DNSChanger's Lasting Impact

The Morning Download: DNSChanger's Lasting Impact
Wall Street Journal (blog)
As well they should. As a cyber security attack, DNSChanger was innovative in several ways. One, as Tom Kellermann of Trend Micro told the Journal, the six Estonians and the single Russian hackers arrested last year in the case were “mercenaries for ...
 
Wall Street Journal (blog) 

U.S. Cyber Challenge and Delaware Universities to Host 3rd Annual Cyber ...
PR Newswire (press release)
WASHINGTON, July 9, 2012 /PRNewswire-iReach/ -- U.S. Cyber Challenge (USCC) will host its 3rd Annual Summer Cyber Security Camp program on July 9-13, 2012 in conjunction with the Delaware USCC Coordinating Council, which is composed of representatives ...

Modern warfare: New battlefield, new rules
FCW.com
And as far as I'm concerned, that represents the potential for another Pearl Harbor, as far as the kind of attack that we could be the target of” using cyber warfare. The Defense Department is seeking to navigate the way ahead in cyber war, or so ...

Will governmental folly now allow for cyber crisis?
Korea Times
No economy is more vulnerable than the U.S., and it is arrogance to believe that U.S.cyber superiority (to all except perhaps China) provides it with impenetrable securityfrom attack. Unfortunately the solution is not so simple as just building ...

Korea Times

Lunarline Announces Participation in U.S. Cyber Command Conference
Sacramento Bee
PRNewswire/ -- Cyber security and privacy solutions company, Lunarline, Inc., will exhibit at the Intelligence Support to Cyber Conference held by the U.S. Cyber Command (USCYBERCOM). The conference will focus on enhancing awareness of the cyber ...

Four More Cyber Charter Schools to Open in the 2012-13 School Year
Sacramento Bee
PRNewswire-USNewswire/ -- Four cyber charter schools have been authorized to open in the 2012-13 school year, bringing the total number of cyber charters schools operating in Pennsylvania to 17.

Training best defence against cyber crime
The Australian Financial Review
It pays to take steps to make employees aware of the security risks posed by cyber mischief makers and the high cost of cyber crime. ... Companies say they are under constant cyber-attackin ingenious forms, but they are loath to say in public how ...

Hackers who cracked CERN's IT system train Indian officials
Zee News
Two cyber security experts, who claimed to have cracked the security code of IT systems involved in the discovery of `God Particle`, today conducted training sessions for Indian government officials. ... It will be lead by cyber warfare where most ...

Zee News

INFORMATION WARFARE: Can't Trust Them, Can't Do Without Them
Strategy Page
July 9, 2012: The big problem with Internet security is that there are more people looking for vulnerabilities (that allow hackers to secretly get into someone else's computers) than there are people of equal skill trying to pre. ... This enables the ...

Malware Threat to Internet Corralled
Wall Street Journal
Officials from the companies played down the threat, and some cybersecurity experts said computer antivirus programs and updated operating systems have cleaned most infected computers. The FBI estimated that 64000 computers were affected ... way to...

Wall Street Journal

Book: Israeli spies behind Iran assassinations
KFVS
Insanity defense as Fla. teen attack trial begins .... The two nations have cooperated on the harassment campaign, including partnering on cyber programs like Stuxnet, malware credited with damaging the control panel on centrifuges in Iran's nuclear ...

Defining war
FCW.com
As Amber Corrin discusses in her article on new developments in cyber warfare, governments are trying to define how and when to use the tools that have grown from the advanced software and the interconnected infrastructure that supports everything from ...

Wiggins rants at cyber critics
Orange UK News
But his subsequent media commitments concluded with an expletive-laden rant when asked aboutcyber critics on Twitter who suggest riders must take drugs to win the Tour after a day in which he maintained his poise in the saddle. The 32-year-old triple ...

Banks join forces to battle cyber crime
Royal Gazette
The joint effort comes after a string of cyber crime cases in recent months. In early June, a round of bogus e-mails claiming to be from HSBC made its way into the in boxes of Bermuda online banking customers trying to trick them into passing along ...

Seven Ways to Win the Cyber War
IBTimes.co.uk
Industry expert Calum MacLeod, gives us his top tips to protect yourself against Cyber Warfare. ... Recently, a number of security specialists demanded an international treaty to halt online weapons. In reality though this sounds a little like a ...

IBTimes.co.uk

Lowered Insurance Costs on Tap for UK Firms With Good Cyber Hygiene
Midsize Insider
James Quinault, the Office's director, says, "If firms can demonstrate the risk of expensive disruption to their IT has been reduced because they have better cybersecurity hygiene, they might be able to trade that for a lower premium." Exactly what ...

Emergency Management Cybersecurity Teleconference
Emergency Management (blog)
An opportunity to learn about cybersecurity threats and impacts. ... paying significant attention to the topic with national level exercises and Presidential level participation. Like nuclear warfare the oceans are not much protection when it comes to ...

Director of NSA Outlines New Threats to Security and Economy
C-SPAN
General Keith Alexander, Director of the National Security Agency, delivers the keynote address at the American Enterprise Institute event, "Cybersecurity and American Power." Early in his administration, President Obama called the threat ofcyber ...

C-SPAN

Ex-CIA director: Recent outages a taste of nationwide threat
WTOP
... and some fell off the grid for almost a week. R. James Woolsey Jr., CIA director under Bill Clinton and board member of the International Spy Museum, says a very realcybersecurity threat could sweep electrical grids throughout the country ...

WTOP

ENISA: Data breach notification regulation could divert attention from causes
FierceGovernmentIT
"It may thus be seen that like many other areas of regulatory intervention, it addresses the symptoms and not the cause of cyber-security problems," they add. A data breach notification requirement might have to be accompanied by other regulatory ...

Doomsday virus: are you vulnerable?
Hindustan Times
What's the attack about? Since 2007, cyber criminals, under a company name 'Rove Digital', distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ and TDL4 viruses. These criminals learnt that having access to a user's DNS can help...

Hindustan Times

Book claims Israeli spies are behind assassinations in Iran
Fox News
It was the brainchild of Israel's military intelligence agency Aman and Unit 8-200 -- Israel's equivalent of the eavesdropping, code-breaking National Security Agency -- and endorsed by the White House at Israel's suggestion, he added. Israel's cyber ...

Mossad Assassins in Iran are Israelis, Says New Book
Arutz Sheva
The assassinations have been part of Israel's “secret war” against Iran's development of nuclear facilities. The focus has shifted the past year to cyber attacks as part of a camping to slow down nuclear development without resorting to a military ...

Arutz Sheva

Software tools best way to monitor child on internet: Experts
Deccan Chronicle
Agra-based cyber security consultant Rakshit Tandon points out that a combination of proper supervision, effective communication and installation of foolproof software should be ensured to curtail the menace of cyber threat. A simple method, experts ...

Deccan Chronicle

Israel behind Iran assassinations: Book
News24
The two nations have co-operated on the harassment campaign, including partnering on cyberprograms like Stuxnet, malware credited with damaging the control panel on centrifuges in Iran's nuclear plant. Melman said the cyber campaign was ... It was the ...

DNS Changer: Indian ISPs say all's fine
CIOL
“Besides, we have given free anti-virus to all our subscribers to effectively encounter themalware attack but so far there are no complaints or reports from users on the impact of DNS Changer. And our ... However, Prashant Mali, advocate and cyber ...

CIOL

Indonesian Ministry Says 'Internet Doomsday' Only a Rumor
Jakarta Globe
Indonesia's Communications and Information Ministry has dismissed concerns over the “Internet doomsday” that will reportedly take place today, July 9, in relation to an FBI move on a malware attack, saying it was only a rumor. ... Tool 10:14am May 31 ...

Jakarta Globe

Crime on the Internet: FBI cracking down on malicious software creators
Deseret News
By now you can determine whether you are a victim of the latest computer infection that was expected to attack hundreds of thousands of people worldwide. ... Some may be related to an underground network known simply as "anonymous." The members of...

Deseret News

Nigeria and the Challenges of Building It Workforce
AllAfrica.com
That is why, as organisations keep deploying infrastructure, they still need to bring their securitymeasures to international level as countries around the world all operate in the same cyber space and the level of security measures put in place will ...

Clinton urges billions more in aid to Afghanistan ... Scott Brown irked by ...
Politico
Keith Alexander, head of U.S. Cyber Command, is discussing cybersecurity at the American Enterprise Institute at 3 p.m. AEI's Paul Wolfowitz is delivering the introduction. THIS WEEK ON THE HILL --. -- HASC's oversight subcommittee meets tomorrow to ...

Chemical Facility Security News: Vetting Security Contractors
By PJCoyle
“So it turns out that Confront and Conceal has an important real-life implication for ICS security and critical infrastructure protection: Asset owners/operators who still favor a policy of unverified trust in the cyber security posture of their ... How one prevents the subornation of a major firm like Siemens is almost certainly beyond the control of most facilities, but facility security managers andcybersecurity managers have to take great care in selecting and vetting anyone that works on their ...
Chemical Facility Security News

Are You Drowning in Security Data? | The SIEM, Log Management ...
By Phil Neray
Security Intelligence. With the growing threat of cyber attacks, sophisticated hackers, devastating viruses & worms and more, keeping your network secure requires superior intelligence. Q1 Blog leverages the experience of the industry's best minds ... Gartner analyst Mark Nicolett made a similar observation in “Using SIEM for Targeted Attack Detection” [complementary download] when he wrote that “Organizations are failing at early breach detection, with more than 85% of breaches ...
The SIEM, Log Management, and...

Dana Gardner's BriefingsDirect: The Open Group and MIT experts ...
By Dana Gardner
Figuring out who is at the other end of that connection is fundamental to all of cyber security. As we look at the conference that we're putting on this month in Washington, D.C., a key theme is cyber security -- and identity is a fundamental piece ...
Dana Gardner's BriefingsDirect

The Open Group and MIT Experts Detail New Advances in Identity
By Carlton Vogt
Today, we're here to focus on cyber security, and the burgeoning role that identity (ID) management plays in overall better securing digital assets and systems. We'll examine the relationship between controlled digital .... You can look on the threat and attack side, and see all sorts of instances, where even the LinkedIn attacks from the last week or so, demonstrate that identity and the loss of identity information is a big deal. You don't have to look far in the news headlines these days to ...
BriefingsDirect Transcripts

Book: Israeli spies behind Iran assassinations - KansasCity.com
The two nations have cooperated on the harassment campaign, including partnering on cyberprograms like Stuxnet, malware credited with damaging the control panel on centrifuges in Iran's nuclear plant.</p><p>Melman said ... It was the brainchild of Israel's military intelligence agency Aman and Unit 8-200 - Israel's equivalent of the eavesdropping, code-breaking National SecurityAgency - and endorsed by the White House at Israel's suggestion, he added.</p><p>Israel's ...
KansasCity.com: Front Page

Worldwide Cybersecurity Summit 2012
The Worldwide Cybersecurity Summit is a unique event that convenes experts, stakeholders and decision-makers from industry, government and academia to ...
cybersummit2012.com/

Cybersecurity is About More Than National Security, It's About Jobs ...
Late last year, Iranian and Venezuelan diplomats reportedly met with a shadowy group of hackers in Mexico to plan cyber attacks against American targets, ...
trumanproject.org/.../cybersecurity-is-about-more-than-nation...

Addressing Cyber Instability | Atlantic Council
Cyber Attack. Please join the Atlantic Council's Cyber Statecraft Initiative and the Cyber Conflict Studies Association (CCSA) on July 10 for a launch event and ...
www.acus.org/event/addressing-cyber-instability

EU cyber security agency ENISA; “High Roller” online bank ...
The recent targeted “High Roller” cyber-attacks on wealthy corporate bank accounts which yielded tens of millions of dollars were analysed in a report recently ...
www.globalsecuritymag.com/EU-cyber-security-agency-ENIS...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com