Expert: Huawei routers are riddled with vulnerabilities

Expert: Huawei routers are riddled with vulnerabilities
CNET
German security researcher says the Chinese government doesn't need to demand back doors on Huawei routers because there are already major holes in their firmware. by Elinor Mills LAS VEGAS -- A German security researcher says he has uncovered several ... 

Senate cybersecurity push continues - Commissioner voting with conservative ...
Politico
Senate cybersecurity push continues - Commissioner voting with conservative slant - Cyberamendments pour in - Amid tech meltdown, Yelp, LinkedIn set to report earnings - Genachowski heads west. 0. Email; Print ... Joe Lieberman and other allies wrote in a letter to the business lobby that they are "baffled" at the Chamber's opposition to the bill's new mechanism for improving the digital security at power plants, water systems and other forms of critical infrastructure. Tony Romm has the story for Pros: ...

DEFCON 20 Roundup: Lessons in Security
PCWorld
"This is the world's best cybersecurity community," said [NSA director General Keith B.] Alexander, who also heads the U.S. Cyber Command. ... Hackers can and must be part...of a collaborative approach to secure cyberspace, he said. ... Gen. Alexander [said] ...

Homemade tech to reduce India's cyber threats
ZDNet (blog)
The cybersecurity analyst added telecom networks and smartphones can be bugged, and there have been cases in which the equipment automatically updates itself without the user's knowledge. Malware is also evolving and can self-destruct or be ...

High School Teachers Try to Hack it at NYU-Poly Cyber Security Boot Camp
MarketWatch (press release)
"This program is a first step toward increasing the number of students who will find their enthusiasm about cyber security matched and fostered by their own teachers," he said. The United States is facing a critical shortage of cybersecurity professionals, ...

Defcon And Black Hat Wrap-Up: Wifi And VPN Crypto Cracked, NSA Chief Asks ...
Forbes
In a bizarre meeting of worlds, National Security Agency chief and U.S. Army Cyber Command general Keith Alexander addressed Defcon for the first time ever, calling on the hackers present to help secure America's infrastructure. Alexander flattered the audience as “the world's bestcybersecurity community” and even referred them to a job recruitment site set up specifically for the conference. When an audience member asked if the NSA compiles profiles on every American, Alexander called the claim “absolutely ...

NSA chief asks hackers for help in securing cyber space
InfoWorld
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. "This is the world's best cyber security community," said Gen. Alexander, who ... The issue is that if you don't see a cyber attack you can't defend against it and at the moment, the NSA has no insight if Wall Street is going to be attacked, for example, he said. Gen. Alexander pointed out that if the industry could share some limited ...

Cybersecurity Act Set For Senate Vote
Channelnomics (blog)
With stipulations reflected in CSA, last' year's proposed legislation required electrical power grid companies and other critical utilities to disclose security procedures, while receiving legal immunity if they were forced to reveal cyber attacks or other intrusive ...

The Cybersecurity Act Of 2012 Goes Up For Debate In The Senate Tomorrow
WebProNews
The Cybersecurity Act Of 2012 Goes Up For Debate In The Senate Tomorrow. 2012 is shaping up to be the year of cyber legislation. After SOPA and PIPA were defeated early this year, all attention turned towards CISPA. Even though the Internet put forth a ...

US cyber chief calls on hackers to make internet secure
ComputerWeekly.com
Alexander took the opportunity at Defcon to lobby for a cyber security bill moving through the Senate that aims to make it easier for companies under attack to share information with the government and each other, as well as give critical infrastructure owners ...

Bit9 Raises $34.5 Million for Cybersecurity Whitelisting
BostInno (blog)
“The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach to cyber security,” said Mickey Arabelovic, partner at Sequoia Capital, in a release. “Bit9 has emerged as a market leader with its ...

Sequoia Capital Leads Investment in Bit9 to Expand Leadership in Advanced ...
MarketWatch (press release)
Bit9 is the only security company to announce that it successfully stopped the Flame malwareand the RSA breach attack--both "zero-day" APT attacks--long before they were identified by traditional/legacy antivirus companies. "Traditional malware protection systems are well ... "The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach to cyber security," said Mickey Arabelovic, partner at Sequoia Capital. "Bit9 has emerged as a market leader with its ...

Preparing for a More Aggressive Iran
Huffington Post
Director, Homeland Security Policy Institute, The George Washington University ... Iran is doing some serious saber-rattling these days, threatening "a`teeth-breaking' response" to the United States should cyber-attacks continue to target Iran. ... These developments draw warranted attention to the risk posed by hybrid threats -- threats in which an adversary acquires from a third-party the necessary access, resources, or know-how needed to attack or threaten a target -- and how such might be employed strategically ...

This Week in Tech: Cybersecurity showdown arrives in Senate
The Hill (blog)
Sens. John McCain (R-Ariz.) and Kay Bailey Hutchison (R-Texas) filed amendments with the Secure IT bill in them. Sen. Patrick Leahy (D-Vt.) submitted five amendments that cover areas of data security, privacy and stiffening penalties for cyber crime. Sens.

Cybersecurity: Bit9 Raises $34.5M From Sequoia, Others For Its Whitelist ...
TechCrunch
As we heard earlier this year in Verizon's big cyber security report, the biggest threats today, he confirms, come from organized crime, nation states looking for IP from other countries and hacktivists like Anonymous. The nation state, which includes acts ...

SaskTel Selects CloudShield Advanced Cyber Countermeasures Solution to ...
defpro
25 that SaskTel, a leading full service communications provider in the Province of Saskatchewan, Canada, will utilize CloudSentry, the latest platform offering from the company'sCybersecurity Business Unit, to bolster its advanced security posture across its networks. CloudSentry is ... The platform works in line, in real-time to control network traffic at multi-gigabit speeds and provides organizations with actionable network attack intelligence that enables them to deliver advanced cyber countermeasures. In addition to ...

