Cyber attack: Flashback Trojan Hits 550000 Macs

Flashback Trojan Hits 550000 Macs
PC Magazine
"This once again refutes claims by some experts that there are no cyber-threats to Mac OS X," Doctor Web said in a Tuesday blog post. About 56.6 percent of the infected computers, or 303449, are located in the US, while 19.8 percent are in Canada, ...

'Rude awakening' for Mac users as cyber attack infects 550000 of Apple's ...
Daily Mail
The infected machines are now part of a 'botnet' of zombie machines which can be controlled by cyber criminals and 'told' to download new malicious software. Theattack has been described as a 'rude awakening' for Mac users. The new attackwas spotted ...

Daily Mail

Cyber war on Al-Qaeda Websites
Middle East Online
Al-Qaeda's main Internet sites have gonedown for more than week in possiblecyber attack. By Dan De Luce - WASHINGTON Al-Qaeda's main Internet sites have gone silent for more than a week in an unprecedented blackout that is most likely the result of a ...

Middle East Online

European hackers suspected in Utah Medicaid files breach
Chicago Tribune
Hudachko said the Technology Services Department notified state health officials Monday evening about the cyber attack. Technology Services had recently moved the claims in question to a new server, allowing the hackers "to circumvent the server's ...

RSA Cyber Attack Report: Zeus Fading But Offspring Spreading
Credit Union Times
This isn't mythology; it's hacking in cyber space with real consequences for financial institutions around the world. According to the RSA Monthly Online Fraud Report, the global network of hackers and cyber thieves apparently are moving beyond the ...

Cybersecurity Workshop addresses cyber-physical systems/industrial controls.
ThomasNet Industrial News Room (press release)
April 5, 2012 - Scheduled for April 23-24, Cybersecurity for Cyber-Physical Systems workshop will address cybersecurity of SCADA systems and industrial controls. On first day, speakers from automotive and healthcare industries will discuss challenges ...

National security threat: hacking the smart grid
EDN.com
"People are actively pursuing cyber warfare as an attack method," said Loomis, pointing out that the smart grid was a prime target for such an attack. "Before, if someone wanted to shut off power to my home, the electricity company would have to send ...

Al-Qaeda says website back online after 'cyber attack' by 'enemies of Allah'
Newstrack India
Washington, Apr 5 (ANI): One of Al-Qaeda's main Internet websites is reportedly back online after a lengthy blackout, which according to analysts was result of a cyber attack. The outage extended to five other online forums associated with the terror ...

'We need investment to secure our cyber future': researcher
Sydney Morning Herald
Dr Raymond Choo says more investment in cyber security research is needed. Photo: Dylan Jones OPINION: Australian researchers need more funding to help secure cyber space, argues Dr Raymond Choo. The Australian Government has invested significantly in ...

Sydney Morning Herald

DHS: America's water and power utilities under daily cyber-attack
CSO
... cyber-espionage and denial-of-service attacks against industrial-control systems, according to the team of specialists from the US Department of Homeland Security who are called to investigate the worst cyber-related incidents at these utilities.

Wombat Security Technologies Announces Cymbel Corporation as the First Partner ...
San Francisco Chronicle (press release)
Wombat now recruiting additional partners to keep up with rising demand for their uniquely effective security awareness assessment and training soutions Pittsburgh, PA (PRWEB) April 05, 2012 Wombat Security Technologies, a leading provider of cyber ...

FOSE 2012 looks at cyber security
WJLA
At this year's conference, cyber security is a hot topic—especially with new legislation in the works on Capitol Hill. Like previous years, FOSE 2012 features the latest and greatest products for federal workers and agencies—new mobile applications, ...

WJLA

Eastern European hackers suspected of Medicaid cyber raid
V3.co.uk
by Alastair Stevenson US authorities believe Eastern European hackers are responsible for a cyber attack on the Utah Health Department (UHD) that exposed 24000 Medicaid files. The intrusion reportedly occurred on Friday, with the hackers targeting ...

V3.co.uk

ICF International Team Wins Second Place in Global CyberLympics World Finals
MarketWatch (press release)
The ethical hacking competition pitted teams from North America, Europe, the Middle East, and Asia Pacific against each other in attempts to attack and defend various cyber targets. The Netherlands took home the title.

London 2012 prepares for cyber-attacks
The Guardian
But ask security experts whether Pennell's pessimism is shared, and the reaction is one of puzzlement. The Olympics are big, certainly. But nobody can recall any overt cyber-attack against them. And the idea that the London Games would be targeted by ...

The Guardian

Can Chinese Technology Policy Tell Us Anything About Cyber?
Council on Foreign Relations (blog)
It is well worth the read, and I thought I might try the same, using what we know about the study of Chinese technology policy to shed some light on China andcyber. Linking cyber and technology policy is a form of techno nationalism that is widely and ...

