NSA chief asks hackers at Defcon for help securing cyberspace

NSA chief asks hackers at Defcon for help securing cyberspace
Computerworld
IDG News Service - National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. "This is the world's ... He called 11-year-old Defcon Kids co-founder CyFi to the stage and said that training young people like her in cybersecurity is what the U.S. needs. The NSA ... NSA's and U.S. Cyber Command's roles are to protect the nation from cyberattacks and foreign intelligence, Gen. Alexander ...

Hack attack
New York Daily News
Keith Alexander, head of the National Security Agency and the newly formed United States Cyber Command, from 2009 to 2011 the number of attacks on computer systems that run American infrastructure grew by a factor of 17. Numbers in a report out this ...

New York Daily News

US must develop Olympic-level cybersecurity experts
San Bernardino Sun
Recently, Department of Homeland Security Secretary Janet Napolitano asked two heavyweights in the cyber world, Jeff Moss and Alan Paller, to co-chair a task force to assess ways DHS can increase the number of highly qualified cybersecurity ...

Cyber Discovery 2.0 at LA Tech
Knoe.com
"In the world of cyber security, the adversary thinks outside the box," says Montana Williams, National Cybersecurity Education Director, "and normal solutions don't apply." Williams says when it comes to homeland security, you have to think on a more global ...

NSA Turns To Hackers To Make Internet Secure Against Cyberattacks
International Business Times
Alexander, who also head of the U.S. Cyber Command and Central SecurityService, urged hackers to partner with government and industry to realize the objective. Stating that hackers can educate others who do not understandcybersecurity, the NSA Chief ...

International Business Times

Police Arrest Two Suspects in Cyber Hacking of KT Corp.
Arirang News
The National Police Agency's cyber terror response team said seven others were booked without physical detention on charges of buying the leaked data for telemarketing purposes. Police suspect the telemarketers used the personal information of ...

NSA director finally greets Defcon hackers
Ninjalane
With the increasing threat of cyber warfare many will look to the very people who made things like Defcon possible to further protect ourselves from attack. Related Web URL:http://news.cnet.com/8301-1009_3-57481689-83/nsa-d... Return to Ninjalane News | ...

Smartphones are becoming top targets for cyber attacks
Moneyweb.co.za
Smartphones at the heart of modern lifestyles are becoming top targets for cyber attacks, according to security specialists and hackers who flocked to Las Vegas this week for back-to-back Def Con and Black Hat conferences. "We are entering a post-PC (personal computer) ..."You're supposed to be paying for stuff and scanning movie posters with your smartphone, but be aware that this is another way that bad guys can attack your phone," Miller told AFP. He showed that if he could briefly get an antennae device ...

Sen. Carper Commends Colleagues on Vote to Proceed to Debate on ...
PoliticalNews.me (press release)
Carper Commends Colleagues on Vote to Proceed to Debate on Cybersecurity Legislation “The Internet is central ... While this bill isn't perfect, it is a significant improvement over our current cyber security laws which aren't adequately protecting cyberspace.

Smart Phone Monitoring and Malware... Up close and personal...
Malta Independent Online
In fact, the cyber security industry recently observed an exponential growth of malwaredesigned to attack smart phones, steal sensitive information, and exploit that data in successful attacks, such as against mobile banking transactions. Today, the “Malware ...

Hackers Convene To Find Mobile Security Flaws
GPB
This week thousands of hackers computer security researchers, government recruiters, spooks and cyber punks descended on Las Vegas for the annual summer hacker convention. Hosted by organizations called Black Hat and Defcon, these events are ...

GPB

Guessing what Section 706(d) of the Lieberman-Collins Cybersecurity Bill Means
Lawfare (blog)
(2) the Secretary, the Attorney General, or the Director of National Intelligence determines that disclosure of a cybersecurity threat indicator would threaten national or homeland security and submits a written request to delay notification, except that the Secretary, ... Now, here's my guess – the provision is designed to allow NSA and DOJ to be able to stop temporarily companies from sharing cyberthreat indicators when it appears that the cyber threat indicator came from China or a terrorist group and they want to do ...