Sup. Johnson named vice-chairman for NACo's cyber-security task force
Today's News-Herald
The task force is set to gather and distribute information to raise the awareness of county officials as to how to protect government cyber infrastructures; provide training for cyber security at work and at home; connect the county with federally funded services and the U.S. Department of Homeland Security; and provide input to NACo steering committees on pendingcyber security legislation. “It expands ... If the county's system is weak or vulnerable it easily could facilitate a backdoor-type attack on the federal system.

Cyber crooks infiltrate social networking sites
Times of India
According to the findings of Internet Security Threat Report by a private computer security firm, social networking sites are increasingly used to launch malware attacks in India. The report highlights that the users feel ... Another aspect of the report identifies vulnerabilities where it states that there are more tier II cities on the list of frequently targeted areas by cyber criminals. Ahmedabad and Surat get mention in the report ... More. FEATURED TODAY IN NEWS. Cops name Iran military arm for attack on Israeli diplomat ...

Cybersecurity amendment: Police need a warrant to track you via GPS
Digitaltrends.com
Unlike earlier iterations of the bill — and also unlike the contentious CyberIntelligence Sharing and Protection Act — CSA2012 forbids the government from sharing the data with military organizations, like the National Security Agency, which often operate ...

Digitaltrends.com

The evolving threat landscape - from mischievous attacks to cyber war and ...
SC Magazine UK
Widely described as the most sophisticated virus of all time, Flame evidences the fact that cyberespionage is an increasingly real and advanced threat to a firm's security. The target industries of cyber ... Google's recent pledge to inform vulnerable Gmail account users if it believes they are the victims of a state-sponsored spying attack was largely thought to have been a reaction to the discovery of Flame, and the surrounding incidents of cyber crime targeting US and other government officials. However, this also ...

For first time in 20 years, NSA participates in Defcon hacker conference
FederalNewsRadio.com
In the cybersecurity plain, two species have walked together. For the first time, the NationalSecurity Agency sent someone to address the big national hacker convention, Defcon — And not just anyone from NSA. CNET reports, none other than NSA director Gen. Keith Alexander gave the keynote at this year's Defcon. Alexander is also head of the U.S. Cyber Command. Sporting blue jeans and a black T-shirt, Alexander told the gathered hackers, their talents are needed to help the United State meet the cyber threat.

Help Us, Hackers, You're Our Only Hope, NSA Chief Tells DefCon
Betabeat
Once it got underway, the long-overdue keynote was devoted to asking hackers not just for help educating the populace on cyber security, but also requesting information sharing. If hackers hear an attack is coming, the NSA would really appreciate a heads ...

Betabeat

Mulvenon: Stuxnet was Hiroshima
FierceGovernmentIT
Leadership & Best Practices · Homeland Security ... The use of Stuxnet was not merely an attempt to test the waters on cyber offense, it was a siginificant and destructive deployment of acyber weapon, said James Mulvenon, chairman of the Cyber Conflict Studies Association and vice president of Defense Group, Inc. ... And now that it has come to light that the United States was, in all likelihood, responsible for deploying Stuxnet and Flame, one panelist said the United States is even more vulnerable post-attack.

Georgian opposition party lodge protest to Russia in connection with cyber attack
Trend.az
One of the leaders of the opposition National Democratic Party of Georgia Guram Chahvadze passed a letter of protest to Russian section at the Embassy of Switzerland in Georgia, in connection with the cyber attack on the site of the party. The letter states ...

Trend.az

NSA head calls for more visibility over computer networks
Nextgov
The decentralized nature of the Internet and the confusing thicket of independent public and private networks are limiting efforts to protect against attacks, Alexander signaled Friday at the Def Con hacker conference in Las Vegas. Alexander used the speech to lobby for laws to make it easier for companies under attack to share information with the government and each other as well as give critical infrastructure owners additional rewards for adhering to future securitystandards, Reuters reported. NSA is currently ...

NSA Wants To Hire Hackers
WRTV Indianapolis
Security Chief Gives Recruiting Pitch At DefCon Hacker Conference. Stacy Cowley. POSTED: 10:30 am EDT July 29, 2012 ... top spymaster -- National Security Agency Director Gen. Keith Alexander, also the head of the U.S. Cyber Command -- took the stage Friday at the nation's largest hacker convention to deliver a recruiting pitch. ... with an often-uneasy relationship with the feds. DefCon is the older, wilder and far less official sibling of BlackHat, a cybersecurityconference that wrapped up Thursday in Las Vegas.

The cyber-crime fighters at Bit9 just raised $34.5 million from Sequoia and other ...
The Next Web (blog)
Sequoia Capital has led a $34.5 million investment round for Bit9, a company that providessecurity solutions to detect and prevent cyber threats. Prior investors Atlas Venture, ... HackersAttack Korea's SK Telecom, Grab and Sell 8.7M Customers' Data ...

Africa used as botnet army; SE Asia invests in information warfare; Latin America ...
Infosecurity Magazine
His concerns for the future are of a botnet cyber army of over a million. “At the moment, Africa isn't attacking – they're being attacked and used”. While businesses in Africa “get security”, Contos does not believe the same can be said of the government and end ...

2012 London Olympics: Top Tips on Preventing Malware Attacks during Games
IBTimes.co.uk
A report by cyber-security firm ThreatMatrix claims Personal Computers, mobile phones and tablets are likely to face increased numbers of malware attacks from hackers during the Olympics, as more and more people will access the Internet to look at the latest results and scores. Estimates indicate nearly a billion ... "With such a large audience seeking information on the Olympic Games, cybercriminals will seize this opportunity to attack PCs, mobile devices and even tablets. Cybercrime today is so advanced that in ...

IBTimes.co.uk

Seoul shares hit 4-week high on hopes of global c.bank action
Reuters
Extended rally sees KOSPI scale 50-day moving average * Financials rally as ECB debt-fighting measures eyed * Samsung Elec shares up 9 pct since record Q2 earnings * KT Corp falls 3 pct, client data leaked in cyber attack By Joonhee Yu SEOUL, July 30 ...

