Cyber war on Iran has only just begun

Cyber war on Iran has only just begun
Phys.Org
Although the Iranian regime remains vulnerable to more cyber attacks in the aftermath of the "Stuxnet" worm that disrupted its uranium enrichment work, Tehran may be receiving help from Russian proxies for its digital security, some analysts say ...

Navy's cyber hackers getting ready in Kerala
IBNLive.com
New Delhi: The Navy is preparing its own brigade of trained cyber hackers in the Indian Naval Academy at Ezhimala, Kerala, to stand up to the Chinese cyber attackers and launch a counter attack to fish out information from their computers. ... Moreover ...

IBNLive.com

Cyber war on Iran has only just begun: Experts
Times of India
A US cyber war against Iran's nuclear program may have only just begun and could escalate with explosions triggered by digital sabotage, experts say. ... Although the Iranian regime remains vulnerable to more cyber attacks in the aftermath of the ...

US, Iran cyber war beginning
News24
The Stuxnet worm broke new ground by successfully hijacking a programme designed to supervise power plants or other large industrial systems, said Sean McGurk, a consultant who previously ledcyber security efforts at the Department of Homeland ...

Finmeccanica Cyber Solutions Team Completes First Tests for NATO Cyber ...
GlobeNewsWire (press release)
FARNBOROUGH, 11 July 2012 -- The Finmeccanica Cyber Solutions team selected in February 2012 to fulfil the NATO Computer Incident Response Capability (NCIRC) - Full Operating Capability (FOC) requirement, has completed the testing phase of the ...

Stuxnet Debate Continues: How Should Cyberweapons Be Used?
WebProNews
Stuxnet, for example, is what he calls a cyber attack that was designed to destruct the normal operations of a uranium facility in Iran that has been suspected to be part of a nuclear initiative from the country. Flame, on ... Eugene Kaspersky of the ...

Cyber Security Expert Andy Purdy Appointed Chief Security Officer for Huawei ...
Sacramento Bee
Mr. Purdy will oversee Huawei USA's cyber security assurance strategy and system, and support the global security system adopted by all of the company's business groups and departments, including R&D, supply chain, marketing and sales, project delivery ...

O2 customers hit by phishing scam during network outage
Inquirer
... to login to my O2 account to activate new security measures to get back online." O2 was unavailable to confirm the reports at the time of writing, but Kaspersky researcher David Emm told us that such an attack would fit in with cyber criminals ...

Cyber security breach: Why were Yahoo!'s passwords left unencrypted?
Techworld.com
A Yahoo security breach that exposed 450000 usernames and passwords from a site on the huge web portal indicates... ... Cyber security breach: Why were Yahoo!'s passwords left unencrypted?Security experts bewildered at elementary ... Instead, they ...

How to report a cyber threat to Australian police
CIO Magazine
Three steps that will ensure your security compromise gets investigated by the relevant law enforcement agency. ... attack. Rather than sweeping the incident under a virtual rug and not reporting it to state police, there are various steps that can be ...

Indian Navy Raises Army For Cyber Front: Recruiting Cadets Against Chinese ...
IBTimes India
With the rise in cyber terrorism in the country, the Indian Navy will soon induct an exclusive cyber cell to counter terror attacks on cyber space and to protect its computer-enabled communication networks from notorious hackers. ... Women who are ...

IBTimes India

Analytics platform helps agencies fight cyber crime
GCN.com
SAS Security Intelligence uses a common infrastructure that spans government and industry to address the rise of global cross-channel, organized crime and cyber-crime that impacts financial services firms, government agencies and other sectors, SAS ...

Phishers look to pile misery on O2's customers
V3.co.uk
Despite the lack of official word from O2, security vendors have argued such a scam would run in line with cyber criminals current attack patterns. "We've become used to spammers and phishers piggy-backing all kinds of newsworthy stories - natural ...

UMD and Sourcefire Announce New Cybersecurity Partnership
MarketWatch (press release)
UMD researchers are applying their expertise in a number of critical cybersecurity fields, including, secure software, supply chain risk management, wireless and network security, attacker behavioral analysis, and the economics of cybersecurity. MC2 ...

Yahoo hack attack: expert reaction
Computer Business Review (blog)
Yahoo statement. At Yahoo! we take security very seriously and invest heavily in protective measures to ensure the security of our users and their data across all our products. We confirm that an older file from Yahoo! ... Because users often use the ...

Thousands of GMX accounts compromised to send spam
The H
The cyber attack on users of GMX, a German web services provider, which was discovered on Wednesday, is potentially huge, with the company telling The H's associates at heise Security that the spammers have been able to sign in to more than 300000 ...

