Cyber-Attack Under Way Against Gas Pipelines

Cyber-Attack Under Way Against Gas Pipelines - Report
National Journal
The newspaper also quotes alerts from the DHS's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). “ICS-CERT has recently identified an active series of cyberintrusions targeting natural gas pipeline sector companies," it quotes an ...

Don't Flush Privacy in the Name of Security
CIO
On the face of it, the Cyber Intelligence Sharing and Protection Act (CISPA) that the US House of Representatives just passed seems to address the long-held notion that encouraging private and public sector concerns to share security information will ...

eIQnetworks Unveils IT Security Solution to Strike Back Against Cyber Attacks
MarketWatch (press release)
eIQnetworks is hosting a webinar entitled, "Cybersecurity: The Enterprise Strikes Back Against the Cyber Dark Side!" on Tuesday, May 15, 2012, 1:00 pm - 2:00 pm EDT to demonstrate how SecureVue's improvements allow it to deliver true ...

Elderly at risk of cyber attack
Herald Sun
THE elderly will be at greater risk of cyber attacks after the National Broadband Network rollout, authorities warn. They say more seniors will have access to the internet with the appeal of electronic health services in their homes or remote ...

US gas pipeline firms currently under major cyber attack: Report
Newstrack India
Washington, May 7 (ANI): Computer networks belonging to American Natural Gas Pipeline companies are currently under a major cyber attack, according to alerts issued by the US Department of Homeland Security. At least three confidential 'amber' alerts, ...

Lockheed Martin to support US Cyber Crime agency in twarting cyber attack
Computer Business Review
The company will provide a range of technical, functional, and managerial support to DC3 which provides vital assistance in the investigation of criminal, counterintelligence and counterterrorism matters, as well as cyber security support to Defense ...

TrustSphere Uses Security Intelligence to Uniquely Counter Social Attacks ...
MarketWatch (press release)
"The cyber-threat landscape continues to evolve rapidly. Socially-based attacks delivered via email are increasingly targeting an organization's executives and not just rank-and-file employees. This complicates the task which many of today's security ...

India steps up battle against rising cyber crime wave
BBC News
And while this jams an inbox and is a headache for the consumer, for the government there are also more serious issues, such as national security and trying to avoid a potential cyber attack by a terrorist group. According to the Minister of State for ...

BBC News

UK MOD Corrects Medial Report About Cyber Security
defpro
14:41 GMT, May 7, 2012 The Guardian today has an article with the headline 'Hackers have breached top secret MOD systems, cyber security chief admits'. The article is based on an interview with Major General Jonathan Shaw, who until recently was the ...

Unisys Makes Its Stealth Cybersecurity Offerings Available Through New ...
MarketWatch (press release)
Under the new channel initiative, resellers will be able to market the Unisys Stealth securityinnovations to industry segments targeted for cyber attacks, such as financial services, healthcare, legal and Federal, state and local government.

ICS-CERT alert: Natural gas pipelines under attack
CSO (blog)
The latest incident response report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) -- part of DHS -- warns of an ongoing cyberattack against the computer networks of US natural gas pipeline companies.

Sherman Says: New cyberbullying bill in Congress a step toward protection ...
Metrowny.com
As the first anniversary of the death of Osama bin Laden approached last week, members of the US House of Representatives were debating the impact of the Cyber Intelligence Sharing and Protection Act. The bipartisan proposal passed 248 - 168 on ...

Four Out Of Five New Malware Samples Are Trojans, According to PandaLabs Q1 Report
Sacramento Bee
The figures corroborate what is well known: massive worm epidemics have become a thing of the past and have been replaced by an increasing avalanche of silent Trojans, cyber-criminals' weapon of choice for their attacks. A graph depicting these figures ...

Senate Democrats revise cybersecurity bill to get Republican support
Infosecurity Magazine
The Obama administration on Wednesday simulated a cyber attack on the New York City power grid during a summer heat wave in an effort to convince US senators to pass comprehensivecybersecurity legislation. Fulfilling a pledge made last week, Sen.

Cybersecurity agency CIOs top priority, says survey
FierceGovernmentIT
Although most cyber incidents come from inside the organizations, such as data breaches that compromise personally identifiable information, most cybersecurity resources are directed at outsider threats, said some CIOs. As for external threats, ...

Louisiana Tech University designated a National Center of Excellence by NSA, DHS
Phys.Org (press release)
The academic institutions honored by the NSA and DHS are recognized leaders in information assurance and cybersecurity with graduates of their programs often developing into cyberexperts who help to protect national-security information systems, ...

Preparing for World Web War I
AllGov
In the real world of the early 21st Century, the nations of the world are preparing for very different sorts of cyber-war threats, which could arise from terrorists, hactivists, rogue states or organized crime. The US-dominated North Atlantic Treaty ...

AllGov

Letting our lawmakers make laws about cybersecurity is probably a mistake
ZDNet (blog)
For example, instead of just sticking to cybersecurity in the cybersecurity bill, some Senators are tossing in the entire cyber sink. Some of the Senators working on the Senate's version of thecybersecurity bill want to add provisions that allow not ...

The Malicious Hacker's Ever-Sharper Eye
TechNewsWorld
... according to Symantec's annual Internet Security Threat Report for 2011, released last week. And that will continue in 2012, Harrison said. A target growing in popularity among denizens of the cyber underworld are human resources departments, ...