Lawfare (blog)

Senator wants to require warrant for GPS tracking in cybersecurity bill
The Hill (blog)
Lieberman's bill contains provisions that are intended to improve information sharing about viruses and other cyber threats between the government and industry so a cyber attack or intrusion can be thwarted in real-time. ... narrow the Federal Information Security Management Act (FISMA) measures in the bill and state that the international cooperation-related provisions could not be interpreted "to authorize the president to enter into a binding international agreement establishing disciplines on cybersecurity without ...

US spy chief asks hackers for help
Big News Network.com
In a speech at the gathering, he expressed his admiration for the cyberspace experts, saying he would like to find common ground to develop new tools in the fight against cyber-crime. Mr Alexander made the point that the US needed more experts on the job to fight against criminals who attack government facilities, major US companies, banks and other similar institutions. He said: "There are a lot of companies with tremendous cyber security expertise getting hacked. The reality is that this is the community that ...

Big News Network.com

Anonymous Dumps Australian Telco Data Online
Gizmodo Australia
The data would presumably be used in law enforcement and cyber-security cases should they ever arise. Roxon was only in initial talks with ISPs over the scheme when the story broke in 2010, but the plan reared its head once again last month when the ...

Review: Confront and Conceal: Obama's Secret Wars and Surprising Use of ...
DAWN.com
However, the backlash the US triggered from Pakistani security establishment and mainstream society in relying so heavily on drone strikes — there were over 100 strikes in 2010 — has led to a massive decline in 2012: less than 20 this year so far. Did the Obama administration ever ...The chapter “Olympic Games” is particularly sensational stuff, building as it does on a New York Times story just prior to Sanger's book on America's cyber warfare against Iran's nuclear programme. To date, the spectre of cyber ...

Nuclear disarmament: could Malta possibly lead the way?
Malta Independent Online
You may be familiar with our series of articles on cyber and cyber-physical safety and securitythat are published each week in this newspaper. In that series we discuss the serious problem of cyber attacks against nuclear facilities. Now we are pleased to offer a second ... To promote Maltese ICT, we encourage all ICT professionals to register on the ICT GM Skills Register and keep abreast of developments, both in Cybersecurity and other ICT R&D initiatives in Malta and Gozo. For further details contact David Pace ...

Democratic Senators Add Gun Control to Cybersecurity Bill
Game Politics
Senators Frank Lautenberg (NJ), Barbara Boxer (CA), Jack Reed (RI), Bob Menendez (NJ), Kirsten Gillibrand (NY), Schumer (NY) and Dianne Feinstein (CA) submitted an amendment to the Cybersecurity Act of 2012 which would limit real-world gun rights.

Two months before Colorado shootings, feds warned that theaters may be targets
East Valley Tribune
The relative ease of carrying out an attack in a packed, darkened theater, where security is all but nonexistent, is something U.S. anti-terrorism authorities already had worried about. Such a venue could accomplish two of the goals of al-Qaida and affiliated terror ... demand the release of captured al-Qaida-linked or -inspired violent extremists. The May warning was prepared by the Office of Intelligence and Analysis, Cyber, Infrastructure and Science Division of the DHS, in cooperation with the FBI and other agencies.

Matt McQuinn, Jessica Ghawi And Jesse Childress Funerals: Colorado Shooting ...
Huffington Post
This undated photo provided by the U.S. Air Force shows Jesse Childress. The 29-year-old, from Thornton, Colo., was one of the victims in the Friday, July 20, 2012 Aurora, Colo. movie theater shooting. Childress was an Air Force cyber-systems operator ...

London mayor calls attack by fellow Conservative on Olympic opening ceremony ...
Washington Post
London mayor calls attack by fellow Conservative on Olympic opening ceremony 'nonsense'. United States' Ryan Lochte competes in .... Sudarsan Raghavan. Justice Department trains prosecutors to combat cyber espionage. Sari Horwitz. Romanians vote ...

Microsoft pays big for software security
The Australian
Each of the top three entries dealt with a way cyber attackers twist snippets of benign software already in a computer system to malicious ends, according to Microsoft. The Blue Hat winners were announced as a Black Hat conference of computer security ...

