Hackers Breach Sites of Foreign Policy and Human Rights Groups

Hackers Breach Sites of Foreign Policy and Human Rights Groups
New York Times (blog)
Hackers infiltrated the sites using two well-known security vulnerabilities, one in Adobe Flash and another in Java software, according to a blog post by security researchers at the Shadowserver Foundation, a nonprofit group that tracks cyberthreats.

New York Times (blog)

India creating architecture to ensure cyber security: NSA
"(The) government is in the process of putting in place the capabilities and the systems in India that will enable us deal with this anarchic new world of constant and undeclared cyber threat,attack, counter-attack and defence," he said at the release ...

Cyber space played key role in 26/11 attack: US commander
Indian Express
The Mumbai attack perpetrated by Pakistan-based LeT was an example of how terror outfits use latest available IT tools for their decisive motives, a top US commander has said, highlighting the role of cyber space in such events.

Boards Are Still Clueless About Cybersecurity
The Governance of Enterprise Security: CyLab 2012 Report, released today by Carnegie Mellon CyLab, examines how boards of directors and senior management are managing privacy andcyber risks. Although two previous reports were conducted in 2008 and ...

Stuxnet ≠ cyberwar, says US Army Cyber Command officer
Documents like the International Strategy for Cyberspace begin to change the landscape, since for the first time they attempt to wrap a formal framework around cyber-security – including deciding that “our cyber-security must be based on law or the ...

Tenable Network Security Named Top 'Cyber Warrior' at Baltimore SmartCEO VOLT ...
MarketWatch (press release)
COLUMBIA, Md., May 16, 2012 (BUSINESS WIRE) -- Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), announced today that it has been awarded the Baltimore SmartCEO VOLT Award in the 'Cyber Warrior' category, ...

'Link cyber terrorism to India's overall counter-terror capabilities'
The report, released by National Security Advisor Shivshankar Menon, also recommends the creation of a Cyber Coordination Centre to "serve as a clearing house, assessing information arriving in real time, and assigning responsibilities to the agencies ...

Govt putting in place cyber security architecture: NSA
PTI | 08:05 PM,May 16,2012 New Delhi, May 16 (PTI) With India having experienced 8000 cyberattacks during the 2010 Commmonwealth Games, National Security Adviser Shiv Shankar Menon today said the government is "in final stages" of developing ...

Cyber-Safety Savants Say Less is Best Online
Women's eNews
By Mitzi Perdue Cybercriminals may be "spear phishing" your Facebook or Twitter account. A gorgeous PowerPoint attachment may harbor a malicious program. Women are more vulnerable to online security breaches, so here are a few words from the Web-wise.

Women's eNews

UK businesses braced for cyber attacks
Computer Business Review
It seems that reality is beginning to strike for many businesses regarding how prepared they are to cope with a cyber attack. The number of responses claiming to be "very confident" they could withstand an attack dropped from 34% in 2010 to 22% this ...

The art of cyber warfare
Stuxnet made it clear that cyber weapons can physically damage as much as traditional military attacks, making us rethink the famous quote, “The pen is mightier than the sword.” So said Kenneth Geers, NCIS cyber security subject expert.


Cyber-Criminals Rain On Voyager Mobile's Opening Day Parade
It seems hackers and cyber criminals aren't in favor of cheap wireless plans. Voyager Mobile will operate as a Mobile Virtual Network Operator (or MVNO) which resells airtime on Sprint's CDMA and WiMAX networks. The Knoxville-based carrier plans to ...


BAE warns UK government on cyber security
Financial Times
Six months after the release of the government's cyber security strategy, in which it pledged to foster greater engagement with British businesses suffering from the growing risk of cyberattacks, few businesses are engaging with government and others ...

Alleged 'Anonymous' hacker John Borell blamed for cyber attack on LA Canine ...
89.3 KPCC (blog)
Authorities announced today that the 21-year-old Ohio man, already in trouble for alleged cyber attacks against law enforcement agencies in Utah, also is thought to be behind the February attacks on the Canine Association's website, according to the LA ...

89.3 KPCC (blog)

How Cyber-Hacks Are Hurting Small Businesses
By Kendra Srivastava Cyber-attacks on small businesses are repelling customers and costing a fortune, leaving owners with tough choices on how to strengthen their online defenses against increasingly common security breaches.


Bit9 to Speak at CEIC 2012 on Cyber Forensics and Application Control
MarketWatch (press release)
The event offers more than 110 world-class learning sessions for attendees to gain insight from experts in computer forensics, e-discovery, cyber security, enterprise investigations, IT security and more. On Tuesday, May 22 at 2:00 pm, Ian Poynter, ...