Senate Dems seek to end cybersecurity impasse
FederalNewsRadio.com
over whether to regulate some cyber practices in the private sector. Democrats are said to be willing to modify the regulation language in the hopes of attracting some Republican votes. Industry groups are also weighing in to see if the ...

Will China Mobile Get Its U.S. License Approved?
Business Insider
Concerned about possible cyber spying, US national security officials are debating whether to take the unprecedented step of recommending that a Chinese government-owned mobile phone giant be denied a license to offer international service to American ...

Richard A. Clark to focus on cybersecurity, counter-terrorism at SRA International
Washington Post
Will there be a significant cyber event in the years ahead? People keep asking, well, do we have to have a cyber Pearl Harbor in order for people to do the right thing? Implicit in that question is sort of a hope that that will happen and then maybe ...

Anonymous attacks CIA and Interpol
Hurriyet Daily News (press release)
Using the slogan "We hack the world to save the planet.”, the cyber group tweeted the attack minute by minute on their Twitter account. The attack was named "Tango Down,” the code phrase used when special American military teams take down enemies.

Hurriyet Daily News (press release)

Suspicious emails target gas pipeline operators
FederalNewsRadio.com
The Department of Homeland Security is urging natural gas pipeline operators to look out for suspicious emails, reported The Christian Science Monitor. The agency said they are part of an organized cyber attack that began five months ago.

First POST: Kickoff
techPresident
The Department of Homeland Security has recently reported a cyber-attack it says is aimed at natural gas pipeline companies. Senate Democrats are expected to make some changes tocybersecurity legislation to attract Republican votes after the House ...

Cyber Attack Or Hype Attack? | The Agonist
Cyber Attack Or Hype Attack? Anyone watching the news recently cannot be unaware that "cyber-war' is one of the new buzzwords in national security reporting, mostly because various government agencies are after larger slices of budget ...
The Agonist - thoughtful, global, timely

US Cybersecurity capability. National ... - Security Affairs
By paganinip
Really interesting is the component related to cyber security, U.S. Computer Emergency Readiness Team (US-CERT) has reported an impressive growth of the number of cyber attacks and incident registered in the last five years, involving ...
Security Affairs

Why Bother to Demonstrate in the Streets When You Can Simply ...
By Ronen Kenig
Why Bother to Demonstrate in the Streets When You Can Simply Launch a Cyber-Attack on a Government Website. ... The ERT handles dozens of security cases every week with customers from all over the world. Their case statistics reveal ...
Radware Blog

Cybersecurity at the International Level | Journal of Diplomacy
By John Sinden
Russia considers “cyber attacks” to be a military issue while the U.S. sees them as criminal activity. The U.S. uses the term “cybersecurity” and for what Russia calls “information security.” The two countries also have very different notions of ...
Journal of Diplomacy

CRS: CYBERSECURITY - IWS Documented News INTERNATIONAL
By noreply@blogger.com (SBasefsky)
minimum level of security from cyber threats. On the other hand, others have argued that such. regulatory schemes would not improve cybersecurity while increasing the costs to businesses,. expose businesses to additional liability if they fail ...
IWS Documented News INTERNATIONAL

CISPA Must Die! | HostGator Web Hosting Blog | Gator Crossing
By Sean Valant
Ostensibly, CISPA exists to “help the U.S Government investigate cyber threats and ensure thesecurity of networks against cyber attack.” However, this wolf in sheep's clothing also allows complete, unfettered access to your online activities ...
HostGator Web Hosting Blog |...

TRANSCEND MEDIA SERVICE » Keyboard Cops: CISPA
By Antonio C. S. Rosa
Almost no one had read the Cyber Intelligence Sharing and Protection Act (CISPA) before it was rushed through the United States House of Representatives in late April [2012] and sent to the Senate. CISPA is the ... For example, “the head of a department or agency of the Federal Government receiving cyber threat information…shall provide such cyber threat information to the National Cybersecurity and Communications Integration Center of the Department of Homeland Security.
TRANSCEND MEDIA SERVICE

U.S. Cybersecurity Debate Risks Leaving Critical Infrastructure in ...
By bobgourley
U.S. Cybersecurity Debate Risks Leaving Critical Infrastructure in the Dark. May 7, 2012 By bobgourley. Editor's note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national security and ...
Bob Gourley

IBM CISO Study as Predictor of Future Electric Sector Cyber-Security
By Andy Bochman
IBM CISO Study as Predictor of Future Electric Sector Cyber-Security. IBM recently interviewedsecurity leaders in a bunch of companies, recorded their responses, and teased out findings that I think you'll find interesting. Respondents ...
The Smart Grid Security Blog

PandaLabs Q1 Report: Four Out Of Five New Malware Samples Are ...
By Panda Security
PandaLabs, Panda Security's anti-malware laboratory, today published its Quarterly Report for Q1, analyzing the IT security events and incidents from January through March 2012. In the first quarter of 2012 ... In any event, the figures simply corroborate what is well known: Massive worm epidemics have become a thing of the past, and have been replaced by an increasing avalanche of silent Trojans, cyber-criminals' weapon of choice for their attacks. China Tops List of Infections per ...
Press Panda Security

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com