Stuxnet Computer worm opens new era of warfare [video]

Stuxnet: Computer worm opens new era of warfare
March 4, 2012 4:00 PM
Computer virus's evident success in damaging Iran's nuclear facility has officials asking if our own infrastructure is safe. Steve Kroft reports.Stuxnet: Computer worm opens new era of warfare

Cyber-attack specter troubles Pentagon
TG Daily
Defense Secretary Leon E. Panetta has expressed concern over the possibility of a major cyber-attack being launched against the United States. "We are literally getting hundreds or thousands of attacks every day that try to exploit information in various ...

TG Daily

DoD Cyber Official: DHS Should Lead Govt Effort to Protect Infrastructure
Eric Rosenbach, deputy assistant security of defense for cyber policy, made the comments at the recent RSA Security conference in San Francisco as the national spotlight intensifies on the domestic cybersecurity issue. Some believe the National ...

Stuxnet: Computer worm opens new era of warfare
WTSP 10 News
Stuxnet showed, for the first time, that a cyber attack could cause significant physical damage to a facility. Does this mean that future malware, modeled on Stuxnet, could target other critical infrastructure -- such as nuclear power plants or water ...

WTSP 10 News

CBS 60 Minutes: Stuxnet worm opens new era of warfare
ZDNet (blog)
By Ryan Naraine | March 4, 2012, 6:20pm PST Summary: Stuxnet showed, for the first time, that acyber attack could cause significant physical damage to a facility. Does this mean that futuremalware, modeled on Stuxnet, could target other critical ...

Stuxnet copycats: Let the hacking begin
CBS News
This week on the broadcast, Steve Kroft unravels the mysterious Stuxnet computer virus, which he calls "the most sophisticated cyber weapon ever invented." Launched several years ago, Stuxnet is considered the first attack in a new era of cyber warfare ...

Schaffer leaves DHS cyber post
Greg Schaffer is leaving as the Homeland Security Department's assistant secretary in the Office ofCybersecurity and Communications. Schaffer's decision to leave is not unexpected. Government sources tell Federal News Radio he has been planning on ...

SMEs Under Cyber Attacks
SPAMfighter News
Dearth of cyber attacks knowledge in the SMEs or the absence of any precautionary measure is an added advantage for cyber attacks, indicates Cyber Security Expert, Anshul Abhang. The underlying reason behind this negligence is the minor amount of ...

Anonymous to Attack AIPAC in Crusade Against Israel
IBTimes UK
By Gianluca Mezzofiore: Subscribe to Gianluca's RSS feed Following its commitment to launch a cyber-crusade against Israel to end its "reign of terror",Anonymous has called on its members to attack influential US-based Zionost lobby group as Israel's ...

IBTimes UK

60 Minutes Recap 3/4/2012: Iran Computer Worm And Archbishop of Dublin
The first segment is about a possible cyber attack on the US. The first of this kind was “Stuxnet” and it attacked Iran's Nuclear Program. The US Military has been in cyberspace for a long time and it is actively pursuing countermeasures and its own ...


FBI Preaches Dangers Of 'Cybercrime' To The Choir
... recently spoke at a cybersecurity conference where he reiterated his belief that so-called cybercrime will soon surpass terrorism as the biggest threat in America. Perhaps this means that the FBI plans to start manufacturing cyber-threats like they ...

OpFreePalestine: Hackers Attack More than 800 Websites
IBTimes UK
Pak Cyber Pyrates hacking group defaced and posted a statement on the homepages which said: "You can imprison our Palestinian brothers but you cannot imprison our hope. We will fight till the end, and we are coming to take revenge.

IBTimes UK

India mulls Web monitoring agency creation
ZDNet Asia
... cybersecurity threats on a real-time basis. The Times of India reported Monday that the proposal for a National Cyber Coordination Centre (NCCC) was discussed at a "recent" meeting called by the country's National Security Council Secretariat.

NASA lost 'full control' to hackers, pwned 13 times last year
Paul Martin told a Congressional panel on information security at the space agency that NASA spent $58m of its $1.5bn annual IT budget on cyber security. The space agency has long been a prestige target for hackers of various skill levels and ...

Software Security Stocks: Will Growing Demand Raise Values?
Kapitall Blog (blog)
(via Reuters) Consider that NASA spends $58 million of its $1.5 billion annual IT budget on cyber security. FBI Director Robert Mueller claimed cybercrime is fast eclipsing terrorism as the bureau's top priority, reports CNNMoney.