Cyber Insecurity Feds' Latest Excuse To Access Your Private Data
By Alexander Higgins
Categories: Society, Technology, US Tags: attack, break, cispa, cyber, Cybersecurity, economics, economy, hackers, internet, KristineFrazao, London, money, net, Olympics, Politics,security, Show, sport, Steven Rambam, terrorism ...
Alexander Higgins Blog

McCain's Stance on Cybersecurity Is Wrong « Commentary Magazine
By Max Boot
Keith Alexander, the head of the National Security Agency and U.S. Cyber Command, has just warned cyberattacks aimed at U.S. infrastructure increased seventeenfold from 2009 to 2012. General Alexander further said that “on a scale of 1 to ...
Commentary Magazine

Daily Kos: Cybersecurity amendments threaten gains made in ...
By rss@dailykos.com (Joan McCarter)
Pretty much, a good rule of thumb is to oppose all 'cyber security' bills unless there is clear and incontrovertible evidence that the bill is necessary. And even in that case, I'd pretty much stick with lukewarm support. (-5.50,-6.67): Left Libertarian ...
Senate

Gun Control Amendment Slipped Into Cyber Security Bill
By LibertyCrier
Congress is continuing their plea for a comprehensive cybersecurity bill, and their latest attempt to govern the Web is attracting attention of not just the Internet savvy: a new amendment tacked on to a cybersecurity act includes a provision.
Liberty Crier

CyberTelecom Blog: CT Weekly :: 7.28 :: The Cable Monopoly :: Natl ...
By Robert Cannon
The destruction or exploitation of critical infrastructure through a cyber attack, whether a nuclear power plant, a region's water supply, or a major financial market, could cripple our economy, our national security, and the American way of life.
CyberTelecom Blog

Chemical Facility Security News: S 3414 Actual Debate to Start ...
By PJCoyle
... by SA 2596. That amendment would prohibit any agency that already had legal authority to compel the submission of security information from using that authority to collect information to support the voluntary cybersecurity program. ... In my blog post about the identification of criticalcyber infrastructure I noted that there was a 60-day window for Congress to act on the notification of the designation of a category of critical infrastructure as critical cyber infrastructure. I failed to note that ...
Chemical Facility Security News

Report: Obama Admin Shares with Netanyahu the U.S. Contingency ...
By Sharona Schwartz
... Contingency Plan for Iran Attack. President Obama with National Security Adviser Thomas Donilon (White House photo via Times of Israel) ... Just like the drone strikes, the SEAL raid, the cyber worm attack. Of course this White House can't ...
TheBlaze.com - Stories

Activist Post: Gun Control Amendment Restricting Magazine Size ...
By Activist
Gun Control Amendment Restricting Magazine Size Slipped Into Cyber Security Bill · Youtube ...Your Email To Receive Our Newsletter. Close. Posted by Activist at 2:33 AM Labels: civil liberties,Cybersecurity, gun control, gun rights, video ...
Activist Post

Five things you need to know about U.S. national security – CNN ...
By Adam Levine
Paul Stockton, assistant secretary for Homeland Defense and Americas' Security Affairs at the Department of Defense, said an attack on the U.S. grid would not only affect millions of people in the United States, but it would also affect critical defense infrastructure at home and abroad. ...Keith Alexander, the director of the National Security Agency and commander of U.S. CyberCommand, who went on to say echo concerns about how cyber attacks may effect domestic, civilian targets.
CNN Security Clearance

What Congress' cybersecurity bills mean for you - Technology ...
President Barack Obama is currently pushing for cybersecurity legislation and has made it one of his priorities for 2012. In a July 19 opinion piece published in ...
www.msnbc.msn.com/.../what-congress-cybersecurity-bills-me...

Security expert: Iran scientist reports possible cyber attack on - Haaretz
Post by official at Finnish firm F-Secure publishes email claiming to originate from Iran's atomic energy agency, saying that a new virus stuck enrichment site in ...
www.haaretz.com/.../security-expert-iran-scientist-reports-poss...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com