How FBI technology woes let Fort Hood shooter slip by

How FBI technology woes let Fort Hood shooter slip by | Ars Technica: "On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding 29 others. US Army Major Nidal Malik Hasan, the American-born son of two Palestinian immigrants, reportedly shouted “Allahu Akbar!”—“God is great!”—before launching his 10-minute shooting rampage at the Soldier Readiness Center. The shooting—the worst ever on an American military base—occurred as Hasan was facing imminent deployment to Afghanistan. A civilian police officer shot Hasan and placed him under arrest."

With cyber attack threat rising, Senate bickers over cyber security
St. Louis Beacon
WASHINGTON – A train carrying toxic chemicals derails near St. Louis, emitting deadly fumes. Water treatment plants in Illinois suddenly lose power and shut down, leading to a shortage of clean drinking water. A credit-card processing center is hacked and ...

How much cyber security is enough? Companies wary as Senate weighs bill
MinnPost.com
"We are going to try carrots instead of sticks as we begin to improve our cyber defenses," Lieberman said in a statement. "This compromise bill will depend on incentives rather than mandatory regulations to improve America's cybersecurity. If that doesn't work, ...

Revised Cybersecurity Act of 2012 Again Goes Before US Senate
eWeek
A reworked version of a proposed and controversial federal cyber security law is again going before the U.S. Senate, but this time, the so-called Cybersecurity Act of 2012 might have enough changes and comprises to make it more palatable for all sides.

Ubisoft Patches Browser Plugin that Left Game-Players Open to Cyber-Attack
eWeek
Videogame maker Ubisoft Entertainment says it has patched a security vulnerability uncovered in a plugin used by players that could have potentially exposed them to malware. The issue apparently lies in the browser plugin installed by Uplay, the digital ...

Cyber Attack a National Threat
Emergency Management (blog)
Evidently the risks of a cyberattack have captured his personal attention to the potential for what could happen should someone choose to use cyber weapons versus more conventional types to bring destruction to the American Homeland. What I garnered ...

Cyber Security Firm Bit9 Raises $34.5M From Sequoia, Other VCs
Forbes
The company bills itself as the next-generation solution to advanced persistent threats (or APTs incyber-security speak) like Flame, a recent example of state-backed malware, also known as acyber-attack toolkit, that surreptitiously collected private data from ...

Targeted Cyber Attacks Against Small Biz: Chat Recap
Business Insider
Q1: How likely is it that a small business will face a malicious cyber attack? 36% of all cyberattacks target ... @SymantecSMB; 61 percent don't even have a written plan, according to @Symantec – so, do that first to have a security process. - @TJMcCue; In the ...

Senate contemplates cyber security bill
Human Events
The Senate is getting ready to vote on the Cybersecurity Act of 2012, which is considerably less ham-fisted that some previous efforts at online security legislation, as it primarily offers incentives for private industries to cooperate in voluntary partnerships with the ... As always when dealing with matters of online security, it is necessary to share information to effectively combat online threats – this is warfare conducted on a battlefield constructed of data – but improving access to data carries the risk of threatening ...

4 initiatives for a stronger cybersecurity bill
Human Events
... a cyber-induced “Pearl Harbor” is already available. U.S. Army General Keith Alexander, director of both the National Security Agency and the Pentagon's CyberCommand, said when the destructive cyber attack comes, “you lose” and the most difficult part of the problem is not knowing “who is attacking your systems. ... array ofcyber-based threats. Those threats include criminal groups, terrorists, foreign nations engaged in espionage and information warfare like China, and political activists. Theirattack techniques ...

Human Events

CSA 2012 Could Still Open Channel Doors
Channelnomics (blog)
And although the revised bill is bereft of enforcement that would ensure a swift uptick of channel business, the legislation, if passed, holds the potential to create new streams of business for government and security focused channel partners stemming from provisions, incentives and heightened security ... At its core, the revised Cybersecurity Act of 2012 (CSA 2012) calls for the creation of a council in order to bolster defenses and harden critical infrastructure in the event of a terrorist or other related cyber attack.

