State-Sponsored Cyber Espionage Projects Now Prevalent Say Experts

State-Sponsored Cyber Espionage Projects Now Prevalent, Say Experts
Business Insider
Computer security experts say privately that the number of projects deployed is actually much higher, and that the systems have been under development since at least 1996, when the internet had barely begun its transition from a US government and...

Business Insider

GOP platform seeks more aggressive US cyber deterrence policies
Computerworld
Computerworld - The 2012 Republican Party platform adopted this week calls for a more aggressive U.S. cyber deterrence policy for dealing with security threats against government and civilian targets. The platform, which lists the GOP's stance on a ...

Obama Weighs Broad Program to Defend Networks From Cyber Attacks
Businessweek
President Barack Obama might create a broad new program to protect vital government and private computer networks from cyber attacks, according to a draft document being circulated in his administration. ... “While an executive order cannot convey ...

Charlotte Dawson Twitter attack sparks call for changes to laws against cyber ...
The Daily Telegraph
And NSW police minister Mike Gallacher said he wanted the trolls "dragged out of their mother's basement and put before a court" following the Twitter attacks on the Australia's Next Top Model host. "These are sick minds we're dealing with," he said ...

Senator Asks Obama to Write Cybersecurity Executive Order
The New American
Senate Intelligence Chairwoman Dianne Feinstein of California is now urging the president to implement cyber-security measures without congressional approval, by way of an executive order. Feinstein made the recommendation to President Obama in a ...

Source: Newly-Discovered, 'Stealthy' Cyber Attack Hits the Vatican
Fox Business
“The tool was quite sophisticated, apparently focused and, until now, stealthy,” the source said.Security firm Radware (RDWR) issued a threat alert on Tuesday, saying it discovered on the server of an unidentified customer a new Trojan malware that ...

India is in a state of denial on cyber security: Kamlesh Bajaj
Business Standard
Kamlesh Bajaj, former government servant and now CEO of the Data Security Council of India (DSCI), tells Aditi Phadnis that India must beware another attack on its cyber security and suggests ways in which this can be countered. Edited excerpts: What ...

Cyber attack takes Qatar's RasGas offline
ArabianBusiness.com
RasGas, the second largest producer of Qatari LNG after Qatar Petroleum, has been hit with an "unknown virus" which has taken the company offline. A RasGas spokesperson confirmed that “an unknown virus has affected its office systems" since Monday 27 ...

ArabianBusiness.com

Power systems easy target for cyber criminals
Times of India
NEW DELHI: India's power systems could be vulnerable to crippling cyber attacks on a scale that can have serious implications for national security and the economy, an inquiry into the July 30-31 grid collapse that grabbed global attention has said ...

Al Fin: Cyber War Envelops Middle East
By al fin
Cyber War Envelops Middle East. Iran has already been hit by Flame, Duqu, and Stuxnet. Now we are learning of a more mysterious attack against Iran's oil infrastructure by malware called "Wiper:". Wiper was an aggressive piece of malware ...
Al Fin



Second LulzSec hacker arrested over Sony breach

Second LulzSec hacker arrested over Sony breach
Telegraph.co.uk
Raynaldo Rivera, 20, of Tempe, Arizona, surrendered to US authorities in Phoenix six days after a federal grand jury in Los Angeles returned an indictment charging him with conspiracy and unauthorised impairment of a protected computer.

Telegraph.co.uk

Disable Java NOW, users told, as 0-day exploit hits web : technology
/r/Technology is for posts concerning the wide and diverse world of technology;. Please read the ...Good places to address tech support type questions are: ...
www.reddit.com/.../disable_java_now_users_told_as_0day_ex...

Google Takes SEC Guidance on Cyber-Disclosure as a Rule
Businessweek
Cyber-attacks on U.S. computer networks rose 17-fold from 2009 to 2011, according to data cited by General Keith Alexander, head of the National Security Agency and U.S. Cyber Command, at a July conference. Businesses spend $10 billion a year ...

Saudi oil giant fixes network after cyber attack
Khaleej Times
RIYADH — Oil giant Saudi Aramco said on Monday it has restored its main internal network after acyber attack nearly two weeks ago which failed to impact its oil production. The company “restored all its main internal network services that were ...

FBI Arrests Suspected LulzSec Hacker For Sony Pictures Attack
Forbes
It's been a year since the hacking group LulzSec orchestrated a string of high-profile cyber attacks across the web, but the FBI are still catching up with people they believe were part of the splinter group from Anonymous. Police arrested another ...

Cyber Warfare A Serious New Factor In Israel's Already Complex Battlefield
The Jewish Press
Still, the biggest cyber threats come from countries, because countries have the necessary manpower to develop and execute a damaging attack, according to Isaac Ben-Israel, a professor ofsecurity and diplomacy at Tel Aviv University and former head of ...

Air Force Openly Seeking Cyber-Weapons
Threatpost (blog)
... warfare attack' and 'cyberspace warfare support.' The broad agency announcement defines 'cyberspace warfare attack' capabilities as those which would give them the ability to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the ...

Cyber warfare's new reality adds to Israel's already complex battlefield
Jewish Telegraphic Agency
The impact cannot be underestimated, says Dror Mor, CEO of the Sdema Group, an Israeli company that specializes in homeland security protection. “A big part of the next war, wherever it is in the world, will be cyber warfare to silence infrastructure ...

