Cyber Attack may Have Taken Al-Qaida Offline

Cyber Attack may Have Taken Al-Qaida Offline
Military.com
A minor Web site posted a message in an online forum claiming "the media arena is witnessing a vicious attack by the cross and its helpers on the jihadi media castles." "It sure looks like a takedown," said former State Department counter-terrorism ...

Codenomicon Clarified Performed Key Role in NATO Cyber Defense Exercise Locked ...
MarketWatch (press release)
HELSINKI & SARATOGA, Calif., Apr 03, 2012 (BUSINESS WIRE) -- Codenomicon Clarified Situation Awareness solutions played a key role in the Locked Shields 2012 multinational cyber security exercise. The exercise took place March 26-28 and was organized ...

US fears al Qaeda cyber attack on New York
The Express Tribune
NEW YORK: US law enforcement and counterterrorism officials are trying to figure out the significance of recent occurrences on websites believed to have close links to al Qaeda, including a graphic some fear could be an attack threat directed at New ...
 
The Express Tribune

Is Cyber Warfare Imminent, Or Is the Hype Overblown?
WebProNews
As a result of this influx of attacks, Congress is currently weighing legislation that would attempt to prevent cyber warfare. In fact, more than fifty bills have been introduced in Congress toward this effort. Should cybersecurity be a top priority ...

Al-Qaida's online forums go dark for more than week
Minneapolis Star Tribune
No one has taken responsibility; some experts say it looks like a cyber attack, perhaps by a government or hacker. WASHINGTON - Al-Qaida's main Internet forums have been offline for more than a week in what experts say is the longest sustained outage ...

Pep Boys Puts the Brakes on Cyber Threats with Corero Network Security
MarketWatch (press release)
Corero's Next Generation IPS proactively protects Pep Boys' networks against attack. Corero's IPS also facilitates Pep Boys compliance with the Payment Card Industry Data SecurityStandard (PCI DSS), which requires protection of cardholder data, ...

Cyber-defence slow due to generation gap: US official
PhysOrg.com
Analyists work at the National Cybersecurity & Communications Integration Center (NCCIC) in Arlington, Virginia, in 2010. Sluggish moves to counter the rising threat of cyber-attacks can be blamed on a generation of policymakers out of touch with rapid ...

PhysOrg.com

UK more resilient to cyber attack thanks to Queen's University
EMSNow (press release)
Research by Queen's University Belfast into making the UK more resilient to a cyber attack has been recognised through the award of an 'Academic Centre of Excellence in Cyber SecurityResearch' status by GCHQ in partnership with the Research Councils' ...

Chartis Introduces CyberEdge Tower(SM)
MarketWatch (press release)
With growing concern about catastrophic cyber security and privacy exposures, as well as the likelihood of increased regulation and enforcement, companies are proactively addressingcyber risk and insurance disclosures. The SEC's recent Disclosure ...

Cyber Defence Summit gets under way
Oman Tribune
MUSCAT Regional collaboration in the face of a potential cyber attack was the main topic of theCyber Defence Summit that began on Monday. Endorsed by ITU-IMPACT, the largest cyber security alliance of its kind with 137 members, the summit is the ...

Arlington Thwarts $1.8 Million Cyber Attack
NBC 5 Dallas-Fort Worth
By Mola Lenghi Arlington city staff foiled a cyber attack that was set up to steal nearly $2 million in city funds. City spokeswoman Rebecca Rodriguez said sophisticated online attack targeted $1.8 million in city money. The city's treasury staff ...

Another blow to Al Qaeda? Terror organisation believed to be the victim of a ...
Daily Mail
By Daily Mail Reporter Al Qaeda has been dealt another blow after a number of the terror organisation's web forums were shut down in an apparent cyber attack. According to The Washington Post, five Al Qaeda websites promoting a 'jihad' or holy war ...

Daily Mail

MaaS-based Cyber-attacks Predicted becoming Commonplace during 2012; VeriSign
SPAMfighter News
A special kind of business model that is called MaaS (malware-as-a service) is becoming increasingly popular among cyber-criminals in comparison to other models, as developers ofattack codes employ it, while offering additional facilities alongside ...

EU plans tougher punishment for hackers – and their bosses
Register
By Out-Law.com • Get more from this author The European Parliament's Civil Liberties Committee overwhelmingly voted to approve proposals to criminalise certain activity relating tocyber attacks last week. The proposals contain plans to make specified ...

Centres of Excellence in Cyber Security Research named
BCS
Government Communications Headquarters (GCHQ) has named the eight universities that are to become the first Centres of Excellence in Cyber Security Research. The eight academic hubs chosen are the University of Bristol, Imperial College London, ...

Qaeda forums gone dark in suspected government-linked cyber attacks
Al-Arabiya
(File photo) By Al Arabiya Al-Qaeda's main forums have gone dark for 11 days in what experts suspect to be the result of cyber-attack carried out by hackers affiliated to the US spy agencies. Al-Qaeda Shumukh al-Islam forum, went offline on March 22 ...

