Costly cyber attacks can be costly to prevent

Costly cyber attacks can be costly to prevent
Public Service
The attack pushed the European Union and the North Atlantic Treaty Organisation to intensify their efforts against electronic attacks. Cyber security rapidly became a hot topic in meetings at the highest levels. The annual NATO Summit in Bucharest,...

Public Service

Cyber Physical Systems Virtual Organization Holds National Symposium on Moving ...
SYS-CON Media (press release) (blog)
By Bob Gourley On 11 June 2012 the Cyber Physical Systems Virtual Organization will be holding a symposium on Moving Target Research. In this context, think of Moving Target as meaning the creation of a dynamic attack surface to adversaries done in a ...

Booz Allen Hamilton to Support Business and Economic Growth in Qatar
MarketWatch (press release)
The firm will focus its expertise on providing specialist services to government and commercial clients on critical issues related to the nation's development, most notably in the areas of information technology, cyber security and transportation and ...

Broadcasters claim FCC bias - Rockefeller: Business needs more SEC input on ...
Politico
... SEC INPUT ON CYBER DISCLOSURE — Senate Commerce Chairman Jay Rockefeller believes the SEC needs to ensure hacked companies are adequately informing their investors about when they suffer a security breach or cybersecurity risk that could ...

Cyber-intelligence bill sponsor silent on FBI push to wiretap social networks
Daily Caller
By Josh Peterson - TheDC The author of the Cyber Intelligence Sharing and Protection Act (CISPA) — a bill that would allow the sharing of network cyber threat information between private corporations and the federal government, particularly the NSA ...

Daily Caller

Pentagon expands cybersecurity exchange
Washington Post
Information needs to be shared because hackers, especially in China, are accelerating efforts to penetrate computer networks such as those of defense contractors, Rear Adm. Samuel Cox, director of intelligence for US Cyber Command, told reporters at a ...

Civil liberties watchdogs oppose Senate cybersecurity bill
Fierce Homeland Security
... cybersecurity legislation flows now to the Senate, so does increased scrutiny on cyberlegislation before it, with a coalition of 34 ideologically diverse groups writing (.pdf) senators May 10 to urge their vote against Cyber Security Act of 2012.

Balancing cybersecurity and privacy
Baltimore Sun
Currently, the US government can identify malicious computer code that could be an incomingcyber attack on a government or corporate network. But the law won't allow us to share this information with private companies so that they can protect ...

DOD expands voluntary cyber info-sharing program
Defense Systems
By Defense Systems Staff The Defense and Homeland Security departments have expanded a key cybersecurity and information assurance pilot program begun in 2011 to allow all defense industrial base companies that might be eligible for the program to ...

US DOD Announces the Expansion of Defense Industrial Base Voluntary ...
defpro
07:10 GMT, May 14, 2012 The US Department of Defense (DoD) in partnership with the Department of Homeland Security announced today important developments in defense industrial base cyber security activities. After a year-long Defense Industrial Base ...

Rights Groups Say Cybersecurity Act Threatens Privacy
The Epoch Times
By Joshua Philipp A joint letter from more than 30 organizations is calling on the Senate to revise parts of the Cyber Security Act of 2012 that could undermine digital privacy. The act, which is receiving bipartisan support and is hitting the Senate ...

Beware, three-year term in jail awaits cyber stalkers
The Hindu
Hi-Tech Crime Enquiry Cell, the special wing in Kerala Police that investigates cyber crimes, points out that it is pretty easy to track the offenders. It is also easy to lodge a complaint with the Cell. Recently, actor, writer and activist Sajitha ...

Websites of many educational institutions hacked
IBNLive.com
BHUBANESWAR: In a cyber attack of sorts, websites of scores of educational institutions of the State were found defaced by unidentified hackers on Sunday. This has sent the managements in a tizzy. The targets included Government universities and ...

Security Powerhouses McAfee and CloudShield Offer a New Sensor-based Approach ...
MarketWatch (press release)
"Partnered with CloudShield, McAfee is excited to help bring a faster, more resilient securityproduct, operating in real-time, at real network speeds to the market." The CloudShield CS-4000 Platform is the latest advancement in trusted cyber solutions ...

Security guru warns businesses of cyber theft
NW Evening Mail
CHINESE cyber criminals could be targeting the nuclear industry in a bid to steal information and copy technology, west Cumbrian businesses have been warned. IT security expert Dr Paul Irving shocked members of the Britain's Energy Coast Business ...

Syria Conducting Cyber-espionage on Dissidents' PCs; F-Secure
SPAMfighter News
According to F-Secure, the security company, the government of Syria apparently is using spyware to infect activists' computers through Skype for quietly monitoring their operations. Researchers from the company stated that earlier one hard drive they ...

Apple Asks Kapersky for Security Help
The Mac Observer
CEO Eugene Kapersky recently said Apple needs to step up its security efforts and said that the Mac maker is about ten years behind Microsoft in its philosophy. “Cyber criminals have now recognized that Mac is an interesting area. Now we have more, ...

