Legal, regulatory risks keep firms from sharing cyber threat data

Legal, regulatory risks keep firms from sharing cyber threat data
CNET (blog)
A U.S. policy report to be released today says Congress should preempt certain state and federal regulations in order to allow companies the freedom to share with the government information aboutcyber security threats and attacks without fear of breaking data breach and other laws. More information sharing is needed ... Information that should be shared includes, but is not limited to,malware threat signatures, known malicious IP addresses, and immediate cyber attack incident details." To resolve this dilemma, the ...

Too many cyber attacks hushed up, US panel says
Phys.Org
But it noted that these "represent only a small fraction of cyber attacks carried out in the United States." The think tank's cybersecurity task force headed by former National Security Agency chief Michael Hayden and businessman Mortimer Zuckerman said ...

UK admits to cyber attack on Iran
Press TV
UK Parliament's Intelligence Security Committee (ISC) has admitted that Britain has launched a cyber attack against Iran shortly after the UK spy chief admitted Britain conducted covert operations against Iran. In its annual report for 2011-2012 to the British ...

Press TV

Google Wants To Help Use Technology To Bring Down Mexican Drug Cartels
Business Insider
... often use more sophisticated technology than law enforcement. Cartel assets include mapping software that tracks the location of police from high-tech control rooms; remote control submarines; and military grade rocket launchers. ... Mexico's undersecretary of information technology, Francisco Niembro, said the government has been developing a Web platform where law enforcement can get a national look at crimes and investigations. Today, he said, 8500 of Mexico's 36000 federal police are dedicated to ...

Business Insider 

Raytheon to develop cyber maneuver technology for US Army ...
By Raytheon
Raytheon has received a $3.1 million contract to develop technology for Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR), a program.
Army News at DefenceTalk.com

Mega spam-spewing Grum botnet finally KO'd
Register
By John Leyden • Get more from this author Security researchers have dealt a knockout blow to Grum, one of the most prolific spam-distribution botnets. Command-and-control servers in the Netherlands were taken out on Monday, but that still left zombie ...

Electrical power grids prime targets for cyber attack, says McAfee
ComputerWeekly.com
Legacy smart electrical power grids are a prime target for cyber attack and security needs to be built into these critical systems, a study has found. The most prevalent cyber threat reported by the global energy sector is extortion, according to a report detailing ...

Bipartisan Policy Center task force calls for improved information sharing
The Hill (blog)
Congress needs to pass legislation that encourages industry to share information about cyberthreats spotted on their computer networks with the government, the Bipartisan Policy Center'sCybersecurity Task Force argued in a report released Thursday. ... Security Agency Director Michael Hayden and Boston Properties chief executive Mort Zuckerman, proposes a set of legislative recommendations in the report that are intended to help the private and public sectors share information about cyber threats with one ...

Cyber Security Challenge Not Interested In Offensive Skills
TechWeekEurope UK
“Our focus is on ensuring that the talent pool for those employing cyber securityexperts to defend our systems is well stocked. There is an urgent need to ... The UK government is also understood to be using and developing cyber attack methods. Yet Mikko ...

TechWeekEurope UK

Channel adapting to SMB cyber attack risk, says ComputerLinks
ChannelBiz
According to David Caughtry, director of core technologies at IT security distributor ComputerLinks, SMBs will come under greater attack as they become “more sophisticated and prolific”. “By the nature of the way that the cyber attack market is evolving it is a ...

ChannelBiz

The Coming Of The Mahdi Virus
Voice of America (blog)
Researchers at rival security firm Symantec, however, reached different conclusions. “Targets of the ... Western media, it says, are attempting to “downplay Iranian cybercapability” by spreading malicious rumors of a virus it says may not even exist. “If this were ...

Voice of America (blog)

Europol To Lead International Cyber Security Protection Alliance Consultation ...
Dark Reading
“During the past 24 months, critical infrastructure in countries around the world has been under dailycyber attack from both organized criminal networks and state-sponsored entities,” says John Lyons, the Chief Executive of the International Cyber Security ...

FERC goes back to Congress again for more cyber oversight
FederalNewsRadio.com
"First, legislation should allow the federal government to take action before a cyber or physical national security incident has occurred," he said. In addition, Congress should avoid limiting additional authority to the bulk power system, which excludes certain ...