Al-Arabiya

Countdown to a digital Pearl Harbor
WTOP
(WTOP/JJ Green) WASHINGTON - Despite numerous warnings from top intelligence officials, the US government doesn't have a plan yet to confront a massive, malicious cyber-threat. And the window of opportunity to develop one may have already closed.

Clarke Warns of Cyber Attack
Supply Chain Digital
Richard Clarke, the former counter-terrorism advisor to Presidents Bill Clinton and George W. Bush, has made a staggering new claim this week that the United States in currently under acyber attack from China. What's worse, he suggests, ...

ManTech wraps up purchase of cybersecurity software company
Washington Technology
HBGary, which has customers in the financial services, energy, critical infrastructure and technology sectors, will become part of a new commercial business unit within ManTech's Mission, Cyber, & Intelligence Solutions group led by Senior Vice ...

Israeli terror expert: 'Digital Pearl Harbor' worries exaggerated
Daily Caller
By Josh Peterson - The Daily Caller Computer hard drives, associated with a crime, are loaded into two hard drive arrays, right, which are connected to a Mac Pro computer, left, on a forensic examiner's desk at the Department of Defense CyberCrime ...

Daily Caller

Congressman Altmire: PA Cyber STEM Epicenter to Train Youth for Tech Jobs of ...
Sacramento Bee
By PA Cyber Charter School PITTSBURGH, April 2, 2012 /PRNewswire-USNewswire/ -- Pennsylvania Congressman Jason Altmire (D-4th) told technology industry representatives that the Pennsylvania Cyber Charter School's planned STEM Epicenter program would ...

IT Must Change Security Strategies to Keep Up With Cybercriminals
PCWorld
The cyber arms race will lead to a cyber cold war. Nations are already in the process of developing more sophisticated ways to attack via cyberspace and will improve their capabilities in the coming years. Nations that haven't already developed this ...

Al Qaeda online silence followed by chilling warning
Examiner.com
April 2, 2012 Cyber security experts suspect that popular Al Qaeda Internet forums downed for about two weeks may have been the target of a cyberattack. Cyber-terrorism experts say it is the longest sustained outage of the web sites since they were ...

Al Qaeda's Online Forums Go Dark, but the Reason Is Unclear
Jakarta Globe
There remains uncertainty over whether the recent outages were caused by a cyber attack at all, and some skeptics note that some prominent Al Qaeda forums remain online. US government agencies, including US Cyber Command, had no role in the outages, ...

Regional cyber security collaboration deemed vital
Oman Daily Observer
An endorsement by ITU-IMPACT, the largest cyber security alliance of its kind with 137 members, re-emphasises its importance. The conference was opened on April 1 at the Grand Hyatt Hotel Muscat, under the auspices of Dr Abdullah bin Mohammed al Saeedi ...

Oman Daily Observer

Al-Qaeda websites down
Brisbane Times
No one has claimed responsibility for disabling the sites but the breadth and duration of the outages have prompted speculation the forums have been taken down in a cyber attack - launched perhaps by a government or hacking group.

Al-Qaeda's online forums go dark for longest period
Newstrack India
Nobody has yet claimed responsibility for disabling the websites, but the duration of the outages have led some experts to conclude that the forums have been taken down in a cyber attacklaunched perhaps by a government, a government-backed ...

Generation Gap Blamed for Low Global Cybersecurity Commitments
IndustryWeek
Agence France-Presse Sluggish moves to counter the rising threat of cyber-attacks can be blamed on a generation of policymakers out of touch with rapid technological change, a senior US official said April 2. "The truth is there are a lot of senior ...

MasterCard, Visa, other credit card numbers breached in massive attack
Toronto Star
Queen's University computer security expert David Skillicorn said the Global Payments Inc.attack shows it's time for cyber security experts to reform the way they operate. “Cyber securityis still stuck using a castle model – put a wall around ...

How China steals US secrets
Economic Times
WASHINGTON: For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyber attacks carried out by foreign governments. Robert S. Mueller III, ...

Cyber Weapons | Security Affairs
By paganinip
The two expert define “cyber weapon” as “a computer code that is used, or designed to be used, with the aim of threatening or causing physical, functional, or mental harm to structures, systems, or living beings“. Over the years many ... To this category tools and software to generate traffic to overload a system create damage to its services with a temporary effect (e.g. Denial of Service attack) without damaging. Medium .... From → Cyber warfare, Intelligence,Security. No comments yet ...
Security Affairs

Former DHS And Bank Of America Exec Greg Garcia Talks Mobile ...
By Brynn Koeppen
We asked Garcia to discuss the evolution of cyber security threats, how the mobile frontier is impacting cyber warfare, as well as what work still needs to be done in the government contracting community to limit cyber breaches. WashingtonExec: Please tell us a little about your... In 2007 when I was with the Department of Homeland a video was leaked to CNN that showed a test of a cyber attack on an electric generator on the power grid. The generator was not ON the power grid, ...
News & Insight for the DC Area Executive

