., ...

A Call to Action on cybercrime!
Finextra
While counter-fraud groups such as the NFA's 'Fighting Fraud Together' and Get Safe Online are a positive step, and while it's good to hear yesterday that the European Commission is going ahead with plans for a Cyber Crime Centre, what's striking to me ...

Chinese Grad Student Hacks Indian Military Research Firms
New York Times (blog)
Amid a raging debate about who should be blamed for leaking the letter, India's cyber security is actually under attack, from a Chinese former graduate student who now works for Tencent, China's leading internet portal company. A report released Friday ...

Global cyberattacks linked to Chinese LuckyCat hacker group
Wired.co.uk
By Mark Brown Security firm TrendMicro has linked a series of cyber attacks in Japan, India and Tibet to a Chinese hacker group called Luckycat, and revealed one of the group's members to be a Chinese university student. The LuckyCat campaign has been ...

Wired.co.uk

Chinese giant put on hold
Adelaide Now
In January ASIO director-general of security David Irvine told the Sydney Institute of the rising global threat from cyber espionage. "Espionage targets include national secrets, valuable intellectual property, commercial intelligence and information ...

Hardware imported from China could leave U.S. open to cyber ...
Cybersecurity advisor Richard Clarke warns that imports of chips, routers and hardware from China and other foreign suppliers could leave the U.S. open to cyber-attacks and cyber-threats. View full ... View full post on National Cyber Security ...
Gregory D. Evans

Batten down the hatches: Anonymous – Coming Soon to Your ...
By Dennis Usle
As security professionals facing the rising tide of threats, many of us find ourselves researching and implementing next-generation perimeter defenses. ... that has been tailored for the task. The unique offering of Radware AMS also includes a full -blown SIEM for log collection, aggregation, correlation alerting and reporting. To further enhance and differentiate, the Radware AMS offering is backed by a dedicated 24/7 Emergence Response Team with expertise in cyber attackmitigation.
Radware Blog

FBI Cyber Chief Says U.S. Losing War Against Hackers | The Hacker ...
By noreply@blogger.com (THN Reporter)
FBI Cyber Chief Says U.S. Losing War Against Hackers. THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability.
The Hacker News [ THN ] - Updates...

Commerce Seeks IT Networkers For NIST, Maryland Cyber Lab
By Katelyn Noland
Commerce Seeks IT Networkers For NIST, Maryland Cyber Lab. Site: NIST.gov. The National Institute of Standards and Technology announced in February that it will partner with the state of Maryland to establish a cybersecurity center near ...
The New New Internet

MasterCard Data Security Issue | Edmund W. Schuster
By Edmund W. Schuster
MasterCard Data Security Issue. Though details are sketchy, there seems to be another seriouscyber attack designed to gain private information. This article provides few details on what could be a major problem: Johnson, Andrew R., 2012.
Edmund W. Schuster

New Survey Reveals That Your Employees May Be Most Likely to ...
By Jordan Brown
If you have a large or small business, you might be fearful of cyber crooks hacking through your IT defense. However, a new report (by the Ponemon Institute, sponsored by Trend Micro Inc) states that's not how data thefts ... Nearly 70% surveyed (709 U.S. IT & IT security experts) either agreed or strongly agreed their current security system could not ward off a hacker attack. 56% said even if employee's mistakes are accidents, data thefts were discovered accidentally! What makes data ...
Small Business Technology

Media Review for March 30, 2012 | Africa Center for Strategic Studies
By Africa Center for Strategic Studies
2009 Security Sector Engagement Photos · Sitemap · About .... Among the Algerian institutions that faced a cyber attack early Tuesday was the Algerian Tax Department (Direction Générale des Impôts or DGI). The North Africa Journal ...
Africa Center for Strategic Studies

3/29/2012: Video game Technology, STEM Apps, and More
By AlexOlesker
More here. In a submission to the Senate Armed Services Committee, General Kieth Alexander of the NSA and U.S. Cyber Command said that China was behind last year's attack on RSA's SecureID token system. More here. Share this: Email ...
FedCyber.com

An Ethical Hackers View On The Dangers Of Mobile Malware ...
By Jaime Blasco
... to the valuable data they're carrying on their phones. Using a combination of SMS and social engineering tactics, hackers can spoof the phone number of a friend or a colleague to send an SMS asking the victim to click on a suspicious link etc, and opening up the phone to attack. ...Recently he ran a Cyber Warfare conference for the Head of Defence in Spain demonstrating attacks in real time and showing how to defend against them. He's also a regular contributor to Hakin9 and ...
Business Computing World

Expert insights 3: Cyber threats and security in the Caribbean | ICT ...
By mmarius
Aaron Manzano, of HMP Consulting in Trinidad and Tobago, and a IT/network security expert, continues our Q&A series on cyber security in the region. The only truly secure system is one that the development process is controlled from the ...
ICT Pulse

Richard Clarke: All U.S. Electronics From China Could Be Infected ...
By John Reed
Well, former U.S. counter-terrorism czar –currently running his own cybersecurity firm — Richard Clarke is coming out and saying that all electronics made in China may well have built-in trapdoors allowing Chinese malware to infect American systems ... What's to stop real parts made in China from carrying an equally dangerous cyber trapdoor? ... “My greatest fear,” Clarke says, “is that, rather than having a cyber-Pearl Harbor event, we will instead have this death of a thousand cuts.
Defense Tech

Delimiter – Huawei contract ban stokes fear of cyber cold war
By The Guardian
The company announced this week it had been banned from tendering for contracts in Australia's A$38bn (£24.7bn) National Broadband Network (NBN) because of cybersecurityconcerns. Then it emerged that ... Against that background, the New York Times says Symantec had become concerned that, as the US government shifted an information-sharing program about cyber threats to the control of the department of homeland security, it would be frozen out. For a company reliant ...
Delimiter

Cybersecurity and the Warfare State | RedState
In a small safe in my basement rests a government-issue .45 caliber pistol. When I tell friends that I inherited this piece from my father, they assume he carried it ...
www.redstate.com/.../03/.../cybersecurity-and-the-warfare-state...

Turkey warned against potential cyber attacks | Cyber Warzone
TÜBİTAK has warned Turkish authorities that the country should be ready against potentialcyber attacks and that current studies in Turkey on how to respond to ...
www.cyberwarzone.com/.../turkey-warned-against-potential-c...

Cybersecurity's 8-Step Plan for Internet Freedom | Center for ...
Cybersecurity is important to all Internet users because it can make the Internet a safer place to shop, conduct business, and communicate with others. However ...
https://www.cdt.org/.../2803cybersecuritys-8-step-plan-internet...

Increasing Cyber Threats Call for More Innovative Cybersecurity
Eric Cole, a Booz Allen Hamilton Principal, is an industry-recognized security expert with over 20 years of experience in information technology with a focus on ...
www.boozallen.com/.../cyber-threats-innovative-cybersecurity

US-CERT - About Us
US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyberinformation sharing, and proactively manage cyber risks to the nation while ...
www.us-cert.gov/about-us/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com