Homeland Security official: Government takes cyber security seriously
Savannah Morning News
Erin Meehan, a deputy director in the National Cyber Security Division of the Deparment of Homeland Security, talks with an attendee at Wednesday's Chamber of Commerce breakfast. Advertisement. By Adam Van Brimmer. Homeland Security official: ... Meehan encouraged the 50-plus local business leaders in attendance at the breakfast to develop their own plan for handling acyber attack on their companies and to run exercises to test those contingencies. Chatham County Commissioner Helen Stone, who ...

AMC's Russell to AFCEA: cyber warfare a new type of fight
The Huntsville Times - al.com
Speaking on cyber warfare, the Deputy G-2 for the U.S. Army Material Command painted the electronic conflict as a different type of warfare, waged for different reasons and fought with different methods than conventional warfare. ... "If the purpose of a cyber attack is get at industrial secrets, is this enough to justify warfare?" Cyber warfare ... But he cautioned that such technological advances might only give a temporary advantage in cyber security, and constant effort is needed to stay ahead of the game. "There is no ...

Cyber-espionage malware circulating throughout Middle East
FederalNewsRadio.com
Another piece of cyber-espionage malware is circulating throughout the Middle East, according to CSO Online. Kaspersky Labs reports the "Mahdi" virus records keystrokes, audio and screenshots from infected computers. The researchers believe the virus ...

New spying malware targets Mideast countries
gulfnews.com
Dubai: Security experts have uncovered an ongoing cyber espionage campaign targeting Iran and other Middle Eastern countries that they say stands out because it is the first such operation using communications tools written in Farsi. Kaspersky Labs and Seculert researchers have ... However, “the targeted entities are spread within the members of the attack group, which might suggest that this attack requires large investment or financial backing,” Raff said. In addition, examination of themalware identified an ...

Cyberspy program targets victims in Iran, Israel, companies say
CNN (blog)
A computer virus campaign has for months been selectively spying on people involved in government and in strategically important industries principally in Iran - but also in Israel and other countries in the Middle East, according to two cybersecurity companies, which cooperated ... The malware has a component named after the Shiite messiah "Mahdi," and an earlier version of the malware once sent data plundered from victims' computers back to a server in Tehran. ... Iran electronic warfare," according to Seculert.

Major Dominican daily denies Anonymous cyber attack
Dominican Today
Santo Domingo.- One of Dominican Republic's major newspapers on Thursday denied being the target of hacking by the group Anonymous Do on Wednesday, in an attack which also affected the oldest daily, Listin Diario. “Maintenance… We are currently ...

New malware targets Iran, Israel
News24
This is the latest in a string of cyber attacks on targets in the Middles East. Kaspersky ... Thesecurity company said that a new attack was not unexpected and that targeted attacks on companies may be part of a broader government espionage programme.

New Malware 'Mahdi' Attack Is Ongoing, New Versions Expected
TPM
“We have analyzed several versions of the malware,” said Aviv Raff, chief technology officer of Seculert, an Israeli cybersecurity firm that was the first to detect and publicize the Mahdi malware on Tuesday. “We are anticipating other versions to arrive, as the ...

TPM

Everyone has role in Internet security
San Francisco Chronicle
For the past few months, the Department of Homeland Security has been working with other federal agencies and industry to respond to cyber intrusions that target oil refineries and natural gas operations. Intruders are able to gain entry to these systems using ... Right now, the Obama administration is working with Congress to clarify the key government and industry responsibilities that help prevent and respond to cyberthreats and strengthen our cybersecurity workforce. While we must remove existing barriers to ...

San Francisco Chronicle

PSC looking into cybersecurity of electric grid
Lakenewsonline.com
Because cybersecurity threats challenge the reliability, resiliency and safety of the electric grid, and because utility spending to address cyber vulnerabilities can impact the bills that customers pay, the Commission must explore, and ensure, the integrity of the ...

UK needs to get active with cyber strategies
Acumin
UK needs to get active with cyber strategies. The UK needs to do more to improve its cyber security competencies by being more proactive instead of reactive, while also boosting the skills base within the Government Communications Headquarters (GCHQ).

New 'Mahdi' Cyber Campaign Targeting Iran
Arutz Sheva
Security experts have uncovered a new cyber espionage campaign targeting Iran and other Middle Eastern countries, which, they say, is unique because it is the first such operation using communications tools written in Persian, Reuters reported.

