Pentagon sees North Korea cyber threat, 2012 provocations

Pentagon sees N.Korea cyber threat, 2012 provocations
Reuters
* Cyber warfare new weapon in North Korea's arsenal * April 'satellite' launch aimed at improving rocketry (Adds missile launch preparations detected in paragraphs 2, 12-14) By Paul Eckert WASHINGTON, March 28 (Reuters) - North Korea has added ...

Pentagon sees North Korea cyber threat
Times of India
WASHINGTON: North Korea has added sophisticated cyber attack capabilities to its arsenal of threatening weapons and this year is rife with opportunities for military provocations from Pyongyang, beginning with a controversial rocket launch next month, ...

Feds warn of cyber threats, seek expanded authority for DHS
ITworld.com
By Kenneth Corbin, CIO | Security Add a new comment March 28, 2012, 5:49 PM — Federalcybersecurity officials on Wednesday gave lawmakers a sobering warning about the vulnerabilities of critical information technology systems across the public and ...

Central Europe power sale body braces for cyber raid
Reuters
The German-based Central Allocation Office (CAO) said Anonymous was planning to attack its computer servers on Saturday. "Due to their development and growth in successful attacks in the last year we are taking their information seriously and with ...

Huawei contract ban stokes fear of cyber cold war
The Guardian
Against that background, the New York Times says Symantec had become concerned that, as the US government shifted an information-sharing program about cyber threats to the control of the department of homeland security, it would be frozen out.

The Guardian

US Cyber Command chief blames China for RSA SecurID attack
Techworld.com
By John E Dunn | Techworld | Published: 15:03, 29 March 2012 Last year's major attack on RSA's SecurID token system was the work of the Chinese, the US Cyber Command chief is reported to have said during a submission to the Senate Armed Services ...

FCC Official: Cybersecurity Shouldn't Curtail Privacy
National Journal
AP Photo/Mark J. Terrill Cyber security analysts work in the "watch and warning center" during the first tour of the governmentís secretive cyber defense lab Thursday, Sept. 29, 2011, in Idaho Falls, Idaho. The Homeland Security Department's Control ...

Military's cyber chief backs increased oversight of critical infrastructure
Federal Times
Operators of the most critical systems also should be required to report cyber attacks to the government, Alexander said. Both of those measures are included in a bipartisan cybersecuritybill introduced in February by Sen. Joe Lieberman, I-Conn.

Eurocrats versus the cyber criminals
IT PRO
The EU already has a cyber security body, in the form of Crete-based ENISA, which aims to support businesses and governments from cyber attack at the systems and network level. ENISA works with the EU's national CERTs, or computer emergency response ...

IT PRO

Over RM2bil lost to cyber crime in five years
Malaysia Star
"The cyber security awareness among organisations and individuals in the country is still low. "Admittedly, the more developed we are in terms of the cyber world, the higher the risk of cybercrimes," he told reporters here. He earlier witnessed the ...

'Not winning' war on hackers: FBI cyber chief
msnbc.com
At a security conference, Mueller said he expects cyber threats to pass terrorism as the nation's top threat. Henry, who will be leaving the bureau after more than 20 years and will work for a cybersecurity firm, told the Journal that more and more, ...

msnbc.com

Philippines ranks 13th in list of countries launching cyber-attacks
Inquirer.net
MANILA, Philippines—The Philippines has been tagged as one of the world's biggest sources of a dangerous kind of cyber “attack” designed to take down entire computer networks and shut down key consumer services. The latest report by Russian Internet ...

North Korea's cyber warfare capability grows, U.S. general says
Honolulu Star-Advertiser
Sharp didn't cite cyber attacks as part of the North Korean arsenal, and Thurman spoke of continued improvements in conventional weaponry. North Korea can attack Seoul “and can deliver both high explosive and chemical munitions with little or no ...

Pentagon wants civilian help to thwart hackers
TG Daily
The head of US Cyber Command says the Pentagon needs private-sector cooperation in reporting computer network attacks to stop the "greatest [unauthorized] transfer of wealth in history." "If we can't see the attack, we can't stop it.

The Militarization of Cyber Security as a Source of Global Tension
ISN
The diffuse nature of the threat, coupled with a heightened sense of vulnerability, has brought about a growing militarization of cyber security. This has resulted in too much attention on the low probability of a large scale cyber-attack, ...

ISN

Peek at rules of engagement in cyber battle
CNN (blog)
by Suzanne Kelly General Keith Alexander, who serves as both Director of the National SecurityAgency as well as Commander of Cyber Command had some interesting things to say before the Senate Armed Services Committee on Tuesday.

AACC Cyber Facility Set To Open in August
Patch.com
He spent time outlining the college's recent expansion of cyber offerings, which are designed to leverage the proximity to the US Cyber Command, National Security Agency and other agencies. “Our students are going to be able to work in any industry,” ...