Oft-cited cybercrime cost estimates hosed down
CSO
August 29, 2012 — CSO — President Obama said it in a major speech on cybersecurity. U.S. Senators said it while promoting their Cyber Security Act of 2012. Gen. Keith Alexander, director of the National Security Agency and head of the U.S. Cyber ...

Feinstein urges Obama to issue cybersecurity executive order
The Hill (blog)
Feinstein added that Obama could also direct the Department of Homeland Security and community of intelligence agencies to share "as much information as possible to the private sector about cyberthreats, including classified information." "These are ...

Cyber-Security Pros Create “Frankenstein” Monster
RedOrbit
This type of so-called cyber warfare is apparently on the rise, with various malwarebeing used in recent months. The most notable is the so-called “Shamoon” malware attack, which took out a variety of oil industry computers. That attack is now being ...

RedOrbit

The Air Force is Going Big on Cyber Warfare
By Alex Wilhelm
2012-08-28_13h20_21. Duck! The United States Air Force has an open announcement out that is sure to raise eyebrows at home and abroad, as the military branch is looking to bolster its cyber warfare muscles. Yes, we hate the word 'cyber' ...
The Next Web

Air Force wants to be able to hack everything — RT
By RT
The ability to hack into networks is part of a list of the military's “Cyberspace Warfare Operations Capabilities” that it wishes to acquire, reports Wired. Instead of ... “Plan X,” as the Pentagon named it, will officially begin on September 20, but Darpa has already invested $600,000 to cyber securityfirm Invincea to begin its research immediately. ... But later that year, the Air Force began developing offensive cyber attack strategies, which have materialized into budgeted plans this year.
News RSS : Today

Cyber Warfare: A “Nuclear Option”? | CSBA
The following month, President Obama penned an op-ed for the Wall Street Journal describing critical U.S. infrastructure as vulnerable to cyber attack. Secretary ...
www.csbaonline.org/.../2012/.../cyber-warfare-a-nuclear-optio...

U.S. power grid: Risk of widespread cyber attack grows, yet ...
When it burst upon the scene in summer 2010, Stuxnet changed everything in the world of cyberwarfare.
www.lohud.com/.../U-S-power-grid-Risk-widespread-cyber-att...

Department of Homeland Security Addresses Cyber Threats

Department of Homeland Security Addresses Cyber Threats
Opposing Views
Partnerships are required across all levels of government, the private sector and internationally to share information about emerging cybersecurity threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents. Last ...

Opposing Views 

Oil giant Saudi Aramco recovers from cyber-attack
ITProPortal
“We addressed the threat immediately, and our precautionary procedures, which have been in place to counter such threats, and our multiple protective systems, have helped to mitigate these deplorable cyber threats from spiralling,” said Khalid A. Al ...

Saudi Aramco Oil Company Says It Fought Off Malware Attack
eWeek
IT Security & Network Security News & Reviews - eWeek ... Approximately 30,000 workstations were hit in a cyber-attack this month, but the company says it has cleaned the systems and restored them to service.

Canada says 'Anonymous' may attack energy company computers
HeraldNet
"Imperial maintains a high level of security in all aspects of its operations and that includes cyber security," Rolheiser said. "We take all potential threats seriously." -- With assistance from Andrew Mayeda in Ottawa and Rebecca Penty in Calgary. bc ...

Navy Offers Cyber Scholarships
Nextgov
White House plans to regulate contractor computer security. Since Congress failed to.... The Navy is now offering scholarships to military and civilian personnel interested in pursuing or furthering their IT or cybersecurity careers and education. The ...

Nextgov

Cyber Intel: On Cyber Guard At The Voting Booth
AOL Government
Remember back in 2010 there were reports of a cyber attack that allowed hackers to gain access to online voting system in the District of Columbia. ... Kevin G. Coleman is a long-time securitytechnology executive and former Chief Strategist at Netscape.

Frankenstein programmers at UT Dallas test a cybersecurity monster
Science Codex
But, it could be used in cyber warfare to provide cover for a virus or another type of malware, or malicious software. ... Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science.

Pro-WikiLeaks hackers hit Assange supporter
WALA-TV FOX10
LONDON (AP) — Hackers claiming allegiance to the Anonymous movement of cyber-rebels have defaced the website of a former British cabinet minister in solidarity with WikiLeaks founder Julian Assange. But former Wales and Northern Ireland Secretary ...

Second CRISSP/Sloan Foundation Cyber-Security Lecture on Sep. 7th
By pala
In response to escalating cyber attacks on the nation's security, infrastructure and business, Polytechnic Institute of New York University (NYU-Poly) in alliance with the Alfred P. Sloan Foundation will host a high-level conversation among key government, industry and academic officials. Debora A. Plunkett, who ... He also said that American preparedness for a serious cyber attack on a critical part of U.S. infrastructure warrants “around a three” on a scale of 1 to 10. Following Plunkett's ...
CRISSP

Anonymous Targets Electronics Manufacturer AVX in Cyber Attack ...
Hackers say they have hit the website for electronics manufacturer AVX as part of an an attackcampaign dubbed #OperationGreenRights. According to a post ...
www.securityweek.com/anonymous-targets-electronics-manuf...