China Hackers Hit EU Point Man and D.C. With Byzantine Candor
San Francisco Chronicle
In an essay in the Wall Street Journal July 19, President Barack Obama warned that “the cyberthreat to our nation is one of the most serious economic and national security challenges we face.” Ten days earlier, in a speech given in ... This account of the Comment group is based on the researchers' logs, as well as interviews with current and former intelligence officials, victims, and more than a dozen U.S. cybersecurity experts, many of whom track the group independently. Private Investigators. The researcher who ...

Tagging and Tracking Espionage Botnets
Krebs on Security
A security researcher who's spent 18 months cataloging and tracking malicious software that was developed and deployed specifically for spying on governments, activists and industry executives says the complexity and scope of these cyberspy networks now ... Joe Stewart, senior director of malware research at Atlanta-based Dell SecureWorks, said he's tracked more than 200 unique families of custommalware used in cyber-espionage campaigns, and some 1000 Web site names registered by cyberspies for ...

Krebs on Security

NSA booth at Black Hat raises eyebrows
TechEye
But he did use his speech to lobby for a cyber security bill moving through the Senate that would make it easier for companies under attack to share information with the government. He wanted the Black Hats to help build a set of standards for critical networks ...

TechEye

Lieberman and cybersecurity bill co-sponsors hit back at Chamber
The Hill (blog)
"Given the cyberattacks that have affected the Chamber's own control over the information of its members, we would have hoped that you would have an appreciation for the threat to the national and economic security of our nation." ... Info agencies built on paper shift to meet demands of digital age · House gears up for 'cyber week,' but security bill's fate rests with Senate · House GOP leaders rebuff White House push on cybersecurity mandates · Online sales tax battle pits Amazon against Norquist and Sen. DeMint ...

China's Growing Cyber War Capacities
By Mattia Nelles
Unlike traditional warfare, the origins of sophisticated cyber-attacks are nearly impossible to trace. Determining where an attack originated is exceedingly difficult and by no means assured. This problem of attribution, as Lynn argues, has some ...
e-International Relations

KT Corp. -South Korea's No. 2 Wireless Service Provider Hacked ...
By VOGH Reporter
VOGH- VOICE OF GREYHAT| Leading Resource of Cyber-Security,Hacking News. VOGH-News... LinkedIn Confirmed The Cyber-Attack ... After that hack this one is the second largest attackwhich infected millions of South Korean people.
VOGH- VOICE OF GREYHAT| Leading...

Cyber Warfare and the Laws of War - blog*spot
By Jacob Katz Cogan
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their ...
International Law Reporter

5 Tips for Avoiding Cybercrime at the 2012 London Olympics
By admin
In 2008 Beijing received nearly 12 million cyber attack attempts every day. Since 2002, the ...Executive Vice President of Atos Patrick Adiba cautions that, although their security is very high, “it can never be 100 percent.” That doesn't mean ...
Crime and Forensic Blog

NSFPC: Enemies stunned by Iran's advancement in cyber operations
By Semantica
Mansour Haqiqatpour said, “Iran has achieved such scientific advancement in its cyberoperations that it can defuse any attack within the shortest possible time… Therefore, any attempts by the US and the Zionist regime (Israel) to infiltrate and ...
Iran Daily Brief

Roundup of News with special interest in Iran .. By Fred Brownbill ...
By Fred Brownbill
2/ It would appear that computers at the uranium enrichments sites in Natanz and Fordo were attacked in a new cyber attack. This information was sent via e mail to a Finnish cyber securitygroup by a scientist who is claiming to work for the ...
Save America Foundation

Hakin9 Exploiting Software July 2012 Issue is out! « CYBER ARMS ...
By D. Dieterle
Cyber War News … Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android • An In-Depth … In this article we will look at a few common Wi-Fi security misconceptions. [...] Hakin9 Exploiting Software July 2012 Issue is out! « CYBER ...
CYBER ARMS - Computer Security

Bit9 Closes on $34.5M Series D -peHUB
Bit9 is the only security company to announce that it successfully stopped the Flame malwareand the RSA breach attack—both “zero-day” APT attacks—long before they were identified by traditional/legacy antivirus companies. “Traditional malware ... “The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach tocyber security,” said Mickey Arabelovic, partner at Sequoia Capital. “Bit9 has emerged as a market ...
peHUB | Site Wide Activity

Smartphones are becoming top targets for cyber attacks |
By admin
Smartphones at the heart of modern lifestyles are becoming top targets for cyber attacks, according to security specialists and hackers who flocked to Las Vegas this week for back-to-back Def Con and Black Hat conferences. “We are entering a post-PC (personal ... “You're supposed to be paying for stuff and scanning movie posters with your smartphone, but be aware that this is another way that bad guys can attack your phone,” Miller told AFP. He showed that if he could briefly get ...

London Olympics officials prepare for cyber attacks - Los Angeles ...
As athletes compete for Olympic gold, a different group will seek international recognition — online hackers. Olympic security officials are bracing for an ...
articles.latimes.com/.../la-fi-olympics-cybersecurity-20120726

Cyber defender: U.S. ill-prepared for attack | News - Home
Since 2009, online attacks that could destroy key infrastructure in the U.S. have skyrocketed. And the man in charge of cyber defense gave the national a failing ...
www.ksat.com/news/Cyber-defender-U.../-/index.html

NSA chief asks hackers at Defcon for help securing cyberspace

NSA chief asks hackers at Defcon for help securing cyberspace
Computerworld
IDG News Service - National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. "This is the world's ... He called 11-year-old Defcon Kids co-founder CyFi to the stage and said that training young people like her in cybersecurity is what the U.S. needs. The NSA ... NSA's and U.S. Cyber Command's roles are to protect the nation from cyberattacks and foreign intelligence, Gen. Alexander ...