Algerians and Moroccans Use Cyber Attacks to Settle their Political Feuds
North Africa Journal
The North Africa Journal | In the evening of November 8, 2011, nearly 200 Moroccan companies and other institutions were the targets of cyber attacks. The exact figure was not confirmed but the event led to the defacing of corporate and institutional ...

How the US may already be losing the cyberwar
Digitaltrends.com
In a sobering interview with Smithsonian Magazine recently, Richard “Dick” Clarke — the former head of US counterterrorism under three Presidents — spoke candidly about the weakness of America's cyber-warfare defenses. A chief counterterrorism ...

Digitaltrends.com

Cybersecurity: Are we ready?
Financial Times
We believe there's a slightly different question that boards and senior business leaders should be asking the technology team about cyber-security: “Are we ready?” An ill-thought-out response to an attack can be far more damaging than the attack itself ...

Australia bars Huawei from bid as Chinese cybersecurity fears grow
Independent Online
... but said they originated from the Australian Security Intelligence Organisation, which has become increasingly verbal about the problem of internet-based espionage. In its latest annual report to parliament it said: “Espionage by cybermeans… is ...

Independent Online

NDP vote disruption worries experts
TheChronicleHerald.ca
Questions about e-voting were raised after the NDP leadership convention was disrupted by acyber attack. Not all of them have been answered satisfactorily, say software experts, despite reassurances from Scytl, the software company that handled the ...

House Republicans introduce new cybersecurity bill
Chicago Tribune
That bill would allow the National Security Agency, for example, to tell internet service providers about different cyber threats the intelligence agency has detected so the ISP can then block traffic to its customers from anything with that signature.

Cyber Security Company Lunarline Wins FAA Privacy Contract
Sacramento Bee
About LunarlineLunarline is a leading provider of cyber security solutions, specialized IA services, and certified security training to all US Federal Government (Civilian, DoD, and IC), as well as to customers in selected commercial markets.

Cyber criminals launch their latest bogus Microsoft security alert
ComputerActive.co.uk
Computeractive has uncovered a sophisticated phishing attack that fools people into downloading malicious software by mimicking a genuine Microsoft Windows security alert. A variation on rogue anti virus software, the email includes a link to a ...

ComputerActive.co.uk

China Has Hacked Every US Major Company, Claims Richard Clarke
WebProNews
If you listen to people talk about cyber security long enough, you'll hear a hundred subtle variations of that statement. Another version goes: “There are two kinds of companies: those that know they've been hacked, and those that don't,” implying that ...

A Mother's Message: Cyber-bullying is Serious
fox4kc.com
A mother is sharing her powerful story about how an extreme case of cyber-bullying destroyed her daughter. In 2006, 13-year-old Megan Meier killed herself in her home in O'Fallon, Missouri, after a boy she was flirting with online turned against her ...

fox4kc.com

Cybercom Head Addresses Attack Authority Questions With Lawmakers
ExecutiveGov
The National Security Agency's director told lawmakers Tuesday that the government should not launch cyber attacks at the discretion of individual military leaders, the Washington Post reports. Army Gen. Keith Alexander, also head of the US Cyber ...

Duqu – Cyber weapons factory still operating … it's ... - Security Affairs
By paganinip
The security application will be distribute for free during the next weeks, some experts even believe that some instances of malware can still be present in the systems of the nuclear site of Natanz in Iran. If Stuxnet seem to be beaten, ... Duqu is quite different from its relative, it has a modular structure like Stuxnet but it isn't equipped with modules for SCADA systems attack. It is only able to steal information .... From → Cyber warfare, Malware, Security. No comments yet. Click here to ...
Security Affairs

Mobile Market Boom Leads To Increasing Cyber Threats ...
By Mellisa Tolentino
Increase in cyber threats. During the launch of the new Cyber Security Centre at Oxford University, Martin Sadler, director of the Cloud and Security Lab at HP in Bristol, England, expressed his concerns regarding the mobile market boom. Sadler stated that by the end of this decade, ... The problem is, most people won't even have a clue about what cybersecurity is, let alone how to fend off malicious attacks. “If you talk about four billion people going online by 2020, a large number of ...
SiliconANGLE

FBI's top cyber cop admits that hackers are winning | The Raw Story
By Stephen C. Webster
His comments were first carried by The Wall Street Journal, which keyed in to the ongoing debate over new cybersecurity policies. Some in government believe that new regulations may be needed to help ... Ultimately for Henry, who is preparing to leave the FBI to work on cyber security matters in the private sector, the bottom line is that the Internet's current status quo simply is not working for business anymore. “…[You] never get ahead, never become more secure, never have a ...
The Raw Story