The Mac Observer

Unholy Partnerships Between Telecoms & Government Spy Agencies: Have We ...
Government Accountability Project (blog)
Of course it is couched with nice-sounding goals like protecting "national security" and protecting us from vicious "cyber attacks," but approaches to reforming cyber-security too often include over-broad privacy-threatening measures.

Public vs. private cyberattack responsibility debate heats up
CSO
Or should it be up to the government to fund and create a "cyber army" to protect private industry, just as it protects factories and infrastructure in the physical world? That debate is raised in two reports last week on National Public Radio on the ...

How to mitigate damage from a distributed denial of service (DDoS) attack
Voice and Data
Businesses can take a strong, proactive defence against today's sophisticated cyber criminals with a well-rehearsed DDoS mitigation plan, or 'playbook'. When a DDoS attacker renders a VoIP system, website or entire network inaccessible to users, ...

Entrust Demonstrates Enterprise-Wide Security Framework at 2012 FS-ISAC & BITS ...
MarketWatch (press release)
The mission of the FS-ISAC, in collaboration with the US Department of Treasury (Treasury) and the Financial Services Sector Coordinating Council (FSSCC), is to enhance the ability of the financial services sector to prepare for and respond to cyber ...

Potential links between Google and the NSA stay locked
Inquirer
"EPIC filed a Freedom of Information Act (FOIA) request with the NSA following a cyber attack in January 2010 that led Google to contact the NSA. The NSA refused to either confirm or deny the existence of responsive records, claiming that such ...

Smart Grid Industry May Be Suffering From "Standards-Analysis Paralysis"
Renew Grid
What I do think we should do is put equal attention on security and innovation." In terms of what is most vulnerable to a cyber attack, nCircle asked respondents to choose from smart meters, metering infrastructure, utility energy management systems ...

Senior FBI Executive Keith Slotter Joins the Business Intelligence ...
MarketWatch (press release)
Additionally, Mr. Slotter managed the FBI's Financial Institution Fraud and Cyber Crimes program. Some of his investigative work is tied to one of the largest fraud undercover investigations in FBI history: "Operation Disconnect" and "Operation Senior ...

The Blackberry Project: how easily do we sell our privacy?
Infosecurity Magazine
In response to growing pressure from privacy groups, the US House Intelligence Committee has modified the Cyber Intelligence Sharing and Protection Act (CISPA), narrowing the scope of what is considered a cyber threat. By comparing protective measures ...

McKeon, Panetta spar over defense cuts ... Lawmakers demand FBI probe of bomb ...
Politico
“The United States military sees new opportunities,” Panetta says, “to collaborate with key partners in the Americas to meet emerging challenges in cyber security, to build the capacity of other nations in the hemisphere to respond to natural disasters ...

Political event attracts protest
Signal
“If (the protesters) had looked at the amendments, they would see (the Cyber Intelligence Sharing and Protection Act) prevents the exact same form of intrusion they're afraid of,” West said. “We have an incredible cyber attack war going on against ...

McAfee Increases Focus on Small and Medium Sized Businesses
IT News Online
SMBs are in a unique situation when it comes to defending themselves against the rising tide ofcyber threats that cover the business and technology landscape. They can't afford high-priced IT and security talent on site; they can't afford a breach ...

China vs. Philippines: What will US do?
News.Az
This conflict has a parallel track of “cyber-warfare”. There are reports of mutual cyber-attacks on both sides. First at the end of April, Chinese hackers have reportedly attacked the website of the University of Philippines, while Filipino hackers ...

News.Az

The Revolution from Cyber Terrorist attack to Indian Cyber Security ...
By noreply@blogger.com (THN Reporter)
The Revolution from Cyber Terrorist attack to Indian Cyber Security. The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Hacker News, Hacked by, Learn Hacking, email hacker, Anonymous ...
The Hacker News [ THN ]

DOD, DHS Expanding Cyber Info Sharing Program | FedScoop
By David Stegon
DOD, DHS Expanding Cyber Info Sharing Program. By David Stegon · Monday, May 14th, 2012 · 1:20 am. The Departments of Defense and Homeland Security are expanding a program where government shares cybersecurity information ...
FedScoop

Cyber Physical Systems Virtual Organization Holds National ...
By admin
On 11 June 2012 the Cyber Physical Systems Virtual Organization will be holding a symposium on Moving Target Research. ... In December 2011, the White House, in cooperation with Networking and Information Technology Research and Development (NITRD) Program released the report Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity ... The Daily FedCyber.com Update provides a summary feed of cyber security news with a focus on the federal space.
CTOlist.com

McAfee, SAIC Create APT Cyber Attack Solution; Charles Beard ...
By Katelyn Noland
McAfee, SAIC Create APT Cyber Attack Solution; Charles Beard Comments. Charles Beard. SAIC Inc. and McAfee announced plans in October to partner to build new cybersecuritysolutions for national governments, intelligence, ...
The New New Internet