Feinstein Speaks on Cybersecurity Legislation
PoliticalNews.me (press release)
(Keep in mind that these 50000 incidents were the ones reported to the Department of HomelandSecurity, so they represent only a small fraction of cyber attacks carried out against the United States.) In December 2011 press reports revealed that networks of ...

Cyber Attack Shuts Down Antigay Website
Advocate.com
As the battle for marriage equality in New Zealand heats up, anonymous hackers brought down a new website devoted to denying equality. The "Protect Marriage" website, sponsored by a group called Family First, was unavailable after only a few hours of ...

Advocate.com

Cyber-Spy Malware Eavesdrops on Corporate, Government Targets Worldwide
eWeek
A study of cyber-espionage activities shows that more than 200 unique families of malware have been used to eavesdrop on corporate and government employees, including attacks on the Japanese government. ... Most of the activity traces back to China, but some spying does not, including espionage carried out by a private security company that advertised “ethical” hacking courses, according to Joe Stewart, director of malware research at managed security provider Dell Secureworks, which carried out the ...

UK remains oblivious to Olympic cyber scams
ZDNet (blog)
A new report released by McAfee suggests the UK's public may be too complacent in terms ofcybersecurity during the games this summer. Caught in the throes of male ... Speaking at the recent Lord Mayor's Annual Defence and Security Lecture, head of MI5 Jonathan Evans sadsecurity preparations were "well underway", but an "astonishing" number of cyber attacks is a threat to sporting spectators. However, not all hope is lost. ... it more appealing for business · Stuxnet has put us all on the front line of warfare 2.0 ...

Iran Warns to Give Crushing Response to US Cyber Attacks
Fars News Agency
"If the Americans' futile cyber attacks do not stop, it will face a teeth-breaking response," the Iranian students news agency quoted an unnamed cyber securityofficial as saying. He gave no further details. Last month, Iran said it had detected plans by the ...

Fars News Agency

Which Defense Companies Will Help the US Win the Cyber War?
Minyanville.com
MINYANVILLE ORIGINAL At last week's Aspen Security Forum, General Keith B. Alexander, head of the National Security Agency and the United States Cyber Command, spoke of a 17-fold increase in cyber attacks against American infrastructure between 2009 ... when, at the 2011 RSA Conference -- an annual expo hosted by RSA Security, a division of the EMC Corporation (EMC) -- Deputy Defense Secretary William Lynn III said the DoD now recognized cyberspace as “a new and official warfare domain,” joining ...

OVERNIGHT TECH: Senate negotiating which cybersecurity amendments will ...
The Hill (blog)
Keith Alexander, who wears the dual hat as head of U.S. Cyber Command and director of the National Security Agency, in the Capitol to discuss cybersecurity. Participants in the meeting included the co-sponsors of the Cybersecurity Act and SECURE IT ...

Don't Wait For Cyber 'Pearl Harbor': Russia & China Are Stealing Our Lunch Now
AOL Defense
"Don't wait for something to go boom. It's happening and it's happening quietly right now," said David Smith, director of the Potomac Institute's Cyber Security Center, in an interview with AOL Defense. "I don't think they're nibbling around the edges; I think the ...

Exploding The Myth Of The 'Ethical Hacker'
Forbes
Fretful members of U.S. Senate are preparing to debate the Cybersecurity Act of 2012, potentially making it easier for corporations to share data about their users with the authorities. But who are they scared of? In the current lexicon of the cyber security ...

Cybersecurity Act Needs One Big Change To Please Privacy Advocates
Forbes
Fear of cyberattacks is the driving force behind the Cybersecurity Act of 2012, a Senate bill likely to be voted on this week that would make it easier for businesses to share information about cyber threats with authorities. And the businesses that really matter ...

