SANS Institute Helps Organizations Deflect Cyber Attacks

SANS Institute Helps Organizations Deflect Cyber Attacks
MarketWatch (press release)
BETHESDA, Md., March 19, 2012 /PRNewswire via COMTEX/ -- For organizations to better defend against cyber attacks, early identification of vulnerabilities must begin at the development stage. To help raise awareness of the need for more secure app ...

U students get their masters in cyber security
Minnesota Daily
The security industry is set for a “dramatic change,” according to the 2012 and 2013 securitypredictions report from the Sans Technology Institute. Cyber security has been a niche profession, primarily confined to the national defense industry, ...

US speeds up development of new cyberweapons
The Seattle Times
By Ellen Nakashima The easiest 'cyber' solution for a non-connected device in a combat situation would be... (March 19, 2012, by seattlegeek) MORE The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting ...

Pentagon creating new-generation cyberweapon
RT
The US military is stepping up its efforts to develop new generation cyberweapons. The Washington Post reports they could be capable of knocking down enemy networks, even if they do not have an Internet connection. The efforts have been accelerated ...

RT

US Secret Service agents train Scotland Yard bodyguards to fight new ...
Daily Mail
Members of President Obama's personal bodyguard unit have flown to London to help fight sophisticated cyber threats against prominent targets. Police chiefs are worried computer hackers could use their skills to infiltrate security surrounding the ...

Daily Mail

We need to STOP Pakistan's cyber warfare
Rediff
Indian authorities have finally woken up to the fact that we are facing a major cyberthreat that may continue unabated for a while. The website of Bharat Sanchar Nigam Limited was among those which were hacked. Websites of state governments, ...

Rediff

Android Devices Highly Targeted by Malware: Report
eWeek
The Total Defense research team suggested major platform vendors can do more to improve mobile OS security. Malware detection and anti-crimeware solutions specialist Total Defense, Inc. announced the findings of its 2011 Internet Security Threat ...

New facility to test, certify cybersecurity / System will aim to protect ...
The Daily Yomiuri
It will be modeled on a cyber-attack test bed set up by the US Homeland SecurityDepartment and will conduct cyber-attack simulations for control systems, using computer viruses created by itself to test resistance against such attacks.

The Daily Yomiuri

Directors must wake up to cyber threats
Insurance Daily
Company directors must wake up to cyber threats or risk litigation from all sides, Willis has warned. Speaking at a recent cyber liability conference in London, the broker's FINEX global unit director, Francis Kean, urged boards to grasp how exposed ...

Elbit President: “Better Protection for Every IDF Tank”
defpro
Conversely, offensive cyber systems can be used to attack enemy systems. The IDF cyber capabilities have taken large steps forward in recent years. Elbit Systems is one of the leaders in the security market in Israel and abroad, and a main weapon ...

defpro

Collapse of the Internet imminent?
WND.com
“Operation Global Blackout” is a movement by a group of cyber hackers to shut down the Internet by launching an attack on Root Name Servers, the machines that control the Internet. The hackers claiming to be the infamous hacktivist network,Anonymous, ...

WND.com

Comparing the Senate Cybersecurity Liability Provisions
Lawfare (blog)
In doing so, both bills confront an obvious and clear problem – no private sector actor will sharecyber threat or vulnerability information if doing so will subject him to adverse consequence. Thus, generically, both bills have liability exemptions; ...

Why Resilience Is Vastly Overrated
Slate Magazine
These days, our goals are less about stopping bad things from happening and more about limiting the effects when they do happen—whether it's creating computer networks that can resume operation after a cyber attack, developing homeland security ...

Slate Magazine

Shootings in Toulouse and Montauban: What we know
BBC News
French cyber police are working to extract clues from the two men's internet exchanges, Le Figaro says. Sgt Ibn-Ziaten had a clean service record, prosecutors stressed, rejecting suggestions that there could have been a gangland element to his murder.

BBC News

Fake AV Programs Increasing, Highlights GFI within New Monthly Report
SPAMfighter News
The security company also highlights that several rogue or fake anti-virus applications are getting disseminated through spam mails carrying malevolent web-links connecting with the BlackHole attack toolkit helpful for cyber-criminals to exploit ...

Gen. Allen goes to Washington ... On budget, GOP bets big ... Neighbors of ...
Politico
2 pm: HASC's Subcommittee on Emerging Threats and Capabilities meets in Rayburn 2212 to discuss the budget for IT and cyber ops with Teresa Takai, the Pentagon's chief information officer; Gen. Keith Alexander, head of US Cyber Command; ...