Hack attack
New York Daily News
Keith Alexander, head of the National Security Agency and the newly formed United States Cyber Command, from 2009 to 2011 the number of attacks on computer systems that run American infrastructure grew by a factor of 17. Numbers in a report out this ...

New York Daily News

US must develop Olympic-level cybersecurity experts
San Bernardino Sun
Recently, Department of Homeland Security Secretary Janet Napolitano asked two heavyweights in the cyber world, Jeff Moss and Alan Paller, to co-chair a task force to assess ways DHS can increase the number of highly qualified cybersecurity ...

Cyber Discovery 2.0 at LA Tech
Knoe.com
"In the world of cyber security, the adversary thinks outside the box," says Montana Williams, National Cybersecurity Education Director, "and normal solutions don't apply." Williams says when it comes to homeland security, you have to think on a more global ...

NSA Turns To Hackers To Make Internet Secure Against Cyberattacks
International Business Times
Alexander, who also head of the U.S. Cyber Command and Central SecurityService, urged hackers to partner with government and industry to realize the objective. Stating that hackers can educate others who do not understandcybersecurity, the NSA Chief ...

International Business Times

Police Arrest Two Suspects in Cyber Hacking of KT Corp.
Arirang News
The National Police Agency's cyber terror response team said seven others were booked without physical detention on charges of buying the leaked data for telemarketing purposes. Police suspect the telemarketers used the personal information of ...

NSA director finally greets Defcon hackers
Ninjalane
With the increasing threat of cyber warfare many will look to the very people who made things like Defcon possible to further protect ourselves from attack. Related Web URL:http://news.cnet.com/8301-1009_3-57481689-83/nsa-d... Return to Ninjalane News | ...

Smartphones are becoming top targets for cyber attacks
Moneyweb.co.za
Smartphones at the heart of modern lifestyles are becoming top targets for cyber attacks, according to security specialists and hackers who flocked to Las Vegas this week for back-to-back Def Con and Black Hat conferences. "We are entering a post-PC (personal computer) ..."You're supposed to be paying for stuff and scanning movie posters with your smartphone, but be aware that this is another way that bad guys can attack your phone," Miller told AFP. He showed that if he could briefly get an antennae device ...

Sen. Carper Commends Colleagues on Vote to Proceed to Debate on ...
PoliticalNews.me (press release)
Carper Commends Colleagues on Vote to Proceed to Debate on Cybersecurity Legislation “The Internet is central ... While this bill isn't perfect, it is a significant improvement over our current cyber security laws which aren't adequately protecting cyberspace.

Smart Phone Monitoring and Malware... Up close and personal...
Malta Independent Online
In fact, the cyber security industry recently observed an exponential growth of malwaredesigned to attack smart phones, steal sensitive information, and exploit that data in successful attacks, such as against mobile banking transactions. Today, the “Malware ...

Hackers Convene To Find Mobile Security Flaws
GPB
This week thousands of hackers computer security researchers, government recruiters, spooks and cyber punks descended on Las Vegas for the annual summer hacker convention. Hosted by organizations called Black Hat and Defcon, these events are ...

GPB

Guessing what Section 706(d) of the Lieberman-Collins Cybersecurity Bill Means
Lawfare (blog)
(2) the Secretary, the Attorney General, or the Director of National Intelligence determines that disclosure of a cybersecurity threat indicator would threaten national or homeland security and submits a written request to delay notification, except that the Secretary, ... Now, here's my guess – the provision is designed to allow NSA and DOJ to be able to stop temporarily companies from sharing cyberthreat indicators when it appears that the cyber threat indicator came from China or a terrorist group and they want to do ...

Lawfare (blog)

Senator wants to require warrant for GPS tracking in cybersecurity bill
The Hill (blog)
Lieberman's bill contains provisions that are intended to improve information sharing about viruses and other cyber threats between the government and industry so a cyber attack or intrusion can be thwarted in real-time. ... narrow the Federal Information Security Management Act (FISMA) measures in the bill and state that the international cooperation-related provisions could not be interpreted "to authorize the president to enter into a binding international agreement establishing disciplines on cybersecurity without ...

US spy chief asks hackers for help
Big News Network.com
In a speech at the gathering, he expressed his admiration for the cyberspace experts, saying he would like to find common ground to develop new tools in the fight against cyber-crime. Mr Alexander made the point that the US needed more experts on the job to fight against criminals who attack government facilities, major US companies, banks and other similar institutions. He said: "There are a lot of companies with tremendous cyber security expertise getting hacked. The reality is that this is the community that ...

Big News Network.com

Anonymous Dumps Australian Telco Data Online
Gizmodo Australia
The data would presumably be used in law enforcement and cyber-security cases should they ever arise. Roxon was only in initial talks with ISPs over the scheme when the story broke in 2010, but the plan reared its head once again last month when the ...

Review: Confront and Conceal: Obama's Secret Wars and Surprising Use of ...
DAWN.com
However, the backlash the US triggered from Pakistani security establishment and mainstream society in relying so heavily on drone strikes — there were over 100 strikes in 2010 — has led to a massive decline in 2012: less than 20 this year so far. Did the Obama administration ever ...The chapter “Olympic Games” is particularly sensational stuff, building as it does on a New York Times story just prior to Sanger's book on America's cyber warfare against Iran's nuclear programme. To date, the spectre of cyber ...

Nuclear disarmament: could Malta possibly lead the way?
Malta Independent Online
You may be familiar with our series of articles on cyber and cyber-physical safety and securitythat are published each week in this newspaper. In that series we discuss the serious problem of cyber attacks against nuclear facilities. Now we are pleased to offer a second ... To promote Maltese ICT, we encourage all ICT professionals to register on the ICT GM Skills Register and keep abreast of developments, both in Cybersecurity and other ICT R&D initiatives in Malta and Gozo. For further details contact David Pace ...