Beyond CISPA: The cybersecurity bills you need to worry about right now
The Cybersecurity Act of 2012 (officially known as S. 2105, and often referred to in the press as the “Lieberman-Collins bill”) seeks to establish robust security standards to protect against “cyber threats,” with a particular emphasis on the ...

Menon pokes fun at cyber threat, says websites meant to be hacked
Daily Bhaskar
The home page of the CBI website had a message from the 'Pakistani Cyber Army' warning the Indian Cyber Army not to attack their websites. Seeing some humour in the situation, Menon said: "There is invariably a hullabaloo when one of our websites is ...

Privacy advocates fear CISPA
... Cyber Intelligence Sharing and Protection Act by the House, which occurred despite opposition from privacy advocates, lawmakers and the White House. The bill was created to help government agencies gather information in the name of cybersecurity.

Hackers engage in cyber espionage
Internet security researchers warned on Tuesday that foreign policy and human rights websites are being booby-trapped by hackers in what appears to be cyberespionage. As of Monday websites for Amnesty International Hong Kong, the Cambodian Ministry of ...


Arab hackers launch cyber attack against Iranian oil company: report
Tehran Times
The Iranian Oil Ministry, the National Iranian Oil Company, and a number of other companies affiliated with the ministry, were also targeted by a computer worm on April 22, but the malwarehad been detected before it could infect the systems.

Survey: Critical sectors less attuned to cyber threat
Washington Post (blog)
By Ellen Nakashima A new survey out Wednesday finds that the energy and utilities industries rank the lowest when it comes to computer and information security risk management. The survey of 108 global companies also found that the financial sector had ...

US must strut cyber might to stop attacks, Cartwright says // May 15, 2012
By Aliya Sternstein May 15, 2012 comments The United States must frighten adversaries by displaying an arsenal of operational hacking weapons to fight cyber threats, said retired Gen. James E. Cartwright, who crafted the Pentagon's current cyber policy ...

Hackers booby-trap foreign policy group websites
Internet security researchers warned that foreign policy and human rights websites are being booby-trapped by hackers in what appears to be cyber espionage. Internet security researchers warned that foreign policy and human rights websites are being ...

Wyden: 'Very concerned' about privacy impact of White House-backed cyber bill
The Hill (blog)
told The Hill on Tuesday that he is "very concerned" about the impact on consumers' privacy of the White House's preferred cybersecurity bill. He said he will articulate a more detailed position in either a press release or a statement on the Senate ...

UK companies are cyber self-confident
Infosecurity Magazine
A full 94% of large UK businesses are confident their organization is protected against cyberattacks, but 82% said that cybercriminals are innovating faster than businesses, according to Detica's Cyber Security Monitor survey.

Mumbai attack plan used Google Earth, says US commander
By Arun Kumar, IANS, Washington : Citing the example of the 26/11 Mumbai terror attack, a top US military commander has warned of the dangers posed by "democratisation" of technology in future warfare. "Now, in many ways, technology has been ...

EC-Council Foundation Announces Innovative Child Online Protection Initiative ...
Houston Chronicle
Online Global Cyber Defense Competition comprised of computer network defense and computer forensics games that mimics real world scenarios to attract over 15000 players from 6 continents for both the high school and professional category.

Apple Protects OS X 10.5 Leopard From Flashback Malware
The Flashback malware was the most significant cyber-attack on Apple's Mac users, and exposed Apple's weaknesses in security. The malware exploited a vulnerability in Java that Oracle had patched in Microsoft Windows PCs and other systems in February.

Cyber-war debate moving too slowly: Bill Caelli
CSO Magazine
The legal black hole of Internet security is hampering efforts to respond to attacks, according to Emeritus Professor Bill Caelli of Queensland University of Technology. Highlighting that the Internet and IT industry still face the same questions as ...

India creating architecture to ensure cyber security: NSA
New Delhi: India is creating a “coherent and comprehensive” security policy to deal with the “anarchic new world” of cyber threats, National Security Adviser Shivshankar Menon said here Wednesday. ... and the systems in India that will enable us deal with this anarchic new world of constant and undeclared cyber threat, attack, counter-attack and defence,” he said at the release of a report on “India's Cyber Security Challenge” by the Institute of Defence Studies and Analyses (IDSA).

National Radio Astronomy Observatory (NRAO) Hacked By Xception ...
By VOGH Reporter
... Attack. Hackers Breached The Security System of MOD ... Official website of NRAO - National Radio Astronomy Observatory faced cyber attack, and Indian hacker code named "Xception Code" took responsibility of the attack. NRAO is a ...