ANSI Healtcare Infomation Webinar addresses security risks.
ThomasNet Industrial News Room
March 19, 2012 - On March 21, ANSI, The Santa Fe Group/Shared Assessments Program Healthcare Working Group, and Internet Security Alliance will host webinar to help healthcare organizations assess security risks and build business case to better secure ...

Lancope Releases StealthWatch System 6.2 for Increased Network Visibility and ...
Sacramento Bee
... data from existing infrastructure, StealthWatch enables organizations to cost-effectively uncover the full spectrum of issues facing today's network environments -- from performance problems to zero-day cyber attacks and internal security threats.

Richard Bacon: My battle with the trolls
BBC News
But as you may have noticed, in the cyber world, you don't have to work too hard for things to get a little bit more unpleasant. I would like you to take part in an experiment. Go to any news website that allows readers to post their own thoughts.

BBC News

The week ahead: Top commander to brief Congress on Afghanistan
The Hill (blog)
Deputy Defense Secretary Ash Carter said the Pentagon is nowhere near satisfied with its ability to wage a cyber-war against China and other potential enemies around the world. A report by the congressionally mandated US-China Economic and Security ...

LulzSec's Kayla given bail
Infosecurity Magazine
British teen Ryan Cleary, who was arrested in connection with cyber attacks claimed to have been carried out by hacker group LulzSec, is facing five charges under the UK's Computer Misuse Act of 1990. The website of the Serious Organised Crime Agency ...

Majles postpones implementation of second phase of subsidy reform, public ...
Intelligence & Terrorism Information Center
Last Wednesday, March 7, Supreme Leader Ayatollah Ali Khamenei issued a new directive on the establishment of a “Supreme Cyber Council”. The directive says that the decision to establish the council was made in response to the growth of information and ...

Intelligence & Terrorism Information Center

Light shed on NSA's massive supercomputer project for spying
DatacenterDynamics
Wired described the project, which it said will be in operation in September2013, as the US' largest and “most expensive cyber security project” ever. And while it did not obtain details from the department itself, it said it had received details from ...

DatacenterDynamics

Beset by Online Surveillance and Content Filtering, Netizens Fight On
truthout
Syria's cyber army is expert in the art of trolling the Facebook walls of opponents and dissidents, often with the aim of discrediting them, and to drown out critical comments with a tide of praise for the government of President Bashar al-Assad.

truthout

54 Haute 100 Updates: Updates on Sergey Brin, Gina Bianchini, Carly Fiorina ...
Haute Living
... is proposing a bill to protect private companies when sharing information on cyber threats they faced with. “Generally, only government contractors can receive a security clearance, but other companies, such as Internet Service Providers, ...

Syria Goes Pallywood and Gaza Goes Gaga Again
Family Security Matters
And once such phoney imagery has got into the cyber-world, no amount of verbal refutation will alter the power of the original myths. The most infamous and most glaring case was of a little boy, Muhammad El-Durah, allegedly shot by Israeli soldiers in ...

Family Security Matters

Pentagon Budget Secures Major Strategic Win For Lockheed
AOL Defense
... a goal which requires many billions of dollars in spending on computer network defense, exploitation and attack. Lockheed Martin has been rapidly expanding its role in all aspects ofcyber security for the military and civil agencies, ...

USCC report on China's cyber-espionage and -warfare capabilities ...
By Patrick Lambert
Takeaway: Patrick Lambert breaks down the latest report of the U.S.-China Economic andSecurity Review Commission, which rates China's capabilities for cyber-espionage and warfare. Last week the U.S.-China Economic and Security Review Commission ... Also, it would appear that the PLO, China's army, doesn't have a specific cyber attack division, but instead integrates these tools under a single command authority. One of the conclusions of this report is that China's improved ...
on TechRepublic

Millions US government email addresses in the ... - Security Affairs
By paganinip
Cyber ​​threats expose our intelligence agencies, our critical infrastructures and our companies to significant risks causing untold perfidious finance. In the area of ​​cyber warfare governments have made considerable strides, gained ...
Security Affairs

Visions from Two Theories: Miscellany: Cyber war isn't the same as ...
By David Ronfeldt
He also points out that our major protagonists in the domain of cyber conflict, Russia and China, seem more concerned about the social than the military implications of cyber warfare: “So Russia and ... But I gather that it was more an instance of a coordinated cyber attack, perhaps partly involving surrogate privateers, conducted in support of an otherwise rather conventional military raid. Thus it really .... Fields: first 20 years, U.S.-Latin American security issues (esp. Mexico, Cuba); last ...
Visions from Two Theories