Yahoo! attack reveals flimsy passwords
The Australian Financial Review
At the time, director of Australian IT security company CQR Consulting, Phil Kernick, warned of the perils of surfers using the same password to protect multiple accounts. “[That] is the worst thing you can do, as it gives a hacker the use of your ...

The Australian Financial Review

Attackers Shift To More Obfuscation, Java Exploits
Dark Reading
WEBCAST: Intelligent Cyber Defense Learn how ... It would not have taken malware developers long to create the attack, especially because a security researcher had produced a recipe for the exploit in the form of pseudo-code that had been posted online.

Yahoo! investigating hack attack
Honolulu Star-Advertiser
Yahoo said in an e-mailed statement in response to the breach that it “condemns all cyber attacks regardless of origin or purpose.” Google Inc. said in January 2010 that it was one of at least 20 companies targeted in a “highly sophisticated” computer ...

Hackers post 450000 Yahoo passwords online
Tecca
Hackers post 450000 Yahoo passwords online. The hackers call the cyber attack on Yahoo! a wake-up call for the need of better security. News | Computers · Security | Yahoo | Hacking | Law | Email. Leave a comment. Fox Van Allen. By Fox Van Allen, ...

Tecca

Yahoo and Formspring Hacked Just One Month After LinkedIn & eHarmony ...
Examiner.com
These two cases occurred just days apart yet represent two (2) vastly different approaches to cyber security. The recent ... With bcrypt a hacker has to expend even more time, money, and technological resources to attack and decipher the stolen data.

Yahoo security breach shocks experts
CSO
July 12, 2012 — CSO — A Yahoo security breach that exposed 450000 usernames and passwords from a site on the huge web portal indicates that the company failed to take even basic precautions to protect the data. Security experts were ... A hacker ...

Security Flaws Found in Tridium's Niagara Framework
eSecurity Planet
According to a recent report in The Washington Post, an unknown number of systems being managed via Tridium's Niagara Framework are vulnerable to cyber attacks. The vulnerabilities, uncovered by security researchers Billy Rios and Terry McCorkle, ...

eSecurity Planet

Just What the **** Is Going On?
Infosecurity Magazine (blog)
... Bastion LTD. Areas of expertise: FBCS, CITP, CISM, CRISC, ITPC. Biography: CEO SBLTD, Director of Cyber Research at Ascot Barclay, visiting professor at Nottingham Trent University, Practicing Expert Witness, Fellow of the BCS, and holds CITP (BCS ...

Yahoo Confirms and Apologies for Email Breach
IBTimes.co.uk
Despite this obvious problem, Yahoo's statement opened with the line: "At Yahoo! we take security very seriously and invest heavily in protective measures to ensure thesecurity of our users and their data across all our products." Unencrypted ...

IBTimes.co.uk

Malware deadline passes, very few knocked offline
San Francisco Chronicle
Blogs and other Internet forums are riddled with postings warning of the government using the malware as a ploy to breach American citizens' computers — a charge the FBI and other security experts familiar with the malware quickly denounced as ...

San Francisco Chronicle

US cyber war against Iran has just begun, could escalate - Ya Libnan
By Ya Libnan
Although the Iranian regime remains vulnerable to more cyber attacks in the aftermath of the “Stuxnet” worm that disrupted its uranium enrichment work, Tehran may be receiving help from Russian proxies for its digital security, some analysts say . The nuclear program is “really not that ...The next cyber attack, possibly in combination with more traditional spycraft, could shut off valves or issue incorrect orders that might cause an explosion at a sensitive site. “I think that it could get more...
Ya Libnan

June 2012 Cyber Attacks Statistics « Hackmageddon.com
By Paolo Passeri
As usual I aggregated the data from the Cyber Attack Timelines of June to provide some aggregated statistics. Data must be taken ... As usual Cyber Warfare and Cyber Espionage are well behind respectively to 6% and 4%. But of course, this ...
Hackmageddon.com

China's Cyber Warfare: IS INDIA BATTLE READY? … | sarkaritel.com
By admin
Undeniably, it has used its expertise as a cyber-power to access highly confidential information relating to national security of other countries, including India. ... Indeed, cyber warfare is the new emerging battle front. ... digital infrastructure to be a “strategic national asset,” and a year later the Pentagon set up a new U.S. Cyber Command (USCYBERCOM), headed by National SecurityAgency's (NSA) Director to defend American military networks and attack other countries' systems.
sarkaritel.com

Did your Yahoo password get LEAKED?
By Sovereign Man
The latest major breach of cyber security happened recently at Yahoo where hundreds of thousands of passwords were leaked on the internet. Information Week reports on the cyber attack and what it means for Yahoo customers: Yahoo Voice ...
Sovereign Man: Offshore Business,...

Whitelisting Defense Combat Ready | isssource.com
By gHale
Stuxnet Warfare: The Gloves are Off · Breaking Down Flame's Roots. An advanced persistent threat (APT) is a cyber threat or cyber attack where the hacker has the ability to evade detection and the capability to gain and maintain access to ...
isssource.com

Cyber Sea Warriors | Maritime Security Review
By Mark Lowe
The Navy's drive to induct IT officers, as part of its main executive branch, comes in the backdrop ofcyber warfare emerging as a potentially crippling form of waging covert wars as well as Chinese and Pakistani online espionage agents ...
Maritime Security Review

Turning out the lights on purpose
By sam
Professors Sam and Sydney Liles: Cyber warfare, privacy, computer security, computer forensics, technology, software engineering, running, life in general, and more. front page · Terms of Use · Attribution · RSS. Selil header image 2 ...
Selil

Cybercrime Should Be Part Of The National Curriculum | Business ...
By Grant Taylor
Minister Ibrahim's comments about ICT's business benefits – and the cyber-security disadvantages – are just as valid here in the UK, as they are in Singapore, where the Minister made his comments at a security conference earlier this week. Singapore has the highest number of ... other countries in his observations. We must be careful not to neglect developing economies, or the cybersecurity issue will come back to haunt us in the future, as we grow online trade with such countries.
Business Computing World

Friday News & Notes - Digital Bond SCADA Security Portal
By Dale G Peterson
ICS Security News. Bob O'Harrow of the Washington Post continued his cybersecurity series, this time focusing on vulnerabilities in Honeywell's Tridium that is used in a large number of building management systems, including many directly connected to the Internet. ... If I understand him correctly this means there will be no significant cyber security legislation this year. Considering the quality of the draft legislation, it really is no loss for the ICS security community. GE announced the...
Digital Bond's SCADA Security Portal

War in August? - RT
By RT
The United States and Israel jointly developed the Flame virus, which collected intelligence for acyber-attack on Iran's nuclear program. This has been confirmed by a number of Western officials familiar with classified data on the effort.
News RSS : Today

When It Comes to Cybersecurity, Scare Tactics Aren't Convincing ...
Discussions this week were part of an effort to break the partisan stalemate over the CybersecurityAct, a bill that would allow Internet companies to monitor the ...
https://www.eff.org/.../when-it-comes-cybersecurity-scare-tacti...

ICF International and SecureState to Provide Cybersecurity Services ...
Fairfax, Virginia, July 11, 2012 -. ICF International and SecureState, both recognized as leading providers of consulting services and technology solutions to ...
www.icfi.com/.../icf-securestate-cybersecurity-services-energy-...

National Cyber Security Awareness Month (NCSAM)
Being a champion is a way for you to officially show your support for National Cyber SecurityAwareness Month and your commitment to cybersecurity. Being a ...
staysafeonline.org/ncsam/

Legislative action needed now on cybersecurity, says cyber chief ...
Congress must take action to establish the roles, standards and authorities that will guide government agencies responsible for defending U.S. infrastructure and ...
defensesystems.com/.../agg-cyber-command-alexander-legislat...

Audio: Yesterday's CSC town hall on cybersecurity | CSO Blogs
Yesterday I participated in an audio and web-based town hall run by CSC called "How To GetCyberconfidence." Below is the audio portion. Besides myself ...
blogs.csoonline.com/.../audio-yesterdays-csc-town-hall-cybers...

Cyber cops blunt hacker attack on CBI website
For a few minutes on Monday evening, panic gripped officials at the state-run Cyber Defence Research Centre (CDRC) in Ranchi when they suddenly sensed ...
www.telegraphindia.com/1120705/jsp/.../story_15690561.jsp

BizEd Magazine | Cybersecurity is Mission Critical
Cybersecurity is. Mission Critical. Future business leaders must be prepared to defend against threats to the vital information infrastructures of their organizations ...
www.bizedmagazine.com/.../cybersecurity-is-mission-critical.a...

General prompts Congress to prevent crippling cyberattack
Gen. Keith Alexander, head of the National Security Agency (NSA) and the US Cyber Command, advised Congress this week that it should pass cybersecurity ...
www.infosecurity-magazine.com/.../general-prompts-congress...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com