Council on Foreign Relations (blog)

Al Qaeda site says 'enemies of Allah' took it down
DAWN.com
The unprecedented blackout was most likely the result of a cyber attack, either by a government or by private hackers, the experts in the United States said. In an announcement posted online on Wednesday, Shamukh al-Islam acknowledged that unknown ...

DAWN.com

Al-Qaeda forum back online after blackout
Washington Post
No one has claimed responsibility for the outages, and US officials have said that no US agency, including the military's Cyber Command, was involved. Five other sites, including al-Fida', al-Qaeda's other main forum, were still offline Wednesday.

Anonymous 'planning attack' on UK gov't website
ITworld.com
By Antony Savvas, Computerworld UK | Security Add a new comment April 05, 2012, 9:31 AM — UK hackers linked to the Anonymous group are encouraging supporters to attack the Home Office website this Saturday (7 April) in protest at the extradition of ...

Keys to cyber defense: Internal info sharing, skilled staff
GCN.com
An important asset is the Joint Cyber Security Center, which collects network data and can alert DOE and the United States Computer Emergency Readiness Team in the event of an incident. Before launching its cybersecurity center, DOE did not have much ...

CISPA: Congressional plan to censor Internet concerns critics
Examiner.com
The controversial bill intends “to provide for the sharing of certain cyber threat intelligence andcyber threat information between the intelligence community and cybersecurity entities, and for other purposes.” The bill is being sponsored by Rep.

New Bill Lets Gov't Collect All Your Private Cyber Info
CIO (blog)
The Cyber Intelligence Sharing and Protection Act (CISPA) says feds can ask ISPs and others for any info they want, and no restrictions on its use are currently in place. The Cyber Intelligence Sharing and Protection Act (CISPA) is getting a lot of...

CIO (blog)

Rogue US Airways-themed emails distribute ZeuS-based malware
InfoWorld
By Lucian Constantin | IDG News Service Cyber criminals are distributing a new piece ofmalware that's based on the ZeuS computer Trojan through rogue emails that masquerade as US Airways online check-in notifications. The spam campaign was launched on ...

How to defend against Flashback malware, which hit 600K Macs
Christian Science Monitor
Here, an analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory. Apple users are accustomed to thinking of their Macs as malware-resistant, if not completely virus-proof. Which is what makes the news ...

Christian Science Monitor

Richard Clarke, US Security Wonk, Suggests Customs Should Check All ...
TechCrunch
... in US security for a decade, serving as a member of the National SecurityCouncil and special adviser for cybersecurity to President George W. Bush. He has written a column for the New York Times that details just how serious the threat of cyber ...

TechCrunch

Key al-Qaida Web forum back online
UPI.com
US officials said no US agency, including the military's Cyber Command, was involved, the Post said. Some analysts said they thought that perhaps site administrators may have taken the forums offline if they suspected foreign spies infiltrated the ...

Teen filmmaker takes a stand against cyber bullying
WREX-TV
The movie shows the deadly effects of cyber bullying and why students need to end it. In his film "Prevention," Barton shows two high school girls using facebook and text messages to harass and belittle a classmate. The bullying becomes too much to ...

Innovation leadership makes US a cyber target
FCW.com
By Amber Corrin The United States' history as a leading innovator in technology, manufacturing and intellectual capital means cybersecurity must be understood as a matter of nationalsecurity, according to one former National Security Agency official.

Editorial: U.S. must improve cybersecurity
Houston Chronicle
Over the past decade, the cyber has supplanted the physical in so many important aspects of life, whether communication, commerce or, as is increasingly apparent, espionage. But as the world has changed, Congress has moved at dial-up speeds when it ...

Data breaches of small businesses, including doctor offices, on the rise
American Medical News
The analysis found that cyber criminals are responsible for a large number of breaches globally, and small organizations are considered easy targets. One of the reasons breaches at small health care organizations are on the rise is that automated ...

National Managed Security Solutions Provider, CoreLink Data Centers, and ...
MarketWatch (press release)
The online event is an encore presentation of the highly successful November webinar, and is designed to help companies, such as small businesses and healthcare providers, protect valuable data assets from heightened cyber threats against a backdrop of ...

Anonymous attacks nearly 500 Chinese government sites
msnbc.com
Anonymous' Chinese wing is embroiled in a hacktivism campaign against the Chinese government, and so far has defaced or swiped information from nearly 500 websites. Announced on the newly created @AnonymousChina Twitter feed, the attacks began March 30 ...