Chinese Cyber Threat | Cyber Security Market
By admin
The U.S.-China Economic and Security Review Commission released a report “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and CyberEspionage.” The report details how China is ...
Cyber Security Market

Partnership for Cyber Resilience to Help Protect the Global Digital ...
By margaret
So, what we must do is find a way to work together to educate and create a digital world that is resistant to attack. To that end, BT and four other companies – the CA Technologies, the Chertoff... on the cybersecurity front. Membership is free and provides an environment for peer exchange, dialogue and resources to improve and benchmark your company's cyber risk management practices in line with international standards. Want to learn more? Check out the following resources.
Secure Thinking

U students get their masters in cyber security – Minnesota Daily ...
By Blackmere
U students get their masters in cyber security – Minnesota Daily. Published March 18, 2012. With cybersecurity threats projected to increase in the coming year, the University of Minnesota's Master of Science in security technologies program ...
Blackmere Consulting

Cyber Criminals Selling Millions of U.S military email addresses ...
By admin
“Web based underground market service currently selling Millions of harvested U.S government and U.S military harvested emails addresses to potential spammers, and find out just how easy it is to purchase that kind of data within the cyber ...
InfoWar.com

Collapse of the Internet imminent?
By -NO AUTHOR-
“Operation Global Blackout” is a movement by a group of cyber hackers to shut down the Internet by launching an attack on Root Name Servers, the machines that control the Internet. The hackers claiming to be the infamous ... Robert Graham of Errata Security wrote, “TheAnonymous hackers can certain[ly] cause local pockets of disruption, but these disruptions are going to be localized to networks where their attack machines are located. They might affect a few of the root DNS ...
WND

“U.S. Accelerating Cyberweapon Research” » CCC Blog
By Erwin Gianchandani
U.S. Cyber Command [image courtesy USCYBERCOM]. The amount of disclosed spending by the Pentagon on cybersecurity and cybertechnology — offensive and defensive — is $3.4 billion this year. The U.S. Cyber Command, based at Fort ...
CCC Blog

U.S. Accelerating Cyberweapon Research « Pat Dollard
By Angelia Phillips
In Iraq, during the 2007 surge of U.S. combat forces, the National Security Agency used cybertools to muddle the signals of the cellphones and laptop computers that insurgents used to coordinate their strikes, according to previously published reports confirmed by former U.S. officials. U.S. cyber operators used ... Cybertechnology also is not always the most efficient way to attack a target — sometimes bombs or electronic warfare are easier or more reliable. Within the Pentagon, more ...
Pat Dollard

Mystery of Programming Language Used in Duqu Framework ...
By Mike Lennon
Security Experts: WRITE FOR US ... “These two reasons indicate that the code was written by a team of experienced 'old-school' developers who wanted to create a customized framework to support a highly flexible and adaptable attack platform. The code could have been reused from previous cyber-operations and customized to integrate into the Duqu Trojan,” noted Igor Soumenkov, Chief Malware Expert at Kaspersky Lab. “However, one thing is certain: these techniques are ...
SecurityWeek RSS Feed

DDoS Yourself First — Part I: Auditing for DDoS Vulnerabilities ...
By Carl Herberger
What happens if your company has reason to believe that it may come under a DDoS attack in the near future or recently suffered an attack? ... For the last 18 months security professionals around the globe have watched as a group of cyber hacktivists dismantled the web defenses of some of the most respected financial and ecommerce sites and “walked right into” their secure data bases and holdings to make a statement. These attacks were not the work of the numerous and very ...
Radware Blog

SANS Institute Helps Organizations Deflect Cyber Attacks with Web ...
Attendees will learn cutting edge attack and defense strategies which are necessary to build more secure software. "Security starts with the development team," said Frank Kim, SANS Curriculum lead and principal consultant with ThinkSec. " SANS' Web Application SecuritySummit was designed to raise awareness of the importance of building secure web applications while arming developers with the necessary insight and techniques to fend offcyber attacks. By combining education ...
ITbriefing.net

Anonymous Engaged Massive Cyber-Attack To Bring-down Vatican ...
Anonymous Engaged Massive Cyber-Attack To Bring-down Vatican Website Hacker collective group Anon...
www.voiceofgreyhat.com/.../anonymous-engaged-massive-cy...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com