THE SPY ON YOUR CELL PHONE IS A PROFESSIONAL ...
By Ruth King
America's cyber-systems are under attack because what they hold is extremely valuable. Everything from the design of a stealth fighter-bomber to the investment portfolio of a powerful entrepreneur is open to professional cyber-spies and, thus, to the governments that sponsor them. For political ... Today we need a major program led from the top, with our allies and friends on board, to confront the growing vulnerability of all Western systems and the entire securityumbrella. The basic ...
RUTHFULLY YOURS

A picture of The Iran threat | Security Affairs
By paganinip
Security is everyone's responsibility ... The Obama administration has concentrated great efforts in this area especially in the last couple of year, increasing awareness on cyber threats and the related risks for the Nation. Protection of critical ... The cyber offense against Iran has triggered a massive engage of the country in cyber warfare, Teheran has officially declared war to the West. It's clear that ... Will Western military coalition attack the Iran or the battlefield will be just cyberspace?
Security Affairs

Security Bulletin for Photoshop, Adobe Recommended to Buy CS6 ...
By VOGH Reporter
VOGH- VOICE OF GREYHAT| Leading Resource of Cyber-Security & Hacking News. VOGH-News ... Ministry of Defence (MoD) Under Cyber Attack ... Philippine China Cyber-War. Govt Sites, DBM, Radio Network, Universities Compromised ...
VOGH- VOICE OF GREYHAT| Leading...

Cyber Security Law Still Under Debate
Cyber Security Law Still Under Debate. ... Issues of whether business' cyber liability risks should be regulated and privacy protection are standing in the way of needed federal cyber security and privacy legislation, experts say. Currently, several bills with varying approaches are pending legislative action, according to ... CISPA would "waive every single privacy law ever enacted in the name of cybersecurity," says opponent Rep. Jared Polis, a Colorado Democrat and onetime Web ...
About.com Insurance

Wireless: Training workers to be cyber safe
By Wireless
Cyber thieves and scam artists have become more sophisticated in their means to steal login credentials and gain access to valuable information or other assets. The scams affect individuals at work as well as at home. It's more important than ...
Wireless

GrEaT sAtAn"S gIrLfRiEnD: Persian Cyber Threat
By GrEaT sAtAn'S gIrLfRiEnD
Persian Cyber Threat. Most urgent cyber threat to Great Satan? Commonwealth Russia? Nyet! Collectivist China? Nope! Vilayat-e Faqih! Conventional wisdom suggests that the Iranian regime - increasingly isolated as a result of mounting international ... Similarly, in his 2010 book “CyberWar,” former National Security Council official and noted cybersecurity expert Richard A. Clarke ranked Iran close behind the People's Republic of China in terms of its potential for “cyberoffense.” ...
GrEaT sAtAn"S gIrLfRiEnD

A Request for a Competitive Process - Digital Bond SCADA Security ...
By Dale G Peterson
Guest author Sean McBride is the Director of Analysis and Co-founder of Critical Intelligence, a company that provides Cyber Situational Awareness and Threat Intelligence services for Industrial Control System Owner/Operators, Vendors and ...
Digital Bond's SCADA Security Portal

Tourists warned of pop-up window cyber-attacks FBI: Hackers target ...
By Thomas Steinmetz
Tourists warned of pop-up window cyber-attacks. FBI: Hackers target travelers ... The IC3 report comes months after the Bloomberg story, but then the FBI isn't exactly known for being ahead of the curve when it comes to security warnings. Here's the key passage: ... Jonathan Kine, a technology consultant based in Jakarta, says he's seen this type of attack described in the IC3 report in hotel and public Wi-Fi networks in China, Malaysia, and Indonesia. "The user gets a pop up or a ...
eTurboNews - Independent and...

The Road to CEIC 2012 – Cyber Response Lab: Memory Analysis ...
By Miller
As I mentioned in my last posting on network forensic analysis, volatile data analysis is a crucial part of the three pillars of an incident response investigation, and the topic of the CyberResponse lab entitled Memory Analysis & Malware Triage. Volatile data ... This is a core component of incident response triage; the ability to rapidly determine to what extent, if any, a system has been compromised, ideally using network-enabled tools such as EnCase®Cybersecurity. David Nardoni ...
Threat Response

Homeland Security Watch » Cyber attack currently underway ...
A major cyber attack is currently underway aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to ...
www.hlswatch.com/.../cyber-attack-currently-underway-targeti...

Pipelines Under Cyber Attack | JECE Energy Blog
Power companies and regulatory agencies have been concerned for some time about the vulnerability of infrastructure to cyber attack, and I believe that NERC ...
jeceblog.com/2012/05/08/pipelines-under-cyber-attack/

Is Cybersecurity a Public Good?, David Henderson | EconLog ...
In a recent article in the Wall Street Journal, "Everyone Should Pay for Cyber Defense," April 22, Harvard University economics professor Martin Feldstein, my ...
econlog.econlib.org/archives/2012/05/is_cybersecurit.html

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com