POSSCON 2012 Day 2 – Breakout Sessions 1 | POSSCON 2012
By Grizz
Dr. Douglas Maughan of the DHS S&T Cyber Security Division will discuss how open source software fits into the federal cybersecurity strategy and highlight the Homeland Open SecurityTechnology (HOST) program which leverages open ...
POSSCON 2012

Iran continues its campaign against the press - Committee to Protect ...
By Committee to Protect Journalists
Security forces arrested Tahmineh Monzavi, an award-winning freelance photographer, at her workplace in the capital, Tehran, on February 19, and searched her home, reformist news websites said. The journalist has documented sensitive social issues in the ... Also this month, the BBC was targeted by a "sophisticated cyber-attack" that caused disruptions in its email and Internet services, the broadcaster reported. The BBC's director general, Mark Thompson, said the Internet attack ...
Committee to Protect Journalists

In Wake Of Cyber Attacks, Pentagon Plans New Rules Of ...
By Salman
A number of US companies as well as government-related organizations have been targeted through cyber attacks and sensitive data has been either stolen or leaked to the web. So far, the role of Pentagon has been fairly limited when it came to cyber warfare. But now, this ... According to the new proposed rules, if an attack is launched domestically, Department of HomelandSecurity will work to protect the domestic networks, in collaboration with private companies. However, if it is ...
TheTechJournal

Hacktivist Group Anonymous Achieved Goal | AFCEA SIGNAL Scape
By George I. Seffers
During the initial investigation, however, the company did not know it was not a malware attack.... The company's response included disclosing the security breach to their customers and turning to the country's cyber centers for assistance.
AFCEA SIGNAL Scape

David Skillicorn Weighs in on NDP Cyber Attack - Computing News
By belloa
David was interviewed about the cyber attack on the NDP leadership convention that used more than 10000 computers, on Global TV National, Toronto Star, Edmonton Journal, Winnipeg Free Press, Halifax Chronicle-Herald, Ottawa Citizen, ...
Computing News

World News - US: North Korea using hackers; food aid suspended ...
By msnbc.com news services
WASHINGTON -- North Korea has added sophisticated cyber attack capabilities to its arsenal of threatening weapons and this year is rife with opportunities for military provocations from Pyongyang, senior U.S. defense officials said on Wednesday. ... The officials told the House of Representatives Armed Services Committee that North Korea's large conventional military, nuclear weapons programs, ballistic missiles and newer capabilities in cyber warfare were all threats to the United ...
Newsvine - World News - Articles

EU legislation – Digging below the FUD line « Cатсн²² (in)sесuяitу ...
By ChrisJohnRiley
Cyber-attack tools. The proposal also targets tools used to commit offences: the production or sale of devices such as computer programs designed for cyber-attacks, or which find a computer password by which an information system can be accessed, would ... Those reading this article without further context would have little choice but to think back to the poor decisions made in Germany (see 202(c) ) that resulted in many security researchers from upping sticks and moving out.
Cатсн²² (in)sесuяitу...

Cyber Espionage: Attend SC Congress World eSymposium ...
By Continuity_Compliance
Filed Under: Cybersecurity, Information Security, Webinars Tagged With: classified documents, critical information, cyber espionage, cyber security, cybersecurity, Information Security, network control, proprietary documents, risk management ...
Continuity Compliance

Foreign Confidential ™: US General Warns of Growing N. Korea ...
By Confidential Reporter
The top commander of U.S. forces in South Korea says he is concerned about North Korea's growing capability to carry out attacks through nonconventional means, such as cyber warfareand chemical weapons. Speaking to the U.S. House Armed ... missile and cyber," Thurman said. "The development of these asymmetric capabilities and the forward stationing of its conventional forces provide North Korea the ability to attack or provoke the Republic of Korea with little warning.” ...
Foreign Confidential ™

Government Information » Cybersecurity: Selected Legal Issues
By alan zoellner
This report discusses selected legal issues related to recent legislation about vulnerabilities of critical infrastructure to cyber threats and proposals to share cyber threat information among private sector and government entities. From the ...
Government Information
DOD Needs Industry's Help to Catch Cyber Attacks, Commander ...
The Defense Department needs private-sector cooperation in reporting computer networkattacks in real time to stop what has been the "greatest transfer of ...
www.defencetalk.com/dod-industry-cyber-attack-security-help...

Rwanda: Institutions Fight Cyber Attacks | Cyber Warzone
Following recent cyber-attacks that have been targeting East African companies, several institutions in the country have put in place security policies to counter ...
www.cyberwarzone.com/.../rwanda-institutions-fight-cyber-att...

Increasing Cyber Threats Call for More Innovative Cybersecurity
Booz Allen is helping the FAA take a more proactive stance on ensuring safety through the use of Safety Management Systems (SMS)
www.boozallen.com/insights/insight-detail/49683481

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com