Kapitall Blog (blog)

Information Sharing and the McCain Cybersecurity Bill
Lawfare (blog)
In particular: The bill begins, in Section 101, with a comprehensive definition of what constitutescyber threat information. It also identifies a Federal “cybersecurity center” as any one of a half-dozen existing centers operated by DOD, DHS, ...

Hackers took control of Nasa, panel told
Independent Online
... who launched the cyber attack last year, were able to gain full functional control of computers at Nasa's Jet Propulsion Laboratory. London - Hackers broke into Nasa systems so comprehensively that they could have compromised US national security,...

Independent Online

DHS seeks new CERT director
Ever dream of running a state-of-the-art cybersecurity facility? Well, the Homeland SecurityDepartment has the perfect job. DHS is hiring a new director of the US Computer Emergency Response Team, or US CERT. The senior executive service position has ...

Report: Hackers Steal Michael Jackson Back Catalogue From Sony
PC Magazine
As reported by The Guardian and the BBC, more than 50000 music files owned by Sony Music were accessed by hackers shortly after the company's PlayStation Network was also hit by a massivecyber attack. Two men accused of being involved in the Sony hack ...

Why I want to give hackers a career break
New Scientist
Security is a process, not a thing you buy once in a shrink-wrapped box. How do you get this idea ofsecurity across? I have a global team of 200 ethical hackers who try to penetrate our clients' systems, and also run phishing and other social ...

NATO and EAPC Tap 3eTI Leadership for Critical Information Infrastructure ...
Business Wire (press release)
With over 25 years of cyber security expertise, including overseeing Red Team Assessments and risk assessments for Critical Infrastructure Protection and Controls Systems networks, Mr. Erinle's qualifications are well-matched for this role.

Op-Ed: Anonymous vs Symantec – Letting a beast loose on the world
Security firm Symantec claims an Anonymous Distributed Denial of Service (DDOS)attack was hijacked by a Trojan which stole banking and other personal details fromAnonymous supporters. Anonymous denies the claim. According to Symantec amalware ...

RSA Conference post-mortem: Gloom over IT security
ITWorld Canada
Savage also noted the never-ending nature of cyber-crime. "We don't have proofs for ending war and conflict, and putting the prefix 'cyber' in front of it doesn't change the dynamic," he said. Michael McConnell, former director of the National Security ...

The Six Things that Drive "Technopanics"
Consider a few examples: At many cybersecurity hearings and events these days, various doomsayers predict an impending “Digital Pearl Harbor,” or even a “cyber 9/11,” even though these historical incidents resulted in death and destruction of a sort ...


RSA® Conference 2012 Addressed the Top Information Security Issues Through ...
RSA ® Conference, (, the world's leading information securityconference and exposition, concluded its 21 st annual event last Friday at the Moscone Center in San Francisco. 562 speakers across approximately 346 sessions, ...

Do you want the NSA peeking into private networks?
Plus, the Department of Homeland Security is vying to be at the helm of cybersecurity initiatives involving the private sector. At the RSA conference in San Francisco last week, former counter-terrorism czar Richard Clarke discussed the in-fighting ...

'It was as if a child was ripped from your arms'
Sydney Morning Herald
It was the year the global community realised cyber threats were not just isolated hypotheses. Hacktivist group Anonymous went on the offence, highly-targeted attacks claimed security and other brand names including Sony, Dell, CitiBank, ...

Sydney Morning Herald

4 Ways to Fight Card Fraud
But banking institutions and merchants continually fail to address the greatestsecurity gap - the point of sale. As a special agent within the Cyber Intelligence Section of the Secret Service's Criminal Investigative Division, Rasmussen has ...

'60 Minutes' profiles threat posed by Stuxnet
by Steven Musil March 4, 2012 7:39 PM PST Follow @stevenmusil Former US intelligence officials and computer security experts warn of the potential problems and consequences that accompany this relatively new type of weapon in cyberwarfare.

Insurance for Cyber Risks: Coverage Under CGL and “Cyber ...
By Scott Godes
about cyber risks, privacy class action claims, and insurance coverage for cybersecurity claims,cyber risks, privacy claims and privacy class actions, and other emerging risks. We discussed these claims and we gave our ... Just a few years later, the focus on liability and risks as related to computers and network security has changed to another, but far more real, issue: the risk of data breaches, hacks, network interruptions, and other cyber risks. The number of data breaches andcyber ...
Corporate Insurance Blog

FBI Head Frets over Cyber Threats |
By gHale
The FBI needs the private sector to help combat what he believes is becoming the nation's top threat:Cyber security. ... The FBI needs the private sector to help combat what he believes is becoming the nation's top threat: Cyber security.