Anonymous 'planning attack' on Home Office website
PC Advisor
By Antony Savvas | Computerworld UK | 05 April 12 UK hackers linked to the Anonymous group are encouraging supporters to attack the Home Office website this Saturday (7 April) in protest at the extradition of three UK citizens to the US.

'Rude awakening' for Mac users as cyber attack infects 550000 of ...
By NWOTruth
The infected machines are now part of a 'botnet' of zombie machines which can be controlled bycyber criminals and 'told' to download new malicious software. The attack has been described as a 'rude awakening' for Mac users. (Read more…) Read the full story... [VIA WHAT REALLY HAPPENED]. TAGS: COMPUTERS/INTERNET/SECURITY ...
NWOTruth

'We need investment to secure our cyber future': researcher ...
OPINION: Australian researchers need more funding to help secure cyber space, argues Dr Raymond Choo. View full post on cyber attack — Yahoo! News Search Results. View full post on National Cyber Security. Tags: Cyber, future ...
Gregory D. Evans

Anonymous, its strategy against censorship and the ... - Security Affairs
By paganinip
having to deal with the cyber threat that requires us much thought in terms of technology with respect to the real security of the systems that surround us and exploitable vulnerabilities to offend. attention often pose on delicate events ... of Beijing raises some doubts about the true origin of the attacks, but even more seriously the possibility that the vertices of the collective may have been ideologically conducted to attack an historic enemy, Anonymous used as a cyberweapon.
Security Affairs

Computer and Internet Law Updates for 2012-04-05 | Barry Sookman
By Barry Sookman
Google liable for advertisers' deception, Australian court rules http://t.co/Pe8mfsuH #; Apple holds the master decryption key when it comes to iCloud security, privacy http://t.co/4em6k4XS #; US government: We hear there's child porn on those ... and ZEMAX are confusingly similarhttp://t.co/2s71SqpW via IPinAfrica #; EU Cybercrime Bill Targets Anonymous: Makes It A Criminal Offense To Conduct 'Cyber Attack' http://t.co/uOmGp7LF #; 'what does leadership in copyright look like?
Barry Sookman

Prison Planet.com » Government Surveillance Crackdown On ...
By admin
Cyber bills legislate for mass surveillance; Former Cybersecurity Czar calls for HomelandSecurity data “customs inspections”. Steve Watson Prisonplanet.com. April 5, 2012. Government Surveillance Crackdown On Internet Goes Into ...
Prison Planet.com

Cyber schools: A for-profit model designed to destroy our public ...
By Chris Savage (aka Eclectablog)
Republicans in Michigan are pushing forward with an effort to remove the cap on so-called "cyber schools" (also known as "virtual schools") in our state. Already passed in the Senate as Senate Bill 619, it has been reported ... I recently provided proof that Public Act 53, which prevents school employees from having their union dues deducted by their employer, is nothing more than a political attack on teachers' unions. While Governor Snyder said the purpose of the bill is to make sure ...
Blogging for Michigan

Editorial: U.S. must improve cybersecurity – Houston Chronicle ...
By Blackmere
Editorial: U.S. must improve cybersecurity – Houston Chronicle. Published April 5, 2012. Over the past decade, the cyber has supplanted the physical in so many important aspects of life, whether communication, commerce or, as is ...
Blackmere Consulting

Embedded Systems & Ethical Hacking Summer Training Opportunity ...
By Santosh
1. Ethical Hacking & Cyber Security. Inline image 2. Can you secure your OS yourself? Do you know Hackers can attack your Web Server? Are you able to protect yourself from Viruses & Trojans on the network? Can you protect yourself from ...
Know a Fest - Campus Festivals in India

Company IDs 10000 computers behind 'malicious' cyber-attack on ...
OTTAWA — A "sophisticated" Internet attack that threw the NDP's weekend leadership convention into turmoil was caused by a professional who used more ...
www.montrealgazette.com/technology/computers.../story.html

Campaign 2012: The Presidential Candidates on Cybersecurity ...
Obama has identified cybersecurity as one of the most serious economic and national securitychallenges facing the United States. Shortly after taking office, ...
www.ewi.info/campaign-2012-presidential-candidates-cyberse...

DOD Needs Industry's Help to Battle Cyber Attacks
DOD Needs Industry's Help to Battle Cyber Attacks “Today, we're in the forensics mode. We need to see the attack. If we can't see the attack, we can't stop it.
infosecisland.com/.../20855-DOD-Needs-Industrys-Help-to-Ba...

April Workshop Focuses on Cybersecurity for Cyber-Physical ...
Securing computers against unlawful and malicious attacks is always important, but it's especially vital when the computers in question control major physical ...
www.nist.gov/itl/csd/scada-040312.cfm

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com