Expert: Huawei routers are riddled with vulnerabilities

Expert: Huawei routers are riddled with vulnerabilities
CNET
German security researcher says the Chinese government doesn't need to demand back doors on Huawei routers because there are already major holes in their firmware. by Elinor Mills LAS VEGAS -- A German security researcher says he has uncovered several ... 

Senate cybersecurity push continues - Commissioner voting with conservative ...
Politico
Senate cybersecurity push continues - Commissioner voting with conservative slant - Cyberamendments pour in - Amid tech meltdown, Yelp, LinkedIn set to report earnings - Genachowski heads west. 0. Email; Print ... Joe Lieberman and other allies wrote in a letter to the business lobby that they are "baffled" at the Chamber's opposition to the bill's new mechanism for improving the digital security at power plants, water systems and other forms of critical infrastructure. Tony Romm has the story for Pros: ...

DEFCON 20 Roundup: Lessons in Security
PCWorld
"This is the world's best cybersecurity community," said [NSA director General Keith B.] Alexander, who also heads the U.S. Cyber Command. ... Hackers can and must be part...of a collaborative approach to secure cyberspace, he said. ... Gen. Alexander [said] ...

Homemade tech to reduce India's cyber threats
ZDNet (blog)
The cybersecurity analyst added telecom networks and smartphones can be bugged, and there have been cases in which the equipment automatically updates itself without the user's knowledge. Malware is also evolving and can self-destruct or be ...

High School Teachers Try to Hack it at NYU-Poly Cyber Security Boot Camp
MarketWatch (press release)
"This program is a first step toward increasing the number of students who will find their enthusiasm about cyber security matched and fostered by their own teachers," he said. The United States is facing a critical shortage of cybersecurity professionals, ...

Defcon And Black Hat Wrap-Up: Wifi And VPN Crypto Cracked, NSA Chief Asks ...
Forbes
In a bizarre meeting of worlds, National Security Agency chief and U.S. Army Cyber Command general Keith Alexander addressed Defcon for the first time ever, calling on the hackers present to help secure America's infrastructure. Alexander flattered the audience as “the world's bestcybersecurity community” and even referred them to a job recruitment site set up specifically for the conference. When an audience member asked if the NSA compiles profiles on every American, Alexander called the claim “absolutely ...

NSA chief asks hackers for help in securing cyber space
InfoWorld
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. "This is the world's best cyber security community," said Gen. Alexander, who ... The issue is that if you don't see a cyber attack you can't defend against it and at the moment, the NSA has no insight if Wall Street is going to be attacked, for example, he said. Gen. Alexander pointed out that if the industry could share some limited ...

Cybersecurity Act Set For Senate Vote
Channelnomics (blog)
With stipulations reflected in CSA, last' year's proposed legislation required electrical power grid companies and other critical utilities to disclose security procedures, while receiving legal immunity if they were forced to reveal cyber attacks or other intrusive ...

The Cybersecurity Act Of 2012 Goes Up For Debate In The Senate Tomorrow
WebProNews
The Cybersecurity Act Of 2012 Goes Up For Debate In The Senate Tomorrow. 2012 is shaping up to be the year of cyber legislation. After SOPA and PIPA were defeated early this year, all attention turned towards CISPA. Even though the Internet put forth a ...

US cyber chief calls on hackers to make internet secure
ComputerWeekly.com
Alexander took the opportunity at Defcon to lobby for a cyber security bill moving through the Senate that aims to make it easier for companies under attack to share information with the government and each other, as well as give critical infrastructure owners ...

Bit9 Raises $34.5 Million for Cybersecurity Whitelisting
BostInno (blog)
“The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach to cyber security,” said Mickey Arabelovic, partner at Sequoia Capital, in a release. “Bit9 has emerged as a market leader with its ...

Sequoia Capital Leads Investment in Bit9 to Expand Leadership in Advanced ...
MarketWatch (press release)
Bit9 is the only security company to announce that it successfully stopped the Flame malwareand the RSA breach attack--both "zero-day" APT attacks--long before they were identified by traditional/legacy antivirus companies. "Traditional malware protection systems are well ... "The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach to cyber security," said Mickey Arabelovic, partner at Sequoia Capital. "Bit9 has emerged as a market leader with its ...

Preparing for a More Aggressive Iran
Huffington Post
Director, Homeland Security Policy Institute, The George Washington University ... Iran is doing some serious saber-rattling these days, threatening "a`teeth-breaking' response" to the United States should cyber-attacks continue to target Iran. ... These developments draw warranted attention to the risk posed by hybrid threats -- threats in which an adversary acquires from a third-party the necessary access, resources, or know-how needed to attack or threaten a target -- and how such might be employed strategically ...

This Week in Tech: Cybersecurity showdown arrives in Senate
The Hill (blog)
Sens. John McCain (R-Ariz.) and Kay Bailey Hutchison (R-Texas) filed amendments with the Secure IT bill in them. Sen. Patrick Leahy (D-Vt.) submitted five amendments that cover areas of data security, privacy and stiffening penalties for cyber crime. Sens.

Cybersecurity: Bit9 Raises $34.5M From Sequoia, Others For Its Whitelist ...
TechCrunch
As we heard earlier this year in Verizon's big cyber security report, the biggest threats today, he confirms, come from organized crime, nation states looking for IP from other countries and hacktivists like Anonymous. The nation state, which includes acts ...

SaskTel Selects CloudShield Advanced Cyber Countermeasures Solution to ...
defpro
25 that SaskTel, a leading full service communications provider in the Province of Saskatchewan, Canada, will utilize CloudSentry, the latest platform offering from the company'sCybersecurity Business Unit, to bolster its advanced security posture across its networks. CloudSentry is ... The platform works in line, in real-time to control network traffic at multi-gigabit speeds and provides organizations with actionable network attack intelligence that enables them to deliver advanced cyber countermeasures. In addition to ...

Sup. Johnson named vice-chairman for NACo's cyber-security task force
Today's News-Herald
The task force is set to gather and distribute information to raise the awareness of county officials as to how to protect government cyber infrastructures; provide training for cyber security at work and at home; connect the county with federally funded services and the U.S. Department of Homeland Security; and provide input to NACo steering committees on pendingcyber security legislation. “It expands ... If the county's system is weak or vulnerable it easily could facilitate a backdoor-type attack on the federal system.

Cyber crooks infiltrate social networking sites
Times of India
According to the findings of Internet Security Threat Report by a private computer security firm, social networking sites are increasingly used to launch malware attacks in India. The report highlights that the users feel ... Another aspect of the report identifies vulnerabilities where it states that there are more tier II cities on the list of frequently targeted areas by cyber criminals. Ahmedabad and Surat get mention in the report ... More. FEATURED TODAY IN NEWS. Cops name Iran military arm for attack on Israeli diplomat ...

Cybersecurity amendment: Police need a warrant to track you via GPS
Digitaltrends.com
Unlike earlier iterations of the bill — and also unlike the contentious CyberIntelligence Sharing and Protection Act — CSA2012 forbids the government from sharing the data with military organizations, like the National Security Agency, which often operate ...

Digitaltrends.com

The evolving threat landscape - from mischievous attacks to cyber war and ...
SC Magazine UK
Widely described as the most sophisticated virus of all time, Flame evidences the fact that cyberespionage is an increasingly real and advanced threat to a firm's security. The target industries of cyber ... Google's recent pledge to inform vulnerable Gmail account users if it believes they are the victims of a state-sponsored spying attack was largely thought to have been a reaction to the discovery of Flame, and the surrounding incidents of cyber crime targeting US and other government officials. However, this also ...

For first time in 20 years, NSA participates in Defcon hacker conference
FederalNewsRadio.com
In the cybersecurity plain, two species have walked together. For the first time, the NationalSecurity Agency sent someone to address the big national hacker convention, Defcon — And not just anyone from NSA. CNET reports, none other than NSA director Gen. Keith Alexander gave the keynote at this year's Defcon. Alexander is also head of the U.S. Cyber Command. Sporting blue jeans and a black T-shirt, Alexander told the gathered hackers, their talents are needed to help the United State meet the cyber threat.

Help Us, Hackers, You're Our Only Hope, NSA Chief Tells DefCon
Betabeat
Once it got underway, the long-overdue keynote was devoted to asking hackers not just for help educating the populace on cyber security, but also requesting information sharing. If hackers hear an attack is coming, the NSA would really appreciate a heads ...

Betabeat

Mulvenon: Stuxnet was Hiroshima
FierceGovernmentIT
Leadership & Best Practices · Homeland Security ... The use of Stuxnet was not merely an attempt to test the waters on cyber offense, it was a siginificant and destructive deployment of acyber weapon, said James Mulvenon, chairman of the Cyber Conflict Studies Association and vice president of Defense Group, Inc. ... And now that it has come to light that the United States was, in all likelihood, responsible for deploying Stuxnet and Flame, one panelist said the United States is even more vulnerable post-attack.

Georgian opposition party lodge protest to Russia in connection with cyber attack
Trend.az
One of the leaders of the opposition National Democratic Party of Georgia Guram Chahvadze passed a letter of protest to Russian section at the Embassy of Switzerland in Georgia, in connection with the cyber attack on the site of the party. The letter states ...

Trend.az

NSA head calls for more visibility over computer networks
Nextgov
The decentralized nature of the Internet and the confusing thicket of independent public and private networks are limiting efforts to protect against attacks, Alexander signaled Friday at the Def Con hacker conference in Las Vegas. Alexander used the speech to lobby for laws to make it easier for companies under attack to share information with the government and each other as well as give critical infrastructure owners additional rewards for adhering to future securitystandards, Reuters reported. NSA is currently ...

NSA Wants To Hire Hackers
WRTV Indianapolis
Security Chief Gives Recruiting Pitch At DefCon Hacker Conference. Stacy Cowley. POSTED: 10:30 am EDT July 29, 2012 ... top spymaster -- National Security Agency Director Gen. Keith Alexander, also the head of the U.S. Cyber Command -- took the stage Friday at the nation's largest hacker convention to deliver a recruiting pitch. ... with an often-uneasy relationship with the feds. DefCon is the older, wilder and far less official sibling of BlackHat, a cybersecurityconference that wrapped up Thursday in Las Vegas.

The cyber-crime fighters at Bit9 just raised $34.5 million from Sequoia and other ...
The Next Web (blog)
Sequoia Capital has led a $34.5 million investment round for Bit9, a company that providessecurity solutions to detect and prevent cyber threats. Prior investors Atlas Venture, ... HackersAttack Korea's SK Telecom, Grab and Sell 8.7M Customers' Data ...

Africa used as botnet army; SE Asia invests in information warfare; Latin America ...
Infosecurity Magazine
His concerns for the future are of a botnet cyber army of over a million. “At the moment, Africa isn't attacking – they're being attacked and used”. While businesses in Africa “get security”, Contos does not believe the same can be said of the government and end ...

2012 London Olympics: Top Tips on Preventing Malware Attacks during Games
IBTimes.co.uk
A report by cyber-security firm ThreatMatrix claims Personal Computers, mobile phones and tablets are likely to face increased numbers of malware attacks from hackers during the Olympics, as more and more people will access the Internet to look at the latest results and scores. Estimates indicate nearly a billion ... "With such a large audience seeking information on the Olympic Games, cybercriminals will seize this opportunity to attack PCs, mobile devices and even tablets. Cybercrime today is so advanced that in ...

IBTimes.co.uk

Seoul shares hit 4-week high on hopes of global c.bank action
Reuters
Extended rally sees KOSPI scale 50-day moving average * Financials rally as ECB debt-fighting measures eyed * Samsung Elec shares up 9 pct since record Q2 earnings * KT Corp falls 3 pct, client data leaked in cyber attack By Joonhee Yu SEOUL, July 30 ...

China Hackers Hit EU Point Man and D.C. With Byzantine Candor
San Francisco Chronicle
In an essay in the Wall Street Journal July 19, President Barack Obama warned that “the cyberthreat to our nation is one of the most serious economic and national security challenges we face.” Ten days earlier, in a speech given in ... This account of the Comment group is based on the researchers' logs, as well as interviews with current and former intelligence officials, victims, and more than a dozen U.S. cybersecurity experts, many of whom track the group independently. Private Investigators. The researcher who ...

Tagging and Tracking Espionage Botnets
Krebs on Security
A security researcher who's spent 18 months cataloging and tracking malicious software that was developed and deployed specifically for spying on governments, activists and industry executives says the complexity and scope of these cyberspy networks now ... Joe Stewart, senior director of malware research at Atlanta-based Dell SecureWorks, said he's tracked more than 200 unique families of custommalware used in cyber-espionage campaigns, and some 1000 Web site names registered by cyberspies for ...

Krebs on Security

NSA booth at Black Hat raises eyebrows
TechEye
But he did use his speech to lobby for a cyber security bill moving through the Senate that would make it easier for companies under attack to share information with the government. He wanted the Black Hats to help build a set of standards for critical networks ...

TechEye

Lieberman and cybersecurity bill co-sponsors hit back at Chamber
The Hill (blog)
"Given the cyberattacks that have affected the Chamber's own control over the information of its members, we would have hoped that you would have an appreciation for the threat to the national and economic security of our nation." ... Info agencies built on paper shift to meet demands of digital age · House gears up for 'cyber week,' but security bill's fate rests with Senate · House GOP leaders rebuff White House push on cybersecurity mandates · Online sales tax battle pits Amazon against Norquist and Sen. DeMint ...

China's Growing Cyber War Capacities
By Mattia Nelles
Unlike traditional warfare, the origins of sophisticated cyber-attacks are nearly impossible to trace. Determining where an attack originated is exceedingly difficult and by no means assured. This problem of attribution, as Lynn argues, has some ...
e-International Relations

KT Corp. -South Korea's No. 2 Wireless Service Provider Hacked ...
By VOGH Reporter
VOGH- VOICE OF GREYHAT| Leading Resource of Cyber-Security,Hacking News. VOGH-News... LinkedIn Confirmed The Cyber-Attack ... After that hack this one is the second largest attackwhich infected millions of South Korean people.
VOGH- VOICE OF GREYHAT| Leading...

Cyber Warfare and the Laws of War - blog*spot
By Jacob Katz Cogan
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their ...
International Law Reporter

5 Tips for Avoiding Cybercrime at the 2012 London Olympics
By admin
In 2008 Beijing received nearly 12 million cyber attack attempts every day. Since 2002, the ...Executive Vice President of Atos Patrick Adiba cautions that, although their security is very high, “it can never be 100 percent.” That doesn't mean ...
Crime and Forensic Blog

NSFPC: Enemies stunned by Iran's advancement in cyber operations
By Semantica
Mansour Haqiqatpour said, “Iran has achieved such scientific advancement in its cyberoperations that it can defuse any attack within the shortest possible time… Therefore, any attempts by the US and the Zionist regime (Israel) to infiltrate and ...
Iran Daily Brief

Roundup of News with special interest in Iran .. By Fred Brownbill ...
By Fred Brownbill
2/ It would appear that computers at the uranium enrichments sites in Natanz and Fordo were attacked in a new cyber attack. This information was sent via e mail to a Finnish cyber securitygroup by a scientist who is claiming to work for the ...
Save America Foundation

Hakin9 Exploiting Software July 2012 Issue is out! « CYBER ARMS ...
By D. Dieterle
Cyber War News … Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android • An In-Depth … In this article we will look at a few common Wi-Fi security misconceptions. [...] Hakin9 Exploiting Software July 2012 Issue is out! « CYBER ...
CYBER ARMS - Computer Security

Bit9 Closes on $34.5M Series D -peHUB
Bit9 is the only security company to announce that it successfully stopped the Flame malwareand the RSA breach attack—both “zero-day” APT attacks—long before they were identified by traditional/legacy antivirus companies. “Traditional malware ... “The market has reached a clear inflection point where organizations of all sizes across all industries need a new approach tocyber security,” said Mickey Arabelovic, partner at Sequoia Capital. “Bit9 has emerged as a market ...
peHUB | Site Wide Activity

Smartphones are becoming top targets for cyber attacks |
By admin
Smartphones at the heart of modern lifestyles are becoming top targets for cyber attacks, according to security specialists and hackers who flocked to Las Vegas this week for back-to-back Def Con and Black Hat conferences. “We are entering a post-PC (personal ... “You're supposed to be paying for stuff and scanning movie posters with your smartphone, but be aware that this is another way that bad guys can attack your phone,” Miller told AFP. He showed that if he could briefly get ...

London Olympics officials prepare for cyber attacks - Los Angeles ...
As athletes compete for Olympic gold, a different group will seek international recognition — online hackers. Olympic security officials are bracing for an ...
articles.latimes.com/.../la-fi-olympics-cybersecurity-20120726

Cyber defender: U.S. ill-prepared for attack | News - Home
Since 2009, online attacks that could destroy key infrastructure in the U.S. have skyrocketed. And the man in charge of cyber defense gave the national a failing ...
www.ksat.com/news/Cyber-defender-U.../-/index.html

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com