Arutz Sheva

Security Innovation Network (SINET) programs advance cybersecurity ...
defpro
09:10 GMT, July 19, 2012 SAN FRANCISCO | The Security Innovation Network (SINET), an organization focused on the advancement of cyber security innovation through public-private collaboration, today announced two high-profile keynote speakers for the SINET ... Fleet CyberCommand is the Navy's central operational authority for networks, cryptologic and signals intelligence, information operations, cyber, electronic warfare, and space capabilities and Tenth Fleet serves as the Numbered Fleet for Fleet Cyber ...

Virus attacks: Why energy grids are prime targets
Times of India
A cyber criminal could debilitate a major city by a single targeted attack on the energy grid and compromise anything from the lights and appliances in homes, to heart monitors in hospitals, to air defence systems. The most prevalent cyber threat reported by the global ... In the effort to update it and integrate it with more modern installations, connecting aging systems to the internet without the benefit of encryption, security has largely been an afterthought. Automation: Moving systems from a manual process to one that ...

Behind the Bulgaria Suicide Bombing: Could It Be Iran? Or Hizballah or Both?
TIME
A damaged bus is transported out of Burgas airport, Bulgaria, Thursday, July 19, 2012 a day after a deadly suicide attack on a bus full of Israeli vacationers. ... The approach is promoted across the spectrum, from cyber warfare (a web search finds Abbasi seated prominently at the second Cyber Hizballah conference) to naval doctrine. It's why the ... “I'm a bit puzzled; this is not normally the way they do it,” says Benedetta Berti, a terrorism expert at the Institute for National Security Studies in Tel Aviv. The van outside ...

TIME

Boeing Opens Information Security Innovation Lab in California
defpro
"Boeing has made substantial investments in cybersecurity research and development over the past several years, including opening our Cyber Engagement Center in Maryland and completing numerous acquisitions," said Boeing Information Security ...

Hospitals Lack Data Breach Protection and May Not Even Know It
MarketWatch (press release)
Christine Marciano, CEO of Cyber Data Risk Managers stated, "Today it's conceivably not a matter of if a healthcare organization will experience a cyber attack or a data breach, it's more a question of when, how costly and how embarrassing it will prove to be." Healthcare data breaches are ...Potentially, common sources of a data breach may have been excluded from policies due to lacking hospital security processes and procedures, such as use of proper encryption on portable devices. The executive briefing, The ...

US Power Grid Vulnerable to Attack
The Epoch Times
WASHINGTON—The U.S. power grid remains too vulnerable to cyber-attacks and other potential threats despite efforts to set up more efficient security systems, lawmakers heard on July 17. “The current reliability system that has emerged is cumbersome and ...

The Epoch Times

Hack Back - When A Cyber Attack Victim Turns 'Digital Vigilante'
Worldcrunch
BERLIN - What with malware able to easily cancel out whatever security measures are in place on a computer, the cyber-crime phenomenon is in full developmental swing. That's the word from a new report on the dark side of the information technology...

Worldcrunch

Global cybersecurity market on fire, report says
FederalNewsRadio.com
The firm expects the industry's fastest growth in Asia. It says cybersecurity issues pervade every political and military conflict, and it noted that social networking and cloud computing have exposed global organizations to more sophisticated cyber attacks.

SMB cyber attacks on the rise
Acumin
Paul Wood, cyber security intelligence manager at Symantec, believes that there is a "direct correlation" between this rise and fall among SMBs and big businesses. "It almost seems attackers are diverting their resources directly from the one group to the other," he explained. "It may be that your company is not the primary target, but an attacker may use your organisation as a stepping-stone to attack another company. You do not want your business to be the weakest link in the supply chain." Mr Wood added that ...

Finmeccanica Completes First Tests for NATO Cyber Security System
By Finmeccanica
The Finmeccanica Cyber Solutions team selected in February 2012 to fulfil the NATO Computer Incident Response Capability (NCIRC) - Full Operating Capability.
Defense News by DefenceTalk.com

Cyber Security Task Force: Public-Private Information Sharing ...
By jim
From October 2011 through February 2012, over 50000 cyber attacks on private and government networks were reported to the Department of Homeland Security (DHS), with 86 of those attacks taking place on critical infrastructure networks.2 The incidents reported to DHS represent only a small fraction of cyber ... Information that should be shared includes, but is not limited to, malwarethreat signatures, known malicious IP addresses, and immediate cyber attack incident details.
FISMA Focus

Partnerships Are Required to Successfully Secure the Cyber Domain
By The Mariner Group
... former special assistant to the U.S. president and cyber security coordinator of the White House, agrees that raising awareness about cyber security threats can “prevent people and companies from suffering consequences of a cyber attack.” ...
The Mariner Group

UK admits to cyber attack on Iran « InvestmentWatch
By InvestmentWatch
UK admits to cyber attack on Iran. July 19th, 2012. UK Parliament's Intelligence Security Committee (ISC) has admitted that Britain has launched a cyber attack against Iran shortly after the UK spy chief admitted Britain conducted covert ...
InvestmentWatch

Nation's Power Grid Faces Cyber Threats | PC Recycler, Inc
By Kayla@pcrecycler.net
With a possible debate on cybersecurity legislation looming in the Senate, energy regulators on Tuesday warned lawmakers of the pressing threats facing the nation's power grid. Appearing before the Senate Committee on Energy and Natural Resources, a panel of witnesses stressed that any bill the full chamber approves must provide for a more fluid system of sharing information about cyberthreats, both between public ... "Our project demanded complete security of our information.
PC Recycler, Inc

The Malware Update: A Look at the Latest Malware That's Attacking ...
By David Hobbs
Years ago, security researchers found exploits and disclosed them to companies for the purpose of fixing the hole. Today, some researchers may still use the ... Adding to the case, now that Duqu has been used, disappeared and morphed, we know that the next cyber weapons are already being tested and developed. What does this mean for those of us using ... For your network, you want to prepare for the worse, and minimize any attack. That way you donate as little as possible to ...
Radware Blog

Idaho Samizdat: Nuke Notes: Code inside code; Cyber attacks ...
By Dan Yurman
In short, the centrifuges, which operate at over 7000 rpm, spun themselves to pieces when malwareprogrammed erratic changes in their performance. cybersecurity According to the New York Times article, the cyber software, known as the ...
Idaho Samizdat: Nuke Notes

Boeing Opens Information Security Innovation Lab in California ...
Article - Boeing Opens Information Security Innovation Lab in California - Lab builds on Boeing's commitment to further expand cybersecurity capabilities. ... networks in a secure yet real-world environment. The lab's Wide Area Network (WAN) backbone, coupled with Boeing Information Solutions' Cyber Range-in-a-Box (CRIAB), allows modeling and simulation of complex missions and advanced threats to create resilient security solutions. CRIAB is a compact, portable system used to...
Airline News Resource

Smart Grid: Cybersecurity and the grid: How bad is it and how do we ...
The U.S. Senate's energy panel did a status check Tuesday on actions taken to ensure the electric grid is protected from cyber-attacks. The hearing came as lawmakers are poised to consider yet another round of cybersecurity legislation.
SmartGridNews.com

Covering all the bases: Threats to the corporate network ...
By Patrick Lambert
Every few months the U.S. government, or one of its many departments and divisions, releases numbers and reports on the current state of cyber security or new cyber threats. At the beginning of this month, the Homeland Security's Industrial ...
on TechRepublic
U.S. GAO - Cybersecurity: Challenges in Securing the Electricity Grid
Cybersecurity. Challenges in Securing the Electricity Grid. GAO-12-926T, Jul 17, 2012. Highlights. View Report (PDF, 25 pages) ...
www.gao.gov/products/GAO-12-926T

Middle East officials targeted by cyber espionage 'Madi' attackers ...
Government officials in the Middle East are among 800 victims of a sustained cyber espionageattack dubbed Madi targeting critical infrastructure in Iran and ...
www.guardian.co.uk/technology/.../middle-east-madi-attackers

Cyber attack summer
We note a rash of rapidly escalating cyber attacks against banks and European financial institutions. Some of the following events are under way and verifiable, ...
www.wdrep.com/_wp/technology/cyber-attack-summer

Sen. Lindsey Graham: Cyber-attacks new disaster threat for SC ...
CHARLESTON — South Carolinians have dealt with the aftermath of war, earthquake and hurricanes and U.S. Sen. Lindsey Graham said Monday the state now ...
www.goupstate.com/article/20120716/.../ARTICLES?...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com