Democratic Senators Add Gun Control to Cybersecurity Bill
Game Politics
Senators Frank Lautenberg (NJ), Barbara Boxer (CA), Jack Reed (RI), Bob Menendez (NJ), Kirsten Gillibrand (NY), Schumer (NY) and Dianne Feinstein (CA) submitted an amendment to the Cybersecurity Act of 2012 which would limit real-world gun rights.

Two months before Colorado shootings, feds warned that theaters may be targets
East Valley Tribune
The relative ease of carrying out an attack in a packed, darkened theater, where security is all but nonexistent, is something U.S. anti-terrorism authorities already had worried about. Such a venue could accomplish two of the goals of al-Qaida and affiliated terror ... demand the release of captured al-Qaida-linked or -inspired violent extremists. The May warning was prepared by the Office of Intelligence and Analysis, Cyber, Infrastructure and Science Division of the DHS, in cooperation with the FBI and other agencies.

Matt McQuinn, Jessica Ghawi And Jesse Childress Funerals: Colorado Shooting ...
Huffington Post
This undated photo provided by the U.S. Air Force shows Jesse Childress. The 29-year-old, from Thornton, Colo., was one of the victims in the Friday, July 20, 2012 Aurora, Colo. movie theater shooting. Childress was an Air Force cyber-systems operator ...

London mayor calls attack by fellow Conservative on Olympic opening ceremony ...
Washington Post
London mayor calls attack by fellow Conservative on Olympic opening ceremony 'nonsense'. United States' Ryan Lochte competes in .... Sudarsan Raghavan. Justice Department trains prosecutors to combat cyber espionage. Sari Horwitz. Romanians vote ...

Microsoft pays big for software security
The Australian
Each of the top three entries dealt with a way cyber attackers twist snippets of benign software already in a computer system to malicious ends, according to Microsoft. The Blue Hat winners were announced as a Black Hat conference of computer security ...

Cyber Insecurity Feds' Latest Excuse To Access Your Private Data
By Alexander Higgins
Categories: Society, Technology, US Tags: attack, break, cispa, cyber, Cybersecurity, economics, economy, hackers, internet, KristineFrazao, London, money, net, Olympics, Politics,security, Show, sport, Steven Rambam, terrorism ...
Alexander Higgins Blog

McCain's Stance on Cybersecurity Is Wrong « Commentary Magazine
By Max Boot
Keith Alexander, the head of the National Security Agency and U.S. Cyber Command, has just warned cyberattacks aimed at U.S. infrastructure increased seventeenfold from 2009 to 2012. General Alexander further said that “on a scale of 1 to ...
Commentary Magazine

Daily Kos: Cybersecurity amendments threaten gains made in ...
By rss@dailykos.com (Joan McCarter)
Pretty much, a good rule of thumb is to oppose all 'cyber security' bills unless there is clear and incontrovertible evidence that the bill is necessary. And even in that case, I'd pretty much stick with lukewarm support. (-5.50,-6.67): Left Libertarian ...
Senate

Gun Control Amendment Slipped Into Cyber Security Bill
By LibertyCrier
Congress is continuing their plea for a comprehensive cybersecurity bill, and their latest attempt to govern the Web is attracting attention of not just the Internet savvy: a new amendment tacked on to a cybersecurity act includes a provision.
Liberty Crier

CyberTelecom Blog: CT Weekly :: 7.28 :: The Cable Monopoly :: Natl ...
By Robert Cannon
The destruction or exploitation of critical infrastructure through a cyber attack, whether a nuclear power plant, a region's water supply, or a major financial market, could cripple our economy, our national security, and the American way of life.
CyberTelecom Blog

Chemical Facility Security News: S 3414 Actual Debate to Start ...
By PJCoyle
... by SA 2596. That amendment would prohibit any agency that already had legal authority to compel the submission of security information from using that authority to collect information to support the voluntary cybersecurity program. ... In my blog post about the identification of criticalcyber infrastructure I noted that there was a 60-day window for Congress to act on the notification of the designation of a category of critical infrastructure as critical cyber infrastructure. I failed to note that ...
Chemical Facility Security News

Report: Obama Admin Shares with Netanyahu the U.S. Contingency ...
By Sharona Schwartz
... Contingency Plan for Iran Attack. President Obama with National Security Adviser Thomas Donilon (White House photo via Times of Israel) ... Just like the drone strikes, the SEAL raid, the cyber worm attack. Of course this White House can't ...
TheBlaze.com - Stories

Activist Post: Gun Control Amendment Restricting Magazine Size ...
By Activist
Gun Control Amendment Restricting Magazine Size Slipped Into Cyber Security Bill · Youtube ...Your Email To Receive Our Newsletter. Close. Posted by Activist at 2:33 AM Labels: civil liberties,Cybersecurity, gun control, gun rights, video ...
Activist Post

Five things you need to know about U.S. national security – CNN ...
By Adam Levine
Paul Stockton, assistant secretary for Homeland Defense and Americas' Security Affairs at the Department of Defense, said an attack on the U.S. grid would not only affect millions of people in the United States, but it would also affect critical defense infrastructure at home and abroad. ...Keith Alexander, the director of the National Security Agency and commander of U.S. CyberCommand, who went on to say echo concerns about how cyber attacks may effect domestic, civilian targets.
CNN Security Clearance

What Congress' cybersecurity bills mean for you - Technology ...
President Barack Obama is currently pushing for cybersecurity legislation and has made it one of his priorities for 2012. In a July 19 opinion piece published in ...
www.msnbc.msn.com/.../what-congress-cybersecurity-bills-me...

Security expert: Iran scientist reports possible cyber attack on - Haaretz
Post by official at Finnish firm F-Secure publishes email claiming to originate from Iran's atomic energy agency, saying that a new virus stuck enrichment site in ...
www.haaretz.com/.../security-expert-iran-scientist-reports-poss...

Iran Nuclear Facilities Thunderstruck!


 Iran nuclear facilities hit by cyber attack that plays AC/DC's - Daily Mail
As far as malicious computer hacking is concerned, the most recent breach of security at Iran's ...
www.dailymail.co.uk/.../Iran-nuclear-facilities-hit-cyber-attack...

Thunderstruck by AC/DC. . . .starts at 0:35. ENJOY!
Lyrics:
I was caught
In the middle of a railroad track (Thunder)
I looked round
And I knew there was no turning back (Thunder)
My mind raced
And I thought what could I do (Thunder)
And I knew
There was no help, no help from you (Thunder)
Sound of the drums
Beatin' in my heart
The thunder of guns
Tore me apart
You've been - thunderstruck . . .
 . . . .
Thunderstruck, yeah, yeah, yeah,
Tunderstruck, thunderstruck, thunderstruck
Whoa baby, baby, thunderstruck
You've been thunderstruck, thunderstruck
Thunderstruck, thunderstruck
You've been thunderstruck

Category: Music
AC/DC Song
License: Standard YouTube License

America's Failing Grade on Cyber Attack Readiness
ABC News
Keith Alexander, Director of the National Security Agency and chief of U.S. CyberCommand, told audience members at the Aspen Institute's annual security forum late Thursday, according to multiple reports. Alexander said that since 2009, attempted cyber ...
 
ABC News

Cyber Command chief flunks US in readiness to deal with cyber attacks
CNN (blog)
By Larry Shaughnessy. Since 2009, online attacks that could destroy key infrastructure in the U.S. have skyrocketed. And the man in charge of cyber defense gave the national a failing grade in being prepared. Gen. Keith Alexander is director of the National ...

Amendments are critical hurdles in cyber debate
Politico
The challenge for the Cybersecurity Act of 2012 after a key procedural vote Thursday is whether a growing number of amendments can resolve enough differences to attract GOP support in the Senate — and, ultimately, the House, too — while not completely removing the teeth that Democrats and the Obama administration think is essential to protect the nation ... Senators, pardon me for a moment, but I'm lost on how a firearm magazine jpg image, or wmv video file (bothcyber-based) is a safety and security issue.

Politico

Cybercom chief: US unprepared for serious cyber attacks
Edwards Air Force Base
(AFPS) -- The United States is not adequately prepared for a serious cyber attack, the commander of U.S. Cyber Command told the audience at the Aspen Institute's annual securityforum today. Army Gen. Keith Alexander, who also serves as the director of ...

Cyber Attacks Targeting US Infrastructure Up 17-Fold Since 2009
Huffington Post
Alexander, who also heads the U.S. military's Cyber Command, told the Aspen Security Forum that he was unaware of any evidence that Stuxnet were now being turned against the United States, as some experts have predicted might be the case now that the malware has become available online. Some of what the general called the 17-fold increase was attributed to ... "We need them to help educate our country in cybersecurity," he said of the hackers' cyber savvy. "And I think there's some great things they can do." ...

US Cyber Defense Head: Attack Preparation Poor
KGTV San Diego
He said the nation's financial industries and Internet-related companies have very robust cyber security, but he's concerned about vital services that many take for granted until they're interrupted. "I'm worried most about the power. I'm worried about water, ...

Combating a cyber attack
Aspen Daily News
NBC correspondent Pete Williams, left, interviews General Keith Alexander, director of the National Security Agency, on Thursday afternoon at the Doerr-Hosier Center. The discussion centered on cyber-security and was part of the Aspen SecurityForum.

Aspen Daily News

SEC May Require More Cyber Risk Disclosures Under Senate Bill
Businessweek
The U.S. Securities and Exchange Commission would consider stronger guidelines for company disclosures about the risks of computer attacks, under a cybersecurity bill being debated in the Senate. The U.S. ... The senators revised their cyber-defense bill last week in an effort to pick up Republican votes, outlining a system of voluntary security standards for critical infrastructure such as power grids and chemical plants, rather than mandatory government rules contained in a previous bill. The Senate voted today to ...

Rockefeller warns of dangers of cyber attacks as Senate moves forward with ...
Charleston Gazette
Va., spoke about the dangers of being unprepared for a cyber attack Wednesday, as the Senate moved forward Thursday with the Cybersecurity Act by voting to allow debate on the legislation.... a member and former chairman of the Senate Select Committee on Intelligence, said that both parties understand the threat that breaches of government data pose and that Federal Bureau of Investigation Director Robert Mueller told Congress that cyber security would soon replace terrorism as the FBI's primary focus.

OVERNIGHT DEFENSE: Cyber bill dashes hopes for defense vote in Senate
The Hill (blog)
has tried in recent weeks to stay optimistic that the Defense authorization bill would get to the Senate floor this month, but he acknowledged Thursday that's not going to happen now that the chamber is moving forward with a cybersecurity bill. The writing may have ... muddy, to say the least. But when it comes to the emerging battlefield of cyber warfare, those rules don't even exist — yet. The top commanders of the services' cyber warfare branches gave lawmakers an update Wednesday on the status of those rules.

OVERNIGHT TECH: Senate poised to debate cyber amendments
The Hill (blog)
In the meantime, members will be meeting again Friday to continue their negotiations on reaching an agreement between the Cybersecurity Act and Secure It. Participants include Lieberman and the co-sponsors of his bill, members involved in leading earlier compromise efforts, as well as the backers of the Secure It Act. Also on Thursday, Sens. ... Patrick Leahy (D-Vt.) has filed four amendments that focus on data security and privacy, and stiffening penalties for cyber crime, among other issues. Sen. Ron Wyden ...

US cyber commander accuses countries of targeting infrastructure
Reuters
Compromise bill in Senate would address cyber threats. Thu, Jul 19 2012. U.S. spy agencies say won't read Americans' email for cybersecurity ... Alexander, who also heads the U.S. military's Cyber Command, told the Aspen Security Forum that he was unaware of any evidence that Stuxnet were now being turned against the United States, as some experts have predicted might be the case now that the malware has become available online. Some of what the general called the 17-fold increase was attributed to ...

Cybersecurity Pipe Dreams
The National Interest Online
Every single computer in the world can be hacked. From your personal computer at home to the office workstation of the CIA director, it is not possible to fully protect any computer from cyber penetration. For all the talk about cyber protection and the billions of ...

The National Interest Online

Cyber reform clears first Senate hurdle - Thumbs down on FCC emergency ...
Politico
CYBER REFORM CLEARS FIRST SENATE HURDLE — The Senate officially took the plunge Thursday into the heated cybersecurity debate, voting 84-11 on cloture to begin debate on the Lieberman-Collins-Feinstein-Carper-Rockefeller bill with days to go before the August break. (Here's our story, if you missed it, for Pros: http://politico.pro/Mos5sE). There's no ... And expect other tweaks from Dem Sen. Patrick Leahy and others on data security and privacy, one from Sen. Chris Coons that would sunset part of the ...

Why Business Still Hates Lieberman's Cybersecurity Act
HSToday
The Cybersecurity Act (S. 3414) no longer provides the Department of Homeland Security(DHS) with the authority to set and regulate standards for cybersecurity protection among companies designated as owning critical infrastructure. Instead ... The US Chamber continues to support cybersecurity legislation such as the Cyber Intelligence Sharing and Protection Act (CISPA) (HR 3523), passed by the House in April, and the Strengthening and EnhancingCybersecurity by Using Research, Education, Information and ...

Senate advances cybersecurity bill for vote
Washington Examiner
The bill would relegate responsibility for the nation's cyber security to the Department of Homeland Security, which would implement regulations developed by a newly created NationalCybersecurity Council. Sen. John McCain, R-Ariz., said Thursday that he ...

URGENT: Businesess Must Act to Stop Congress on Cyber Legislation
Forbes
Businesses must pick up their phones now and call Congress to stop cyber legislation that is poised to saddle them with intrusive government-mandated risk assessments, costly securityrequirements, and required disclosures regarding security incidents. ... Wall Street Journal that, “The American people deserve to know that companies running our critical infrastructure meet basic commonsense cybersecurity standards, just as they already meet other securityrequirements,” such as those for nuclear power plants, ...

US Senate advances bill to boost digital defense against cyber attacks
Xinhua
The Cybersecurity Act, which was first proposed in February, calls for setting up the NationalCybersecurity Council, to be chaired by Secretary of Homeland Security, to coordinate efforts to deal with the cyber threat. But Republicans and business lobbyists, ...

FEINSTEIN SPEAKS ON CYBERSECURITY LEGISLATION
Military & Aerospace Electronics
We have already seen the use of cyber attacks in warfare, when hackers inside Russia reportedly took down the command and control systems in Estonia in 2007. That was five years ago, or roughly a lifetime ago ... At his confirmation hearing to be Secretary of Defense Leon Panetta said, The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. Earlier this year, at the annual worldwide-threat ...

Microsoft, Oracle back Lieberman cyber bill
The Hill (blog)
Microsoft, Oracle back Lieberman cyber bill. By Brendan Sasso - 07/26/12 02:55 PM ET ... The companies split from other business groups, including the Chamber of Commerce, IBM and trade association TechAmerica, which have all criticized Lieberman's Cybersecurity Act. The bill would incentivize critical infrastructure systems to upgrade their security protections, and the business groups expressed concern that the incentives amount to burdensome government regulation. But the legislation exempts information ...

NSA to hackers: We're not prepared for major attack
RT
On a scale of one to 10, American readiness to deflect a major cyber-attack on its infrastructure is “around three,” head of the National Security Agency and the USCyber Command said in a rare speech at a hacker conference. General Keith B. Alexander was ...

RT

Senate cybersecurity legislation modified to win Republican support
Bizjournals.com
Joseph Lieberman, ID-Conn., who chairs the Senate Homeland Security & Governmental Affairs Committee. “In other words, we are going to try carrots instead of sticks as we begin to improve our cyber defenses.” Republicans and many business groups had ...

Rise Is Seen in Cyberattacks Targeting US Infrastructure
New York Times
Keith B. Alexander, who heads the National Security Agency and also the newly created United States Cyber Command, appears to be the government's first official acknowledgment of the pace at which America's electricity grids, water supplies, computer and ... General Alexander said that what concerned him about the increase in foreign cyberattacks on the United States was that a growing number were aimed at “critical infrastructure,” and that the United States remained unprepared to ward off a major attack.

Senate Democrats to offer amendments to cybersecurity bill
The Hill (blog)
He lauded a measure in the bill that would give companies authority to share information aboutcyber threats with only civilian agencies, noting that a rival cybersecurity bill backed by Senate Republicans lacked that protection. Franken said he planned to ...

Senate's move to cybersecurity means no defense bill before recess
The Hill (blog)
told The Hill that the Senate's plan to take up cyber next week kills any chance of getting to the defense bill before the August recess, although he contended that there was still some hope for the defense bill until the vote Thursday. The House and Senate take ...

Their View: US must beef up defenses against cyberattack
Las Cruces Sun-News
On July 10, cybersecurity experts James Mulvenon and Gregory Rattray unveiled a study that concludes "the current strategic cyber environment is fundamentally unstable." Their message:Security concepts the United States has relied upon for decades, ...

Senate advances bill to bolster cybersecurity defenses in 84-11 vote
The Hill (blog)
Susan Collins (R-Maine), a sponsor of the Cybersecurity Act, said she's open to changes but said the legislation should to be passed quickly for the sake of national security. ... “We can't afford to wait for a cyber 9/11 before taking action on this legislation.” ...

U.S. faces increasing cyber threat
UPI.com
Keith B. Alexander, who also directs the U.S. Cyber Command, spoke Thursday at the AspenSecurity Forum in Colorado. He said online attacks that ... Alexander is pushing Congress to pass the Cybersecurity Act of 2012, CNN said. The bill, currently moving ...

Cybersecurity Bill Inches Closer to Passing
Mashable
Should the CSA eventually pass the Senate, it will move to the House, which has already passed a very different cybersecurity bill – the Cyber Intelligence Sharing and Protection Act, or CISPA. Discrepancies between the bills would have to be worked out by ...

Sen. Franken To File Crucial Amendment to Cyber Bill
American Civil Liberties Union News and Information (blog)
It permits companies greater leeway to monitor their networks --and their customers and users– for cybersecurity threats. It also grants them explicit authority to take 'countermeasures' to protect their property against cyber threats. While the sponsors of the bill ...

Major Information Technology, Software Companies, Industry Groups Support ...
Equities.com
Major Information Technology, Software Companies, Industry Groups Support Cybersecurity Act, S.3414. Targeted News ... "The framework is flexible enough to permit future improvements tosecurity - an important point since cyber threats evolve over time.

Highly Skilled People Are Key to Cyber Defense, Leaders Say
Department of Defense
WASHINGTON, July 26, 2012 – Having the right people in the right places with the right training is the best defense against any attack, and this is as true in the cyber world as it is on battlefields Afghanistan, military commanders charged with improving ...

The Offensive Technique to Combat Cyber-Attack
By Mhea Repollo
He is currently, the head of cyber crime division of CrowdStrike, a start-up group specializing in counteracting cyber violence and attack. In a notable Black Hat computer security get-together, Henry with the rest of computer security experts ...
Jack Liberty

Cyber reform clears first Senate hurdle – Thumbs down on FCC ...
By admin
CYBER REFORM CLEARS FIRST SENATE HURDLE — The Senate officially took the plunge Thursday into the heated cybersecurity debate, voting 84-11 on cloture to begin debate on the Lieberman-Collins-Feinstein-Carper-Rockefeller bill with days to go before the August break. (Here's our story, if you missed it, for Pros: http://politico.pro/Mos5sE) ... Patrick Leahy and others on data security and privacy, one from Sen. Chris Coons that would sunset part of the law, perhaps one from ...
Reshoring Manufacturing

Dem Senators Try To Sneak Gun Control Amendment Into Cyber ...
By RightCoast
Dem Senators Try To Sneak Gun Control Amendment Into Cyber Security Bill. Democratic senators have offered an amendment to the cybersecurity bill that would limit the purchase of high capacity gun magazines for some consumers.
Right Coast

Marching off to cyberwar - World - Macleans.ca
By Michael Petrou
The worm, popularly known as Stuxnet, signalled a remarkable escalation in cyber-warfare'spotential. A 2007 cyber-attack on Estonia—believed to have been Russian in origin—hit banks, newspapers and the country's parliament, causing widespread inconvenience. Russia's ... in the step-by-step escalation of an attack on a foreign nation's infrastructure.” Obama's personal interest in cyber-warfare is mirrored by the country's security establishment. United States CyberCommand, ...
Macleans.ca

United States cyber security may include a high-capacity magazine ...
By Steve M
July 27, 9790 1:43 pm You are here:Home Featured United States cyber security may include a high-capacity magazine ban. 0. United States cyber security may include a high-capacity magazine ban. Posted by Steve M on July 27, 2012 at ...
Radio Vice Online

Electrical Power Grid Vulnerable to Cyber Threats - Smart Grid Blog ...
By Derek
With a possible debate on cybersecurity legislation looming in the Senate, energy regulators on Tuesday warned lawmakers of the pressing threats facing the nation's power grid. Appearing before the Senate Committee on Energy and Natural Resources, a panel of witnesses stressed that any bill the full chamber approves must provide for a more fluid system of sharing information about cyber threats, both between public and private entities and between federal and state and local ...
NTS Smart Grid Blog

Black-I Robotics Wins US Air Force Contract to Secure Unmanned ...
By Unmanned Editor
Air, ground, water surface, and underwater unmanned systems; commonly called drones, unmanned systems or robots; are likewise vulnerable to cyber attack of various kinds. “Using robotic vehicles against uneducated combatants is one ...
Unmanned.co.uk

URGENT: Businesess Must Act to Stop Congress on Cyber Legislation
Businesses must pick up their phones now and call Congress to stop cyber legislation that is poised to saddle them with intrusive government-mandated risk assessments, costly securityrequirements, and required disclosures regarding security incidents. Most businesses are complacent about cybersecurity legislation because so many bills have floated around for so many years that everyone is yawning. Stop Yawning. As Ann Landers used to say, "Wake up and smell the coffee." ...
eWallstreeter

Netizen Report: Security Edition – Consent of the Networked
By Rebecca MacKinnon
This week's Netizen Report on Global Voices Advocacy begins with an update on cybersecuritylegislation in the US and UK: We begin ... There is a public input forum on the upcoming EU Strategy on Cyber Security running until October 12.
Consent of the Networked

Dems offer gun-control amendment to cybersecurity bill « Hot Air
By Ed Morrissey
Fueled by the detail that the AR-15 (not an AK-47) used in the massacre had a high-capacity drum magazine — which jammed — Senate Democrats have offered an amendment to the pending cybersecurity bill that would ban possession of magazines past a maximum 10-round capacity: Democratic senators have offered an amendment to the cybersecurity bill ..... Smith voted against the cyber-security bill!!!11! Does he support international terrorist hackers!?!?!?” KS Rex on July 27, ...
Hot Air » Top Picks

Anonymous #opAustralia, data breach and ... - Security Affairs
By paganinip
These regulations are likely to foster the development of pseudo-government interception centers still too vulnerable to hacker attacks. Of particular concern is the vulnerability of these providers to cyber espionage attacks by foreign ...
Security Affairs

Finnish firm says new cyber attack may have targeted Iran - Yahoo ...
A scientist claiming to work for the Atomic Energy Organisation of Iran told a Finnishcyber-security group that Tehran's nuclear programme had been the victim ...
news.yahoo.com/finnish-firm-says-cyber-attack-may-targeted-...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com