Trend Micro hires new cyber security expert » OnlySoftwareBlog
By Rahul
Trend Micro hires new cyber security expert. March 5th, 2012 by Rahul Leave a reply ». Share. Anti-virus software maker Trend Micro Inc has hired a prominent expert on cybersecurity policy to help boost its sales to the US government.

Michael Jackson's entire back catalogue stolen by hackers | Cyber ...
By admin
Sony music suffered its second major security breach in a year, with thieves targeting ... in the biggest ever cyber attack on a music company. The news ... The attack on the Jackson files occurred shortly afterwards but has not been revealed ...
Cyber Crimes Unit

FBI director: Cyber-threats will become top worry |
By admin
“The director of the FBI told an annual gathering of cyber-security professionals on Thursday that the agency needs the private sector to help combat what he believes is becoming the nation's No. 1 threat.” (Source: News from The Associated ...

Defence Forces Armed with ICT | eGov Magazine
By meenakshi
... future warfare. Along with other cyber security measures, cyber warfare will include ICT based early warning systems for real time detection of enemy's intrusions and their neutralization.” .... Even if the location becomes known, the targeted nation might not have the legal or moral authority to respond, as it can never be conclusively proved if the cyber attack was a case of vandalism, of commercial theft or an effort to cripple a nation before launching a conventional war. “The threat of ...
eGov Magazine

US military's Defense Information Systems Agency (DISA) shut down ...
By editor
According to a Pentagon official familiar with network security, the outage was not in response to any kind of cyber-attack. The official said if it were an attack, “we'd all know it and DISA would have done what is called a blanket protocol, ...

Ways through which the NGFW acts on the cyber security systems
Cyber Warfare On The Net. Publisher: Larry Isaacson. Until the recent admission by Iran of a successful cyber attack on its nuclear power plant facilities, cyber warfare had not made serious inroads into the collective consciousness.
Latest Articles on

Symantec: Anonymous tricked into installing malware -
By John Callaham
Has Anonymous become the victim of a cyber attack? That's the new claim from security software company Symantec. In a post on its blog site this week, Symantec says that during the denial of service attacks that Anonymous launched in the ...

Amazon, MacDonald's, Walmart Coupon ... - Cyber War News
By Lee J
Indian Cyber Hunters, who have claimed to "be back" have started out attacking some coupon websites, leaving them with a main page defacing which has been on there for some hours now.
Cyber War News

AnonOps Communications: #FBI Says Cyber Attacks Becoming Top ...
By Anonops
#FBI Says Cyber Attacks Becoming Top Terror Threat. United States and the Culture of Fear "The people don't want war, but they can always be brought to the bidding of the leaders. This is easy. All you have to do is tell them they are being ...
AnonOps Communications

Acquisitions Indicate Continuing Growth of the U.S. Federal Cyber ...
By admin
“A recent acquisition of cyber security business HBGary by ManTech is another evidence of continuing growth of the U.S. Federal Cyber Security Market. As the last years have seen a number of acquisitions in the cyber security market.
Market Intelligence

The Blog @ Homeland Security: Cybersecurity Legislation Would ...
Posted by Mark Weatherford, Deputy Undersecretary for Cybersecurity Last week , I discussed the recently-introduced Cybersecurity Act of 2...

New cyber-attack on Greek ministry after arrest - Yahoo! News
Greece's justice ministry on Wednesday sustained a cyber-attack, the second this month, after the arrest of a teenager accused of participating in the first hacking ...

FBI expert calls for cyber warfare | Cyber Warzone
He also predicted the combination of the two threats: "Until now, the terrorists have not used the Internet to launch a large-scale cyber attack in the United States.

Press Releases - .: United States Senator John McCain :: Press ...
“The SECURE IT Act strengthens America's cybersecurity by promoting collaboration and information-sharing, updating our criminal laws to account for the ...

Cybersecurity and Your Small Business | TechSling Weblog
The world is changing – as we speak, there are probably hundreds of ways you' re making yourself and your business vulnerable to cyber-hacking. Sometimes ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud