Microsoft raid targets cyber Mafia

Microsoft raid targets cyber Mafia
CNN
Microsoft seized command and control servers and hundreds of websites used by the cyberMafia to steal more than $100 million over the past five years. The servers, located in Scranton, Pa., and Lombard, Ill., were the main tools the organized crime ...

Schneier on Security: Congressional Testimony on the TSA: " Friday, at the request of the TSA, I was removed from the witness list. The excuse was that I am involved in a lawsuit against the TSA, trying to get them to suspend their full-body scanner program. But it's pretty clear that the TSA is afraid of public testimony on the topic, and especially of being challenged in front of Congress. They want to control the story, and it's easier for them to do that if I'm not sitting next to them pointing out all the holes in their position. Unfortunately, the committee went along with them. (They tried to pull the same thing last year and it failed -- video at the 10:50 mark.) . . . . I'm there in spirit, though. The title of the hearing is "TSA Oversight Part III: Effective Security or Security Theater?""

McCain: Homeland Security Department shouldn't be trusted with cybersecurity
The Hill (blog)
By Brendan Sasso - 03/27/12 11:40 AM ET The Homeland Security Department should not have a lead role in defending the nation against cyber attacks, Sen. John McCain (R-Ariz.) argued Tuesday. McCain referenced the problems of the Transportation Security ... 

Cyber attack on NDP leadership vote involved more than 10000 computers
National Post
OTTAWA — A massive cyber attack involving more than 10000 computers was behind the online voting chaos during Saturday's NDP leadership vote, it was revealed today. According to Scytl Canada, the company contracted by the party to conduct the vote, ...

National Post

In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012
Huffington Post (blog)
Fundamentally, the bill misconstrues the scale and complexity of the evolving cyber threat, defining critical infrastructure too narrowly and relying too much on voluntary incentives and risk mitigation strategies. In this, it might improve on the ...

Company IDs 10000 computers behind cyber-attack on NDP leadership vote
Montreal Gazette
OTTAWA — A large-scale cyber-attack involving more than 10000 computers was responsible for the online polling problems during Saturday's NDP leadership vote, according to Scytl Canada, the company contracted by the party to conduct the vote.

House Cybersecurity Bill Proposes Information Swaps
BusinessWeek
McCain's bill would allow companies to voluntarily share and receive threat data with each other and the government through any federal cybersecurity center, including the National SecurityAgency. The military's US Cyber Command is housed under the ...

Navy links cyber workforce training to commercial certifications
FederalNewsRadio.com
The government has been focusing on the cyber workforce for the last 10 years. The HomelandSecurity Department and the National Institute of Standards and Technology issued a draft framework under the National Initiative for Cybersecurity Education ...

China Attacked Internet Security Company RSA, Cyber Commander Tells SASC
AOL Defense
Carl Levin, chairman of the Senate Armed Services Committee, for unclassified examples ofcyber attacks from China. Alexander, who rarely speaks in any detail about threats, immediately offered the RSA attack as an example of China's "high order" ...

Remaining vigilant to cyber attack
Control Engineering Website
In April 2011, not even a year after the discovery of Stuxnet, the Hungarian Laboratory of Cryptography and System Security (CrySyS) identified a new malware which has been named Duqu because it creates files with the field ending '-DQ'.

CSC Expands Availability of Its Most Advanced Security Services to Help ...
MarketWatch (press release)
Whether delivered as a discrete solution or as part of a larger IT outsourcing agreement, the offering includes balanced security packages that enable clients to gain tailored cyberprotection while successfully meeting challenges posed by reduced ...

Huawei Begs NBN Mercy On Cyber War Fears
SmartHouse
By Oonagh Reidy | Tuesday | 27/03/2012 Chinese telco with suspected government links has been banned from NBN by Federal Government following fears of cyber attack. The Labour government has refused the Shenzhen based telecoms giant any of the multiple ...

Industrial Defender and Good Harbor Consulting Announce Critical ...
EON: Enhanced Online News (press release)
(EON: Enhanced Online News)--Industrial Defender, the leading global provider of security, compliance and change management solutions for automation systems, and Good Harbor Consulting, a leading provider of global strategic cyber risk management ...

Surge in Cyber Attacks on China from Overseas
SPAMfighter News
Cyber attack on China from overseas swelled in 2011, accounting to 8.9 Million computers from 5 Million during 2010, as per a report released by the technical team and coordinating center of China's National Computer, as per report in straitstimes on ...

More than 10000 IP addresses used in attack on NDP vote
CTV.ca
The statement from Scytl Canada describes Saturday's cyber attack as an organized, professional and illegal effort to thwart democracy. Susan Crutchlow, the general manager of Scytl Canada, says the Spanish-based company deeply regrets the ...

CTV.ca

NDP Leadership: Online voting company blames delays on “orchestrated attempt...
Toronto Star
After calling for patience and urging voters to try again, party officials eventually blamed the fiasco on an attempted cyber attack, in which mischievous Internet users clogged the NDP voting website. Party officials maintained the results were never ...

Toronto Star

Tech firm says NDP vote hit with hundreds of thousands of malicious requests
Winnipeg Free Press
But a statement Tuesday from Scytl Canada, which ran the online vote, described Saturday'scyber attack as an organized, professional and illegal effort. "We deeply regret the inconvenience to NDP voters caused by this malicious, massive, ...

Pentagon revamps rules of engagement for cyberwar
The Hill (blog)
Defense department officials are currently sorting through the myriad issues surrounding these new rules of engagement for cyber operations, according to Gen. Keith Alexander, head of the new Cyber Command. These new "standing rules of engagement" will ...

Bono Mack, Blackburn Introduce Industry-Friendly Cyber Bill
National Journal
Mary Bono Mack, R-Calif., and Marsha Blackburn, R-Tenn.,introduced industry-friendlycybersecurity legislation on Tuesday that mirrors a bill championed by Republicans in the Senate. The proposals are a response to White House-backed cybersecurity ...

Lunarline Announces Participation in FOSE Conference
MarketWatch (press release)
Lunarline's certified training at the School of Cyber Security include courses covering DIACAP, DIARMF, FISMA/NIST RMF, CNSS/NIST RMF, and Security+, as well as disaster recovery, andcybersecurity fundamentals and tools. In addition, Lunarline is ...

UNH computer students triumphant at cyber security competition
Foster's Daily Democrat
DURHAM — Some of the world's wiliest hackers were no match for a team of University of New Hampshire computer science students, that triumphed with a second-place finish at the 2012 Northeast Collegiate Cyber Defense Competition earlier this month ...

Vic Toews: Anonymous attacks are a threat against elected officials
Toronto Star
But Toews argued the matter of cyber-intimidation “crosses party and ideological lines,” and pointed to last weekend's “deliberate attack” on the NDP's voting process for a new leader. “In my opinion this is a very frightening prospect, especially as ...

Toronto Star

Two Arrested for Cyber Attack on Hong Kong University
eSecurity Planet
Two men were recently arrested for launching a denial of service attack against the University of Hong Kong that disabled an online poll regarding citizens' preferred government leaders. "Broadcaster Radio Television Hong Kong (RTHK) reported that the ...

BNC National Bank Protects Customers With IronKey Online Banking Security
MarketWatch (press release)
BISMARCK, ND and SUNNYVALE, CA, Mar 27, 2012 (MARKETWIRE via COMTEX) -- BNC National Bank, an innovative national bank serving customers in North Dakota, Arizona, and Minnesota, is improving online security to help protect customers from cyber thieves ...

Navy to Introduce New Cyber Certification Process
ExecutiveGov
A recent General Accountability Office report concluded federal agencies do not have a standardized training program for their cyber workforces. Navy Chief Information Officer Terry Halvorsen issued a memorandum in February requiring all cybersecurity ...

US cyber defense situation looks grim
Defense Systems
By Defense Systems Staff The dreaded "Cyber Pearl Harbor" might already have occurred, and nations such as Russia and China are experiencing great success fleecing the United States for its for its most vital proprietary technology secrets through ...

Getting cybersecurity right
The Hill
Only 0.5 percent of rules have received a cost-benefit analysis under Obama. Nobody really knows the true cost of Obama regulations, cyber or otherwise. The very idea of placing DHS at the helm on cybersecurity should concern every American.

Top security threats of 2012
MyBroadband
Panda Security's Panda Labs have recently reported that privacy violations and data theft will be the top security issues in 2012. Traditional threats, together withcyber-espionage, mobile and social networking attacks aimed at companies and...

MyBroadband

Former cybersecurity czar: Every major US company has been hacked by China
ITworld.com
Clarke was talking about an attack on US soil by Al-Qaida, the terrorist group he had been warning the new administration about -- to virtually complete indifference -- since that January. Now Clarke, author of the book Cyber War, is issuing an alert ...

Cyber Switching Launches The Next Generation of the Cyber Breaker in its ...
Sacramento Bee
By Cyber Switching SAN JOSE, Calif., March 26, 2012 -- /PRNewswire/ -- Cyber Switching (www.cyberswitching.com), a leading provider and innovator of power distribution and power management solutions, announced the upcoming availability of single and ...

Enterprises must manage risks to data, brands amidst new threats: report
ZDNet (blog)
By Rachel King | March 27, 2012, 8:00am PDT Summary: The ISF Threat Horizon report, based on cyber security predictions through 2014, outlines three specific types of threats that we can expect to face in the next couple of years.

House Vets Its Supply Chain Security
Broadcasting & Cable
Those are just some of the cyber threats to government and industry tech suppliers identified at the latest in a series of House Energy & Commerce Committee hearings on cybersecurity. The hearing, "IT Supply Chain Security: Review of Government and ...

World News - Expert: Al-Qaida web forums crippled in suspected ...
By Alastair Jamieson, msnbc.com
Al-Qaida's Internet message forums, which it uses to communicate its messages to the world, have been crippled in a suspected organized cyber-attack, according to a terrorism expert. Three of the terror network's main forums – Al-Shamukh, ...
Newsvine - World News - Articles

Cyber attack on NDP leadership vote involved more than 10000 ...
By Admin1
OTTAWA — A massive cyber attack involving more than 10000 computers was behind the online voting chaos during Saturday's NDP leadership vote, it was revealed today. According to Scytl Canada, the company contracted by the party to conduct the vote, a deliberate ... a high volume of ballots, but later admitted it had become victim of a well orchestrated cyber attack. While theattack temporarily slowed down the voting process, Scytl claimed its security system wasn't penetrated.
Boocame online

Norms, Epistemic Communities and the Global Cyber Security ...
By Tim Stevens
As norms begin to develop in the cybersecurity field, a multitude of actors are competing to shape them according to their own interests and values. How this power struggle plays out is of great importance to the future of global cyberspace. ... Norms, Epistemic Communities and the Global Cyber Security Assemblage .... International Politics.Cambridge: Cambridge University Press. [11] Ibid., 90. Tags: Constructivism, cyber warfare, cybersecurity, Cyberspace, global governance, norms ...
e-International Relations

In Search of Cyber Peace: A Response to the Cybersecurity Act of ...
By Blackmere
In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012 – Huffington Post. Published March 27, 2012. The Cybersecurity Act of 2012 recently introduced in the Senate Homeland Security and Governance Affairs Committee has ...
Blackmere Consulting

A Russian Zeus attacker Sentenced from Million ... - The Hacker News
By noreply@blogger.com (THN Reporter)
... Sentenced from Million Dollar Fraud. THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, Vulnerability. ... A Russian Hacker, who was part of an elaborateCyber attack that used Zeus Banking Trojan in U.S. visas to move cash stolen from U.S. businesses out of the country was sentenced on March 23 to two years in U.S. federal prison. Nikokay Garifulin received a ...
The Hacker News [ THN ] - Updates...

EU to set up cyber crime centre | Tech Trend
By ComputerWeekly: Latest IT News
European parliament website under cyber attack. The European parliament website came under cyber attack Thursday but hackers failed to penetrate the assembly's internal network, a spokesman said.
Tech Trend

Kroll's Alan Brill to Present at NATO Cyber Terror Course
By Ross Wilkers
NATO will host the 2012 Cyber Terrorism course at its Centre of Excellence-Defence Against Terrorism in Ankara, Turkey. Course attendees will study growing cyber attack threats,cybersecurity risks, terrorists' usage of the Internet and ...
GovCon Executive

NIST establishes new cybersecurity hub in Maryland | Simply Security
By Simply Security
"We're standing up for the National Cybersecurity Center of Excellence to protect America's ideas and innovation from cyber terrorists, spies and thieves," Senator Barbara Mikulski explained. "This center will unite the knowledge of the ...
Simply Security

10000 'malevolent' IPs used in attack on NDP voting, Scytl says ...
By Canadian Press
The statement from Scytl Canada describes Saturday's cyber attack as an organized, professional and illegal effort to thwart democracy. Susan Crutchlow, the general manager of Scytl Canada, says the Spanish-based company deeply ...
iPolitics

SecAF: Cyberspace is an Air Force priority | Armed with Science
By glenn.selby
There are also plans to expand the Maryland Air National Guard's 175th Network WarfareSquadron, he added. “Cyberspace may be the newest recognized ... He said the Air Force must maintain its cyber security commitment by resourcing; developing cyber plans and strategies; developing and acquiring the best technology; and, most importantly, building the intellectual capital and expertise of its Airmen who make it all work. “Doing so will contribute to our national defense as well ...
Armed with Science

Huawei – Symantec, broken join venture and the ... - Security Affairs
By paganinip
The line between cyber crime and cyber warfare is thin, we have understood that one of the main strategies pursued by governments around the world is to make intelligence operations through technology to gather sensitive information ...
Security Affairs

Senate debates DHS' role in regulating cybersecurity ...
How powerful should the Department of Homeland Security be in setting and enforcingcybersecurity standards for privately owned "critical networks," such as ...
www.federaltimes.com/article/20120320/IT03/203200303

Cybersecurity and DHS: GCN - Crossroads
On March 23rd, 2012, William Jackson reported for Government Computer News on how the DHS will give cybersecurity a funding boost within its overall ...
blog.cybersecuritylaw.us/2012/.../cybersecurity-and-dhs-gcn.h...

Cyber Attack Demo -- FOSE
Tired of just watching glass? Join us to watch three top cyber analysts perform live attack identification of the latest intrusions. Get up close and personal as the ...
fose.com/events/fose-2012/.../gs2-11-cyber-attack-demo.aspx

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com