Winning Cyber Battles Without Fighting

Winning Cyber Battles Without Fighting
TIME
While the U.S. military is taking cyber warfare seriously, civilian organizations and corporations are lagging behind in readying for the inevitable attacks. In military operations, good ... “The Cyber-readiness Reality Check,” an independent survey ...

TIME

Sacramento author learns the hard way about Facebook impostors - Technology - The Sacramento Bee: "In 2011, a Citrus Heights man was convicted of hacking into hundreds of email accounts of women in 17 states. Using details plucked from the women's Facebook pages, the 23-year-old searched their emails for sexy photos that he posted online. For those who've been victimized, no amount of security precautions seems reassuring enough. "Not only do you feel vulnerable, but you feel like you've put your friends in a vulnerable place," said Panneton, who's in her 50s. Now Facebook-free, Panneton said she's never going back, even if it means she can't easily share photos of her grandchild and that her book sales might suffer. Her only consolation is that her experience might alert others to be cautious about their social media habits. "What this hacking has proven to me, (is that) Facebook is a fun place to be but it's not a safe place.""

Saudi Aramco Restores Network After Shamoon Malware Attack
InformationWeek
Does this mean that the power of the hacktivism has become so strong that it can compete with government cyber warfare organizations?" Cybercriminals are taking aim at your website. Is yoursecurity strategy up to the challenge? Also in the new, all ...

Cyber risk to US electrical grid grows
Poughkeepsie Journal
On July 17, Gregory Wilshusen, director of information security issues for the Government Accountability Office, testified on grid security before the U.S. Senate Committee on Energy and Natural Resources. He testified on a litany of ... A lack of a ...

World's largest oil producer: 30K workstations fell victim to cyber attack
Ars Technica
It's nearly a plot line from the movies: World's largest oil producer gets hit by a cyber-attack that threatens to wipe away all data from its internal computers. But largely, this is the situation Saudi Aramco described today. The Saudi Arabia-based ...

Canada Warns That 'Anonymous' May Attack Energy Companies For Work In Oil ...
Business Insider
The Anonymous press release referred to objections in Montana to using a highway to send heavy equipment to Kearl. “Imperial maintains a high level of security in all aspects of its operations and that includes cyber security,” Rolheiser said. “We take...

Business Insider

Saudi Aramco says most damage from computer attack fixed
Reuters
15 cyber attack, the company announced it had cut off its electronic systems off from the outside world to prevent further attacks. On Sunday, Saudi Aramco said the workstations had now been cleansed of the virus and restored to service. Oil ...

General admits leading cyber attacks in Afghanistan
FederalNewsRadio.com
He says his forces were able to penetrate enemy networks, infect them and defend the military against cyber attacks. He was in charge of international forces in southwestern Afghanistan between 2010 and 2011. While U.S. cyber attack operations have ...

Saudi Aramco says computers normal after cyber attack
FuelFix (blog)
Saudi Arabian Oil Co., the world's largest crude exporter, said most of its computer network is back to normal after it was attacked by a virus that forced the company to isolate many parts of its systems. The state-owned oil company, known as Saudi ...

FuelFix (blog)

Iran forever altered cyber security view
Staunton News Leader
“Dominion is very aware of cyber threats to the grid and takes numerous steps to protect it,” said David Botkins, a spokesman for Dominion Virginia Power. Lewis is decidedly less sanguine about thesecurity of the grid. In fact, he doesn't entirely ...

Canada Says 'Anonymous' May Attack Energy Firm Computers
Businessweek
Canadian security agencies have warned energy companies such as Imperial Oil Ltd. (IMO) their computers may be attacked by the Anonymous hacker group because of the industry's work developing Alberta's oil sands, government documents show. The Royal ...

Saudi oil giant recovers from cyber attack | Al Akhbar English
By Antoun
Saudi oil giant recovers from cyber attack. Published Monday, August 27, 2012. Oil giant Saudi Aramco said on Monday it has restored its main internal network after a cyber attack nearly two weeks ago which failed to impact its oil production.
Al Akhbar English

Saudi Aramco Oil Producer's 30,000 workstations victim of Cyber ...
By noreply@blogger.com (THN Reporter)
The content of This News Saudi Aramco Oil Producer's 30,000 workstations victim of Cyber Attackand Other Information is provided by Various Sources (Emails, Messages, etc..) for Educational Purpose & Security Awareness only. Please ...
The Hacker News [ THN ]

Saudi Oil Giant Aramco Says Things are Fine After Cyber Attack ...
By Steve Ragan
Saudi Arabia-based Aramco was attacked earlier this month by malware that targeted some 30,000 workstations. According to the state-owned group which controls all of Saudi Arabia's oil production, things have been cleaned up in short time ...
SecurityWeek RSS Feed

Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations ...
An anonymous reader writes "Saudi Aramco, the world's biggest oil producer, has resumed operating its main internal computer networks after a virus infected ...
politics.slashdot.org/.../saudi-aramco-reveals-cyber-attack-hit-...

Saudi Aramco repairing damage from computer attack

Saudi Aramco repairing damage from computer attack
Reuters
15 cyber attack, the company was still trying to establish the identity of the attackers, what data had been lost, and whether affected computers could be restored, the sources said. One of Saudi Aramco's websites, www.aramco.com, which was taken ...

General says US cyber warriors active in Afghanistan
Tehran Times
“This is news,” said James Lewis, a cyber-security analyst with the Washington-based Center for Strategic and International Studies. ... spent the past few years debating that policy, asking how and under what circumstances the Pentagon would launch a ...

War, by Cyber means
Deccan Chronicle
When Pakistani groups sent morphed images and videos over mobile phones and social networking sites to incite a riot in Mumbai and panic across the country, they opened a new front in their war on India — the cyber front. ... Pakistan recognises this...

Deccan Chronicle

Cyber-bully scourge
Times LIVE
Cyber bullies' verbal harassment includes stirring up rumours, making insults, issuing threats and sexually offensive remarks, and posting unflattering photos and videos, including images of people being humiliated by bullies. Creecy yesterday said ...

Marine General's admission that the U.S. engages in cyberwar not surprising
Examiner.com
The fact is the U.S. engages in cyber warfare with other nations as well. Most notably Iran. In January 2012, Mike McConnell, the former director of national intelligence at the National Security Agency under President George W. Bush told the Reuters ...

Examiner.com

Experts hope to shield cars from computer viruses
Vancouver Sun
Yet, Ford spokesman Alan Hall said his company had tasked its security engineers with making its Sync in-vehicle communications and entertainment system as resistant as possible to attack. "Ford is taking the threat very seriously and ... Bruce Snell ...

Pro-WikiLeaks hackers hit Assange supporter
The Seattle Times
Pro-WikiLeaks hackers hit Assange supporter. Hackers claiming allegiance to the Anonymousmovement of cyber-rebels have defaced the website of a former British cabinet minister in solidarity with WikiLeaks founder Julian Assange. By RAPHAEL SATTER ...

Military notebook: US disrupts insurgents' circuits
Macon Telegraph (blog)
While Mills didn't go into detail of the nature of cyber operations, a cyber security analyst told the AP it was the first time he had heard a commander so directly acknowledge a cyber attack. Appeals court upholds terrorists' convictions. A federal ...

International Law Reporter: Hathaway et al.: The Law of Cyber-Attack
By Jacob Katz Cogan
Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have suggested that cyber-attacks should be treated as acts ... International cooperation will be essential to a truly effective legal response. New international efforts to regulate cyber-attacks must begin with agreement on the problem — which means agreement on the definition of cyber-attack, cyber-crime, and cyber-warfare.
International Law Reporter

Afghanistan cyber attack: We hacked the enemy with 'great impact,' US general ...
National Post
“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,” Mills said. “I was able to get inside his nets, infect his command-and-control, and in fact defend ...

National Post

afghanistan cyber attack lt gen richard p mills claims to have hacked the ...
Sahara Samay
Afghanistan Cyber Attack: Lt. Gen. Richard P. Mills claims to have hacked the opponents ... But a senior officer making an unusually explicit acknowledgement of the oft-hidden world of electronic warfare is surprising. Marine Lt Gen Richard P Mills ...

Sahara Samay

Pakistan plans bigger cyber attack?
Deccan Chronicle
A highly-classified government report on the recent incident of what has been described as the worstcyber attack on the country has said that it should not be treated as an 'isolated incident' as this exercise was not merely aimed at spreading ...

The Wild West frontier of cyberspace
SecurityInfoWatch (blog)
Just this week, the Department of Homeland Security announced that it was looking into a vulnerability discovered by a researcher in industrial control systems software that could enablecyber criminals to launch attacks against power plants and other ...

Spartak blame Fenerbahçe fans for cyber attack
insideworldfootball (blog)
Spartak blame Fenerbahçe fans for cyber attack. Friday, 24 August 2012. By David ... "The Turkish side have guaranteed our security in the away leg," Spartak's official fan club director Oleg Semenov told Championat. "We will discuss whether to bring ...

IT Security Round Up: BlackBerry Attacks and Fake Android App Stores
CIO (blog)
IT Security Round Up: BlackBerry Attacks and Fake Android App Stores. This week's IT securitynews roundup features stories on more BlackBerry malware, an international crackdown on the sale of pirated Android apps, a possible second attack on Aramco ...

US general: We hacked the enemy in Afghanistan
NorthJersey.com
The U.S. military has been launching cyber attacks against its opponents in Afghanistan, a senior officer said last week, making an unusually explicit acknowledgment of the oft-hidden world of electronic warfare. Marine Lt. ... U.S. defense planners ...

Admits general: US military 'hacked the enemy' in Afghanistan
DAWN.com
WASHINGTON: The US military has been launching cyber attacks against its opponents in Afghanistan, a senior official said last week, making an unusually explicit acknowledgment of the oft-hidden world of electronic warfare. ... planners have spent the ...

DAWN.com

US General: Military Launching Cyber Attacks In Afghanistan « CBS ...
By Matt Higgins
The U.S. military has been launching cyber attacks against its opponents in Afghanistan, a senior officer said last week, making an unusually explicit acknowledgment of the oft-hidden world of electronic warfare. ... U.S. defense planners have spent the past few years wondering aloud about how and under what circumstances the Pentagon would launch a cyber attack against its enemies, but it's only recently become apparent that a sophisticated program of U.S.-backed cyber attacks ...
CBS DC

Is the government dropping the ball on cybersecurity?

Is the government dropping the ball on cybersecurity?
FCW.com
By Amber Corrin; Aug 23, 2012. In any discussion on cybersecurity, there's at least one elephant in the room: The U.S. faces serious threats to national security, and, despite warnings, seems to not be making much progress toward doing something about ...

In wake of mass panic, India blames Pakistan-backed cyber attack
Christian Science Monitor
“There is ongoing cyber warfare on both sides of the border," says Mr. Ahmed. "And this particular incident is an act of terror. It spread fear among people.” According to Abdullah Saad, a cyber security expert based in Islamabad, these terror ...

Christian Science Monitor

Cyber Command boss wants better integration of network warriors
FederalNewsRadio.com
Our intelligence exploitation team is trained and cleared at a different standard, and that can't be shared between folks of different security clearances. And then we have an attack community, and everybody's ... Offensive cyber warriors, for example ...

Kill Timer Found in Shamoon Malware Suggests Possible Connection to Saudi ...
PCWorld
A timer found in the Shamoon cyber-sabotage malware discovered last week matches the exact time and date when a hacktivist group claims to have disabled thousands of computers from the network of Saudi Aramco, the national oil company of Saudi Arabia ...

Smart Grid CyberSecurity: DHS Reports Vulnerability in RuggedCom's Software
Greentech Media
A Senate energy panel heard experts from GAO, FERC and NERC testify to the nation's vulnerability to cyber-attack in a July hearing, though a bill that would have stiffened security regulations failed to pass later that month. In the meantime, there's...

Greentech Media

Kill timer found in Shamoon malware suggests possible connection to Saudi ...
CSO
By Lucian Constantin. August 23, 2012 — IDG News Service — A timer found in the Shamooncyber-sabotage malware discovered last week matches the exact time and date when a hacktivist group claims to have disabled thousands of computers from the ...

Internet expert criticizes Indian cyber blockades
Sacramento Bee
Internet expert criticizes Indian cyber blockades ... Do not attack other users; focus your comments on issues, not individuals. • Stay on topic. Only post comments relevant to the article at hand. • Do not copy and paste outside material into the ...

Murder of Gen's Daughter - Time Now for an All-Embracing Cyber Crime Law
AllAfrica.com
Various interest groups and organisations have shouted themselves hoarse over the need to have a comprehensive, all-embracing cybersecurity law to no effect. To the National Assembly, we do not have to reinvent the wheel. Let's look for the best cyber ...

Digital storm on the horizon
Sydney Morning Herald
That is the internet we will be left with in five to 10 years unless governments and cyber corporations fix the holes that allow criminals to infiltrate the world wide web and strip global citizens of their identity, money and dignity, he believes ...

Sydney Morning Herald

Can Indian Enterprises Tackle Cyber Crime with Legal Remedies?
Computerworld India
Mobile and cloud apps are some of the major targets for cyber crimes. Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says a market research report by RSA, the security division of EMC. Krishna Bhat, Deputy General ...

Computerworld India

An Unknown Hacker Group Claims That It Shut Down the World's ...
By Casey Chan
According to their new Pastebin post below, the hackers plan to launch another cyber attack on Saudi Aramco at 5:00PM on Saturday, saying "be prepared for something you will see in your eyes and you will not be able to stop it." Remember ...
Gizmodo

Kaspersky Lab's Student Competition 'CyberSecurity for the Next ...
Kaspersky Lab's Student Competition 'CyberSecurity for the Next Generation' Kicks Off in North America as Highlight of 9th Annual NYU-Poly CSAW Challenges ...
www.kaspersky.com/.../Kaspersky_Labs_Student_Competition...

Feds looking into potential cyber security exploit at critical infrastructure

Feds looking into potential cyber security exploit at critical infrastructure ...
SecurityInfoWatch
The US government is looking into claims by a cyber-security researcher that flaws in software for specialized networking equipment from Siemens could enable hackers to attack power plants and other critical systems. Justin W. Clarke, an expert in ...

DARPA Seeks 'Plan X' Cyber Warfare Tools
InformationWeek
The Department of Defense is looking to develop new technologies, including hardened operating systems and other platforms, for managing cyber warfare in real time on a large scale. The Defense Advanced Research Projects Agency has scheduled a ...

Langevin Applauds URI Cybersecurity Grant
Patch.com
The funds will allow URI, under the direction of Professor Victor Fay-Wolfe, who heads the Digital Forensics and Cyber Security Center, to create software that better educates and tests students'cybersecurity skills. Langevin, one of Congress' leaders ...

Stringent cyber law in place soon
The Asian Age
Determined to avoid a repeat of the recent cyber attack, the UPA government now plans to put in place a “new stringent national law and institutional mechanisms” dealing exclusively with the contentious issue of misuse of social networking platforms ...

Private sector fights on despite cybersecurity bill's failure
CSO
The Cyber Security Act of 2012 failed last month after a vote to end debate on the matter failed to get the necessary 60 votes. Business and civil liberties groups had both objected -- businesses saying they would be too heavily regulated and the civil ...

NSA Official to Call for Stronger Partnerships, Greater Focus to Enhance US ...
The Herald | HeraldOnline.com
In the second in a series of open lectures sponsored by the Sloan Foundation, Plunkett will emphasize the need to build a robust cyber security workforce and to approach cyber as a team sport – with collaboration among officials from government ...

Girl Scouts of the USA Joins U.S. Department of Homeland Security's ...
Sacramento Bee
22, 2012 -- /PRNewswire-USNewswire/ -- Girl Scouts of the USA (GSUSA) announced today that it has joined a national initiative developed by the U.S. Department of Homeland Security (DHS) to raise awareness about cybersecurity. ... Although the Internet ...

Cyber Security Summit
FederalNewsRadio.com
Cybersecurity confronts the dark side of technological innovation. This one-day summit presented by Government Executive and the National Journal will scan the current landscape and offer reconnaissance on exactly what is being done, and what ...

URI Awarded Cybersecurity Grant | WPRI.com
URI awarded $500000 grant to boost cyber security education among college and high school students.
Top Stories | WPRI.com

US looks into claims of security flaw in Siemens gear

US looks into claims of security flaw in Siemens gear
Reuters
BOSTON (Reuters) - The U.S. government is looking into claims by a cyber security researcher that flaws in software for specialized networking equipment from Siemens could enable hackers to attackpower plants and other critical systems. Justin W ...

Cyber War: Why the Government Can't Keep Us Safe
The Fiscal Times
President Obama is incensed that Congress failed to pass the Cybersecurity Act of 2012 and is once again considering enacting some of the bill's measures through executive order. While the president is right to call cyber threats “one of the most ...

The Fiscal Times

Shamoon Malware Might Be Flame Copycat
InformationWeek
August attack on Saudi energy company likely work of "anti-tyranny" hacktivist group Cutting Sword of Justice, probably a Flame copycat, say security experts. By Mathew J. ... Malware known as Shamoon that targeted multiple energy companies and erased ...

'New world' of cyber threats warning
Christian Science Monitor
'New world' of cyber threats warning. CEO of Kaspersky Labs, a Moscow-based cybersecuritycompany, talks about 'the era of cybersecurity weapons.' About video ads. CEO of Kaspersky Labs, a Moscow-based cybersecurity company, talks about 'the era of ...

Dan Lungren talks cyber security; protesters pack Folsom Town Hall
El Dorado Hills Telegraph
That morning, he outlined his concern about a lack of civility in debates, the need for tighter cyber security, the deficit, his opposition to new or higher taxes and reiterated his support of Paul Ryan as Mitt Romney's choice for a running mate. “I ...

El Dorado Hills Telegraph

Merit Network picks EMU for 1st Michigan Cyber Range
concentratemedia
Merit Network has chosen Eastern Michigan University as its first site for its Michigan Cyber Range, a training platform that will help IT professionals find a cyber attack and nip it in the bud. The Michigan Cyber Range will help prepare cybersecurity ...

Israeli Cyber-War Against Iran Tikun-Olam Tikun Olam-תיקון עולם
By Richard Silverstein
... I published last week outlines in a sales pitch describing Israel's putative attack on Iran. It would begin with a massive cyber-attack: “The Israeli attack will open with a coordinated strike, including an unprecedented cyber-attack. ... Richard Stiennon, a Forbes technology writer who specializes incyber-security, wrote a short piece for the magazine that discussed the cyber-warfare elements of the plan. Unlike those Israelis planning this strike, Stiennon is worried about the unforeseen ...
Tikun Olam-תיקון עולם

CISPA – It Needs to be Global « Speaking of Security – The RSA ...
By Rashmi Knowles
The stated aim of the bill is to help the U.S government investigate cyber threats and ensure thesecurity of networks against cyber attack. CISPA would “waive every single privacy law ever enacted in the name of cyber security,” Rep.
Speaking of Security - The RSA...

No partisan fight over cybersecurity bill, GOP senator says ...
Computerworld - A senior Republican senator on Thursday insisted there is no partisan dissent over the need for a strong national cybersecurity policy but ...
www.computerworld.com/.../No_partisan_fight_over_cyberse...

Cyber spying and cyber attacks in Middle East

More telltale signs of cyber spying and cyber attacks arise in Middle East
Christian Science Monitor
... comes from the same 'factory' or 'factories,' ” states the Kaspersky analysis. "All these attack toolkits represent the high end of nation-state sponsored cyber-espionage and cyberwar operations, pretty much defining the meaning of 'sophisticated...

Christian Science Monitor

Security Firms Work to Protect Cars From Cyber Attacks
PC Magazine
Reuters reported Monday that Intel Corp's McAfee unit, best known for PC-virus-killing software, is just one of the various companies looking for a way to protect vehicles' communications systems from an attack. Despite positive technological advances ...

India caught in crossfire of global cyber war
Times of India
Compared to it, the older generation of viruses and trojans (malicious computer programmes) seem like crude bombs, says Shantanu Ghosh, MD, Symantec, a cyber security firm. It is capable of wrecking ... This attack was followed by Duqu, a virus caught ...

Most cyber attacks fly under our radar: Aussie spy chief
ZDNet
Irvine, who is the director-general of the Australian Security Intelligence Organisation (ASIO), said that many cyber attacks were going undetected by local security agencies. "I would be very surprised if we, who are active in this area, are picking ...

India blames Pakistan for "cyber jihad" designed to spark ethnic strife
Telegraph.co.uk
Indian officials have identified a number of Pakistan and Bangladesh-based terrorist groups, including the Harkat ul Jihad al Islami (HuJI) and Jamiat-e-Islami, it believes were involved in launching a "cyber-attack" on the country. Pakistan's interior ...

Telegraph.co.uk

Fort Meade: Cyber Guard exercise builds relationships in nation's defense
CapitalGazette.com
To examine just such a scenario, the U.S. Cyber Command recently conducted its first ever exercise planned in collaboration with cyber subject matter experts from across the NationalSecurity Agency, the National Guard, the Department of Homeland ...

Cyber terror: Was India unprepared?
NDTV
Published on Aug 21, 2012 by ndtv. Left Right And Centre: As the government shuts down more websites for offensive content and says sites based in Pakistan fanned the recent rumours here in India, we're asking whether India is unprepared for cyber war.

Congress can't improve cybersecurity alone
Politico
With the Senate failing to advance the Cybersecurity Act of 2012 (S.3414) to a full vote earlier this month, we must take this opportunity to engage in an honest dialogue about the risks that exist to our nation's critical and cyber infrastructure. In ...

Politico

China preparing for cyber attack against India
Zee News
New Delhi: China could carry out a cyber attack against India with the help of computer hardware and spare parts, according to a report by intelligence agencies. The agencies further believe that China would become an expert in such stealth attacks by...

Zee News

Israeli Operations Against Iran Will Begin with Cyber Attack
"US blogger Richard Silverstein says Israeli source leaked attack plan Bibi, Barak pitching to ministers. According to document, campaign will open with ...
www.infosecisland.com/.../22225-Israeli-Operations-Against-I...

Cyber attack using PDFs targets industries

Cyber attack using PDFs targets industries
Government Security News
A new kind of targeted Cyber attack against defense, chemical, technology industries is slipping into networks under the guise of PDF files, said Cyber security experts. FireEye MalwareIntelligence Lab and Kaspersky Labs noted on Aug. 15 that the new ...

Cyber wars: US, Israel raiders of the virtual world
Times of India
Cyber security firms like Kaspersky believe Stuxnet is the work of a nation. The likely suspects ...He asked the US Senate to pass the Cybersecurity Act of 2012 which will help the US acquire better offensive and defensive cyber warfare capabilities ...

“Legendary Female Cyber Cop,” Gao Yuan (高 媛)
Wired (blog)
“The Chinese press has recently introduced two new model workers active in cybersecurity: Li Congna (李聪娜) of the PLA, and the “Legendary Female Cyber Cop,” Gao Yuan (高 媛) of the Beijing Public Security Bureau's Cybersecurity Defense Division. The ...

Many cyber attacks go undetected: ASIO
The Australian
Mr Irvine, who is the director-general of the Australian Security Intelligence Organisation (ASIO), said many cyber attacks were going undetected by local security agencies. His comments come a week after $25 million was stolen from Australian credit ...

Hacker attack on your car's computer could be lethal: experts
Globe and Mail
Bruce Snell, a McAfee executive who oversees his company's research on car securityat the Beaverton, Oregon garage, said automakers are fairly concerned about the potential cyber attacks because of the frightening repercussions. “If your laptop ...

Globe and Mail

General Dynamics' deal bolsters cyber chops
Washington Technology
Fidelis Security Systems has locations in Waltham, Mass. and Bethesda, Md., and employs around 70 people in its two locations. It will become part of the Cyber Systems Division of General Dynamics Advanced Information Systems, which is based in Fairfax ...

More than a thousand children's details displayed online following cyber attack
SC Magazine UK
Read More >>. The Information Commissioner's Office (ICO) has said it is opening an investigation into a cyber attack that led to the online publication of 1367 children's details. According to the Telegraph, sensitive information on children ...

Cyber insurance still not being used by most North American companies
Live Insurance News
... conducted by Chubb Insurance have been released, and they are showing that over 70 percent of North American businesses have created an incident response plan in order to deal with a security breach, and yet among them, 57 percent have not made...

Live Insurance News

Automakers not doing enough to protect cars against cyber attacks, experts say
FederalNewsRadio.com
Security experts say automakers have not done a good job protecting the sophisticated electronic parts on modern cars from cyber crime. They say hackers ... Reuters reported cybersecurity firms are hard at work investigating the electronic bugs in ...

Multi-State ISAC Holds Annual Meeting for Nation's State and Local Governments
Virtual-Strategy Magazine
MS-ISAC members from 45 states, 3 U.S. territories and dozens of local governments meet to share ideas and identify solutions to address Advanced Persistent Threat and other cyber securitychallenges. ... 24 Cyber Security Operations Center, through ...

Internet Users Warned To NOT Pay Fines To File-Sharing Fraudsters

Police Warn Internet Users Not To Pay Fines To File-Sharing Fraudsters | TorrentFreak: "Police in Sweden are warning Internet users not to send money to criminals trying to extort money from alleged file-sharers. The sophisticated scam began when unsuspecting cell phone users browsed an infected website which somehow extracted information from their devices. This was followed up by a mailed allegation of copyright infringement and a cash demand for between 90 and 195 euros to be paid into a foreign bank account. Swedish Antipiratbyran say the scheme is nothing to do with them. . . . "

German officials reopen inquiry into Facebook facial recognition - latimes.com: ""Facebook's practices of collecting and using the facial characteristics of their users without opt-in permission should be challenged, as the German privacy authority has done," said Jeffrey Chester, executive director of the Center for Digital Democracy. "Why should Facebook users be forced to provide the social network with free rein over their most personal information, their physical being?""

NE Attack Rumors Traced to Pakistan; Cyber War Against India: Home Secretary
IBTimes India
He said that Pakistan's hand in circulating the inflammatory material is seen as acyber attack against India. "Pakistan is trying to create trouble by inciting people... This exposes its attempt at cyber warfare against India," he said according to ...

IBTimes India

Why Israel's Attack On Iran Will Cause Collateral Damage
The Droid Guy
According to blogger Richard Silvestein, he received a document that shows Israel's first move against Iran in the event that it attacks is cyber warfare. The plan looks sophisticated and will be the first of its kind. The plan calls for attacks ...

The Droid Guy

World's Largest Oil Company 'Saudi Aramco' Hit By Cyber-Attack
Social Barrel
A hacker group has breached the security of Saudi Aramco, the world's largest oil company. The cyber-attack, allegedly by Arab hackers, separated infected company workstations from production systems. According to Saudi Aramco's Facebook page,...

Social Barrel

Computer-security camp hopes young programmers will click
Asahi Shimbun
"Last year saw many cyber-attacks on companies and government offices. It made people take notice," said Michio Sonoda, one of the lecturers at Security Camp 2012. Sonoda is an associate professor of network security at Cyber University, set up by ...

Unfinished business
Toledo Blade
The cyber-security legislation would respond to a serious potential danger. The bill's objective is to reduce the vulnerability of the nation's power grids, dams, and transportation infrastructure to a computer-based attack. Unfortunately, the proposal ...

National Science Foundation Grants to Improve Cyber Security,Create Jobs ...
PoliticalNews.me (press release)
As chairwoman of the Appropriations subcommittee that funds the NSF, Senator Mikulski puts these funds in the federal checkbook to support on-going cybersecurity education training to develop the next-generation of cyber-warriors. "Education is the ...

London 2012 authorities got cyber-attack warning on eve of Games ...
The security services warned the Olympic authorities about a potential cyber- attack on their power supply days before the Games opening ceremony, the ...
www.guardian.co.uk/.../london-2012-cyber-attack-warning?...

ONLINE SAFETY: Create a cyber security plan for your business
Heritage Newspapers
Recently, the Business Week article "The Cost of Cyber Crime" estimated the cost ofcyber crime and cyber defense. The cyber defense numbers reference the money it costs for business to recover from an attack. ... There are many resources available ...

Heritage Newspapers

Why There Could Be Collateral Damage From An Israeli First Strike On Iran
Forbes
First cyber. From Silverstein's translation of the document: “The Israeli attack will open with a coordinated strike, including an unprecedented cyber-attack which will totally paralyze the Iranian regime and its ability to know what is happening ...

A Sinister New Breed of Malware is Growing
PCWorld (blog)
Stuxnet, Duqu, Flame, and even Gauss are believed to be sophisticated, state-sponsored malwaredeveloped for the purpose of cyber espionage against specific targets. Shamoon—the latest of the new breed of malware—is thought to be a copycat attack ...

'Indian Cyber Army' hacks Pak websites
Deccan Chronicle
This was in retaliation for a recent attack on five Indian sites by Pakistan Cyber Army, a group of young techies. The cyber war has since been a feature on national days of both nations, say experts. A Pakistan Cyber Army affiliate hacked into Mumbai ...

Deccan Chronicle

Baltimore-area colleges win $4.7M in cyber security grants
Bizjournals.com
Harford Community College will receive $74000 to put toward its work with the RegionalCybersecurity Education Initiative. HCC, University of Delaware and Delaware Technical and Community College formed the education initiative with industry partners ...

'Hate crime' memes attack staff, students
The Daily Post
Mr Walsh said the initiative was in response to cyber-bullying and pages on Facebook, including meme pages, which attacked students and teachers at the school. Mr Walsh, who is also the New Zealand Secondary Schools Principals' Association president, ...
CEO of Group-IB: Hackers Join Traditional Organized Crime Groups
RIA Novosti
If they get hold of a copy of an insecure digital signature, a criminal can launch an attack from anywhere. To counter this threat, banks are introducing 'security tokens.' It is almost impossible to retrieve a digital signature from these tokens ...

Revised Cyber Security Act 2012
JD Supra (press release)
Congress has been struggling with cyber security issues for several years, most recently in connection with the Cybersecurity Act of 2012 (CSA2012). CSA2012 is an attempt to protect the nation's critical infrastructure from cybersecurity risks. The ...

Cybersecurity, and insecurity, vexes nations
Minneapolis Star Tribune
Yet both those international institutions seem just as concerned about cyber-insecurity, or how repressive regimes react to the Internet. Specifically, do human rights apply in the digital space? More than 80 countries cosponsoring a United Nations ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com