Forbes

Cybersecurity Legislation: Questions That Need to Be Answered
Heritage.org
Almost every report suggests that the government is short hundreds if not thousands of trained cyberspecialists, as most qualified individuals take more lucrative jobs. The government is also facing its own serious cybersecurity challenges. Where will the ...

Lawmakers find ways to avoid another TSP cyber breach
FederalNewsRadio.com
Remember the recent cyber attack on more than 100000 Thrift Savings Plan participants? It's been out of the headlines ... The Homeland Security Department's Chief Privacy Officer Mary Ellen Callahan also is scheduled to testify. This story is part of Federal ...

Cyber defense officials not planning for sequestration
FierceGovernmentIT
Until the Defense Department provides specific guidance on preparing for sequestration, cybercomponents are not planning for cuts; however cuts would have a major impact on cyber defense, said officials. "It would be devastating," said Maj. Gen. Suzanne ...

Enough with the Distractions … It's Time for Consensus-Oriented Cybersecurity ...
MFRTech (press release)
The Chamber's letter states that under the framework senators envision, S. 3414 would eliminate the ability of noncivilian entities, such as the Department of Defense and the National Security Agency, to receive cybersecurity information directly from the private sector. Interestingly, Sen. Al Franken apparently ... The trouble with S. 3414 is that its authors propose a hub-and-spoke model for information sharing that would potentially exclude noncivilian federal entities, such as CyberCommand. Sections 703(a)(1) and ...

Rockefeller 'Baffled' By Chamber Opposition to Cybersecurity Bill
Multichannel News
First, public policy should help businesses battle sophisticated cyber threats," says Chamber spokesman Bobby Maldonado. "One immediate way to do this is through passing information-sharing legislation, such as SECURE IT and CISPA, which clearly ...

Dell Resource Center Adds To Security Cache
Channelnomics
Coincidentally, the launch comes amid a rejuvenated focus on sophisticated cyber threats this week, as the proposed Cybersecurity Act of 2012 is slated for a Senate vote within the next few days. Included in the list of available resources are threat analysis, ...

County Association Unveils Cybersecurity Initiative
GovInfoSecurity.com
Connect county government with Department of Homeland Security products and resources such as cyber exercises, evaluations and IT risk assessments. Provide information to association steering committees on pending cybersecuritylegislation.

GovInfoSecurity.com

Mission Improbable: How the NSA Recruits Hackers
The Atlantic Wire
The National Security Agency is desperate to hire new hacking talent to protect the nation's critical infrastructure, but its reputation for spying on Americans has damaged its reputation among cyber sleuths. To fix that, the cryptologic intelligence agency is...

The Atlantic Wire

Targeted Cyber Attacks Against Small Biz: Chat Recap
By Anita Campbell
The topic was “Targeted Cyber Attacks, No Longer a Big Biz Problem” and we were fortunate to have two world-class security experts from Symantec join us: ... Q1: How likely is it that a small business will face a malicious cyber attack?
Small Business News, Tips, Advice...

US must develop Olympic-level cybersecurity experts - blog*spot
By Mid-Pacific ICT Center
In response to serious national security concerns, the United States established a Cyber Command in 2009. Still, experts worry that not enough is being done. Quite simply, if a Cybersecurity Olympics were held today, the United States would ...
Mid-Pacific ICT Center

Interview with Manimaran Govindarasu, Chair of Cyber Security ...
By Derek
In this interview, Manimaran Govindarasu discusses the importance of cybersecurity in today's utility business environment. He also discusses policy and technical innovations needed in the industry to help utilities best protect the security of their Smart Grids. via Interview with Manimaran Govindarasu - IEEE Smart Grid.
NTS Smart Grid Blog

Awesome Wingsuit Video!! Bruce Lee Voiceover, this video is full of ...
By CharlieMurphy
Narcotics, Violence, Suicide attack, its like they waged Jihad on Home grown Cyber terror. Botnet says it will ... as a Brown out. Life has been Cancelled, Infrastructure security (especially BART, AMTRAK, and MARTA) is at risk to Gang Bust.
Godlike Productions - New Threads

Romney's tax audit, Aurora and risk, inside the IRS | Stories I'd like to ...
By Steven Brill
That seems to be how the business lobby succeeded in beating back new regulations recommended by security officials following 9/11 in areas ranging from the storage and shipment of dangerous chemicals to cyber-security. But imagine the ... Similarly, imagine the handwringing and recriminations the morning after some deadly chemicals went missing or got blown up in transit, or acyber attack crippled our air traffic control system or our power grids. What does this have to do with...
Stories I'd like to see

New Bill Threatens to EFFECTIVELY BAN ONLINE SALES OF ...
By Paul Martin
... an international arms treaty that would regulate global arms sales and ownership, and Congressional members just days ago attempting to sneak a nationwide restriction on “high capacity magazines” into a cyber security bill, the attack on ...
RevolutionRadio.org

Rakshasa, is it possible design the perfect ... - Security Affairs
By paganinip
syn-rakshasa. Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios.
Security Affairs

Cyber investigators expose details of 'vast hacking industry in China ...
By Jorge Benitez
Observed for years by U.S. intelligence, which dubbed it Byzantine Candor, the team of hackers also is known in security circles as the Comment group for its trademark of infiltrating computers using hidden webpage computer code known as ... The minute-by-minute accounts spin a never-before told story of the workaday routines and relentless onslaught of a group so successful that a cyber unit within the Air Force's Office of Special Investigations in San Antonio is dedicated to ...
Atlantic Council - Renewing the...

Phisher Use Olympic Lottery Scams For Summer Games | Robert ...
By Robert Siciliano
The sophisticated cyber attack was reported to be the lowly unsophisticated phishing email.Phishing is emerging as; 75 Million Unique Malware Samples By 2012. Imagine your body being targeted by 75 million viruses. That is exactly what's ...
Robert Siciliano

Leahy Computer Fraud Abuse Amendment to the Cybersecurity
By Paul Rosenzweig
Senator Leahy has an proposed Cybercrime Amendment to S3414 that would, effectively, substantially enhance penalties for cyber crime and impose mandatory minimum sentences. There are plenty of reasons to be skeptical of this — but the ...
Lawfare

How do you solve a problem like Maria? Delivering cyber security ...
By Chris Hails (NetSafe)
What better way surely to hit internet safety and security gold than talk to non-Jafa's with first hand concerns, real New Zealanders who might not have been touched by our first national Cyber SecurityAwareness Week back in June. A REAP ...
NetSafe Blog
The cybersecurity imperative - NY Daily News
America is frighteningly vulnerable to cyberattack: electrical grids, water supplies, and computer and cell phone networks can all be corrupted, or outright ...
www.nydailynews.com/.../cybersecurity-imperative-article-1.1...

Key Vote Alert: “NO” on the Cybersecurity Act of 2012
This week, the Senate could vote on the Cybersecurity Act of 2012 (S.3414), which would institute a massive regulatory regime for the internet, under the guise ...
heritageaction.com/.../key-vote-alert-no-cybersecurity-act-201...

PressTV - UK admits to cyber attack on Iran
In its annual report for 2011-2012 to the British parliament, the ISC claimed that Britain's spies have caused disruption to Iran' nuclear capabilities saying UK ...
www.presstv.ir/detail/251692.html

Cybersecurity compromise: Responsible move or political cover ...
In showing flexibility on their demands for cybersecurity standards for the private sector, the White House and Senate sponsors of broad cybersecurity legislation ...
www.nextgov.com/cybersecurity/2012/07/...or.../56922/

General: U.S. not ready for cyber attack - YouTube
At the Aspen Security Forum, Gen. Keith Alexander gave the United States'cybersecurity ...
www.youtube.com/watch?v=xddTGiiM084

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com