Cyber-defence slow due to generation gap: U.S. official | The Raw ...
By Agence France-Presse
“The truth is there are a lot of senior officials in many countries who barely even know how to use an email,” Rose Gottemoeller, US acting under-secretary for arms control and international security, said during a visit to Estonia. “The change will come with the new ... has bitter experience in the field. A politically charged dispute with its Soviet-era master Moscow in 2007 was marked by a blistering cyber-attack blamed on Russian hackers — though the Kremlin denied any involvement.
The Raw Story

Foreign Policy Chat - Clarke Talks Cyber And Burma Steps Toward ...
By Brad Bosserman
The offensive cyber attack that temporally damaged the Iranian nuclear centrifuge at Natanz has long been rumored to have originated with the US or Israel. Clarke's claims about the worm's American origins obviously wasn't a disclosure of ...
NDN

April 3, 2012 – Military Affairs - Iran Daily Brief
By admin
IRNA reports that its news network service was subjected to “severe cyber-attack during the Majlis elections” – Islamic Republic News Agency (IRNA) has reported that its website was subjected to “severe” cyber-attacks during the final days of the Iranian year 1390 and ... IRNA reported that “IT experts identified the sources of sabotage, some of which were from inside the country… and identities of attackers have been submitted to Iran's cyber security officials for further investigation.” ...
Iran Daily Brief

Codenomicon Clarified Performed Key Role in NATO Cyber ...
Codenomicon Clarified Performed Key Role in NATO Cyber Defense Exercise Locked Shields 2012 by Providing Real-Time Malware Attack Information. ... Codenomicon Clarified Situation Awareness solution helps telecom operators, Internet Service Providers (ISPs), and Computer Emergency Response Teams (CERTs) to filter, analyze, and visualize a wide range of network traffic, security, and critical infrastructure related events. Codenomicon Clarified assists users in preventing ...
ITbriefing.net

Cyber Security Strategy - PDF
The world is growing on a powerful dependence on Internet, so governments, leading organizations and business leaders are having difficulties to determine the amount of damage and risk they could face by cyber-attacks and how to be ready to ... plan against the rising tide ofcyber attackers. Cyber-Attacks: First, what does cyber means? It means "the electronic medium in which online communication takes place" simple the Web or the internet in general. Now, what cyber-attack is?
PDF PodCast - PDFCast.org

Chemical Facility Security News: ICS-CERT Publishes Another ...
By PJCoyle
Today the folks at DHS ICS-CERT published another advisory on Invensys Wonderware (the last one was published just last Friday) and made available an updated version of their Cyber Security Evaluation Tool (CSET). ... Until ISCD gets the necessary expertise in-house to do a real ICS cybersecurity assessment (unlikely any time soon) or signs a memorandum of understanding (MOU) with ICS-CERT to have them conduct that portion of the site security plan review, this will ...
Chemical Facility Security News

Malware Attacks on Korean News Websites | The Peninsula
By Chad O'Carroll
Tags: cyber attack, social media. Tweet. By Chad O'Carroll. This week The Daily NK, an online newspaper dedicated to covering North Korea from a human rights perspective, suffered aMalware attack. It was by no means the first malware ... But without having the actual malicious scripts to compare (and an IT security expert to analyze them), there is no way of knowing if the Daily NK code construes either a specific threat to the Korea watcher community or instead is something more ...
The Peninsula

How China Steels Our Secrets – Trade Reform
By Ellen Croibier
Categorized | National Security ... Obama must. Richard A. Clarke, the special adviser to the president for cybersecurity from 2001 to 2003, is the author of “Cyber War: The Next Threat to National Security and What to Do About It.” Share ...
Trade Reform

The Zacks Analyst Blog Highlights: Visa, Global Payments ...
By Zacks Equity Research
While Global Payments has been strictly recommended to revise its cyber protection policies and systems, card giants have been advised by the federal officials to enhance their securitycompliances in order to avoid another data attack in ...
Zacks Investment Research - All...

IT Must Change Security Strategies to Keep Up With Cybercriminals ...
To prepare for these threats, the ISF recommends that organizations ensure that standardsecurity measures are in place, and that they develop cyber resilience by establishing a cyber security governance function, timely attack intelligence ...
Computerworld

New extensive health data rank counties…Defense cuts would cost ...
By christian clansky
(Wire, 4/3). PREPAREDNESS | Intelligence officials say that a cyber-attack on the government would have crippling physical effects on our entire region – effects so devastating that officials invoke Pearl Harbor for comparison. (WTOP, 4/3) ...
Washington Grantmakers Daily

Cyber Security Centre
Cyber security is an increasingly important requirement for global business and modern society. We exist in a data-centric world, where information technology ...
www.cybersecurity.ox.ac.uk/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com