Cyber Legislation Sparring Continues - Law Across the Wire and ...
By Randy Sabett
As has been widely reported, the two bills take very different approaches to cybersecurity. SECURE IT calls for a voluntary information sharing regime that would apply to all entities and is focused on sharing of cyber threat information, with ...
Law Across the Wire and Into the Cloud

When time is of the essence- How real time correlation can help ...
By Tom Kendall
Security Intelligence. With the growing threat of cyber attacks, sophisticated hackers, devastating viruses & worms and more, keeping your network secure requires superior intelligence. Q1 Blog leverages the experience of the industry's best minds ... One type of attack that has had a lot of media coverage in the UK are DDoS attacks, with hacktivists using multiple IP addresses to attack one IP address within an organization, resulting in critical business services and infrastructure being ...
The SIEM, Log Management, and...

The Cyber State of the Nation @ Alsop Louie Partners
By Stewart Alsop
Crowell is former Deputy Director of the National Security Agency as well as a respected executive and director of private companies in the security space. Our cyber defense is in a state of crisis. That's right: The United States of America is ...
Alsop Louie Partners

“Catch Me If You Can” Trojan Banker Zeus Strikes Again (Part 1 of 5 ...
By SpiderLabs Research
We will investigate every layer of the cyber-attack from infecting innocent users with bots to collecting their money into the cyber-gang hands. In this blog we will provide an overview of theattack and describe the spreading technique of the bot.
SpiderLabs Anterior

The Pirate Bay cyber-attacked: Anonymous may or may not be ...
By Administrator
The Pirate Bay has now been cyber-attacked, by someone who may or may not be Anonymous.... As if by magic, The Pirate Bay was yesterday attacked themselves – with a DDoS attack, no less – and rendered accessible for 24 hours.
FACT magazine: music and art

U.S. Forces Not Ready for Future War | AFCEA SIGNAL Scape
By Robert K. Ackerman
He noted that the upcoming F-35 strike aircraft is not ready to deal with a cyber attack. The general related that systems used to have a switch to turn off all electronic emissions; now platforms need a switch to turn off all apertures, which are ...

The Virus War Against Iran | JewishPress
By Micah D. Halpern
This was the only dimension of the cyber attack that required old-style spy activity. ... But Iran is not known for its skill in hacking and counter-cyber warfare. .... We've been hearing a lot from Jewish Democrats and the administration itself that Barack Obama is the best friend Israel has ever had or, as in Joe Biden's fractured fairy tale version of history, “has done more for Israel'ssecurity than any president since Harry Truman” – a president who actually did nothing for Israel's security.

Carahsoft Providing AppSecInc Cyber, Data Solutions To Govt ...
By Katelyn Noland
Carahsoft Providing AppSecInc Cyber, Data Solutions To Govt; Michael Shrader Comments. Carahsoft will aggregate Application Security Inc.'s database and cybersecurity solution applications to the U.S. government, the companies ...
The New New Internet

Dealing to cyber bullies | Otago Daily Times Online News : Otago ...
Certainly there is evidence - and a good deal of anecdotal observation and comment - that not only is cyber space a frictionless medium through which insult, cruelty and manipulative communications fluently travel, but that the ramifications of this can be especially destructive. This is particularly so when the virtual world is used by immature and malevolent individuals to undermine, hurt or attack others. Educators have suggested this tendency is on the increase, particularly among ...
Otago Daily Times: Opinion

The Smart Grid Security Blog: Announcing the First Electric Sector ...
By Andy Bochman
As the title says, this post begins the process of assigning kudos to utilities who've been so bold and proactive as to appoint and empower a senior professional to run cyber security across their organizations. By this I mean a senior business ( more than a technical) professional charged with ... But with a short list to start, I'm including CSOs, CISOs and VPs of things that sound like cybersecurity: Present. National Grid: Robert Coles, CISO & Head of Digital Securityand Risk; DONG ...
The Smart Grid Security Blog

Booz Allen To Offer IT, Cyber Services In Qatar; Don Pressley ...
By Gino Troiani
Booz Allen To Offer IT, Cyber Services In Qatar; Don Pressley Comments. Tuesday, May 15th, 2012 | Filed under General | Posted by Gino Troiani. Booz Allen Hamilton will target government and commercial clients in Qatar in the information ...

eConflicts: News - North Korean GPS blocking sparks cyber war fears
By Daniel Ventre
eConflicts, blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare... "South Korea will lodge an official complaint with the UN over its reclusive neighbour after GPS-blocking by the North for over a week disrupted hundreds of flights, in what some officials are worried could be the first signs of a looming cyber war [...] Over 500 aircraft flying to or from South Korea's main airports of Incheon and .... NATO Cyberspace Security LibGuide - Reports. Loading.

Welcome to KippsDeSanto – A Prototype for Active Defense
By Suzanne E. Kecmer
Posted under: Cyber Security. Having recently been steered to the DNSChanger Working Group website, www.dcwg.org, we thought this was a pretty interesting approach to deal with the identification and clean-up of the massive malware ...
Market Pulse – KippsDeSanto & Co.

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud