White hats publish DDoS hijacking manual, turn tables on attackers

White hats publish DDoS hijacking manual, turn tables on attackers
Ars Technica
"The authors of this malware overlooked security for critical portions of its toolkits," the Prolexic researchers wrote in the report, which can be downloaded here, after completing the Web form at the right side of the page. "The weakest link within ...

Iran threatens to counter cyber warfare with legal action
Iran's Communications, Information and Technology Minister Reza Taqipour reported in July that his country had “successfully contended with sophisticated spyware and foiled a cyber attack against state facilities.” Taqipour said that two types of ...


WikiLeaks back online after cyber attack
Financial Times
Internet security experts have questioned, however, if AntiLeaks is what it says it is. “What we do need to question is whether a government body had any involvement in the attack as the hackers who carried it out had to have been very well resourced ...

Cyber-attack risks examined by Rory Cellan-Jones
BBC News
Technology correspondent Rory Cellan-Jones looks at the security of the internet, the risks of cyber attacks, and how a technology writer had his accounts hacked. He explained that in an era where web users put more and more of their lives online, "we ...

BBC News

Talk of Military Attack May Be Cover for Cyber War on Iran
Arutz Sheva
Defense/Security 2:11 AM 8/15/2012. Dempsey, Panetta Play ... Journalists are scratching their heads to figure out why Israeli and American leaders are leading a daily chatter of a military attack on Iran, but the flow of words may be a ruse to give ...

Arutz Sheva

Imperva CEO: Companies Are Getting It Wrong On Cybersecurity
Companies tend to react to cyber attacks rather than prepare for them, and malicious hackers meanwhile learn new tricks to circumvent the gates. “There is a dislocation,” says Shlomo Kramer, the chief executive of IT security firm Imperva and a 25-year ...


A Perilous Cyber World: Guarding Personal Information from Hackers and Thieves
At least have a few tiers of security in the passwords you're remembering. Use like a single easy-to-remember password for stuff you're only going to sign up for once, another one for something more secure like email, and something really hard for your ...

Lack of Cyber Career Paths and Training Standards Stymies Security
Cole said that while some attempts by the government -- such as Defense Department directive 8570, which provides guidance and procedures for training and certifying cyber workers -- are positive starts, what is really needed is more detail. “We need ...

Wikileaks back up after cyber attack
The Nation
Wikileaks back up after cyber attack. August 15, 2012 |. Tweet · Share. Wikileaks back ... Wikileaks Press, a Wikileaks-endorsed website that publishes news about the organisation, noted that the attack had started shortly after emails were leaked ...

The Nation

US, China Talks Address Cyber-Weapons, Not Cyber-Spying
The groups agreed that restricting the use of attack programs in cyber-space—a.k.a., "cyber-weapons"—and cooperating more fully to secure cyber-space were both in their nations' interests, but acknowledged that there were significant hurdles to ...

Security vendor exposes vulnerabilities in DDoS rootkit
While such vulnerability disclosures involving malware products are likely to be welcomed by many in the security community, the legality of enterprises using the information to actually launch a counter attack against hackers remains an open question ...

Public sector most targeted by cyber attacks: report
FutureGov Magazine
Email Security for Enterprises & Governments. SecureEmail ... 15 August 2012. The number ofcyber-attacks has increased by three times on average compared to the same period from the last half of 2011, and the public sector remained the most targeted ...

WikiLeaks back online after cyber attack
Zee News
WikiLeaks back online after cyber attack London: Secret-spilling group WikiLeaks is back online after it was hit by a cyber attack due to which its website was inaccessible for more than a week. WikiLeaks said it was flooded with ten gigabits per...

Zee News

Cybersecurity Becoming No. 1 Concern for GCs and Directors
The National Law Journal
It was a highly personal loss, though one writ large against the forces confronting just about every plugged-in person and company: the increasing frequency of cyberattacks, weaknesses in data security policies and practices at major corporations, and ...

The National Law Journal

DDoS attacks on the rise in Latin America
This type of cyber attack, called Distributed Denial of Service (DDoS), seeks to take out a particular resource, generally a web server, by sending so many files it causes the overloaded machine to crash. A DDoS attack ... Latin America registered an ...


Kaspersky appeals for crypto help to crack Gauss malware
Kaspersky Lab has appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware. "We are asking anyone interested in cryptology and mathematics to join us ...

Business Wire
Virtual-Strategy Magazine
For the ACT contract, CACI will help achieve AFRL's vision of cyber superiority by rapidly researching, developing, designing, testing, and installing a range of cyber technologies to protect information assets that are essential to national security ...

Cyber Attacks on Small and Medium-Sized Businesses Often Pay Off
Credit Union Times
The report said that in 73% of the cases the money was gone before the attack was noticed. Seventy-two percent indicated they hold the financial institution primarily accountable for ensuring online security, and only 43% said their financial ...

A Cyber "Warhead" With an Unknown Target
Technology Review
That's the term used by researchers at Kaspersky, the computer security firm that described Gauss last week, for a part of the malware programmed to decrypt only when it lands on exactly the right computer system. What Godel does under those conditions ...

Tuesday cyber surfing: Sweezy stands out; Flynn, Wilson make strides
Seahawks.com (blog)
Tuesday cyber surfing: Sweezy stands out; Flynn, Wilson make strides. Good morning, and here's what's “out ... will be an upgrade over Jackson. And on a team with a defense and rushing attackalready in place, that factor should mean divisional ...

Cybersecurity Is Top of Mind for General Counsel and Co. Directors
ABA Journal
Cybersecurity Is Top of Mind for General Counsel and Co. Directors. Posted Aug 15, 2012 5:07 AM CDT By Molly McDonough · Email; Print; Reprints · Share. For the first time in 12 years of surveying general counsel and corporate directors of public ...

laws target cyber-bullying
What we needed, because we've tried the educative approach - and are quite happy to continue that - is to see cyber-bullying as akin to a hate crime and to take strong measures against those who persistently engage in it." Ad Feedback. Justice Minister...


Welcome to the “Global Center for Cybersecurity”
Signal Magazine
Maryland is home to key cybersecurity agencies, such as the United States Cyber Command and the National Security Agency, and the Baltimore Convention Center provides a fitting venue for the nearly 4000 attendees of the TechNet Land Forces East ...

Risk of smart grid security breaches higher than ever
Fierce Smart Grid
August 15, 2012 | By Travis Mitchell. Share. Email LinkedIn. Tools. Comment; Print · Contact Author · Reprint. It's no secret that cyber security is an integral part of the smart grid, but utilities and regulators are continuing to grapple with the ...

Gee... Who Would Have The Computing Power To Do THIS ???
Democratic Underground
The cyber attack that has taken the WikiLeaks website offline for more than a week is a massive example of a distributed denial-of-service attack, which bombards a website with requests in order to render it unavailable. The attack, claimed by a group ...

Upstarts Gaining on Big Cybersecurity Firms: Analyst
CNBC.com (blog)
"The bigger companies in the space are having difficulty keeping up with the pace of change." Technology security has to evolve as cyber criminals' methods of attacking evolves, and it is often hard for larger companies to adapt to new cyber threats ...

CNBC.com (blog)

The week in security: Bank security faces Olympic-sized challenges
CSO Magazine
An upgrade of Australia's payment-card security has delivered mixed results, while securityexecutives were warning that mobile apps have become a major new attack vector for cybercriminals. Growing security fears amongst users are destroying user ...

Pentagon wants an interactive training program to replay cyberattack scenarios
The department is seeking ideas on technology that can replay attack scenarios and conduct “cyberexercises,” so analysts can get a more sophisticated sense of ways attackers exploit system vulnerabilities, contract databases show. The technology is an ...

Kratos Defense & Security Solutions' CEO Presents at Jefferies 2012 Global ...
Seeking Alpha
But the 50% of services that we do, we are working on products, we are working on cyber situation awareness products, we are working ISR, intelligence surveillance reconnaissance platforms, a piece of our business that's traditional government services ...

Israel 'prepared for 30-day war with Iran'
BBC News
... attack plans. Richard Silverstein told the BBC he had been given an internal briefing memo for Israel's eight-member security cabinet, which outlined what the Israeli military would do to prevent Iran developing nuclear weapons. Continue reading ...

BBC News

Kaspersky Wants Help Decrypting Gauss Malware
PC Magazine
Think you have what it takes to crack some malware? Kaspersky Lab wants your help. Thesecurity firm last week uncovered Gauss, a cyber threat targeting users in the Middle East that is intended to steal personal details, like banking information ...

A New Spin on the “Olympic Games”
There is a new face of the 21st century, cyber warfare. Beginning in June 2010, ... The worm consists of a layered attack against three different systems; Siemens PCS 7, WINCC, and Step 7. The current ... Infographic by Veracode Application Security ...

Anonymizer tied to company selling TrapWire surveillance to governments
Network World (blog)
Back when Aaron Barr was hacked, revealing that Bank of America was using three intelligence firms to attack WikiLeaks, there was other HBGary Federal news of developing software to make an army of fake social media friends to promote propaganda ...

Senator pushes for cybersecurity via executive order
Federal Times (blog)
A top Democratic senator is calling on the president to use executive branch authorities to better secure critical systems against cyber attacks. In a letter to President ... from the cyber threat.” Rockefeller co-sponsored the Cybersecurity Act, S ...

DOD planning new presidential aircraft ... Dempsey dings Congress over ...
DEMPSEY DINGS CONGRESS ON CYBER -- The general, who recently returned from a trip to Silicon Valley, is urging Congress to pass cybersecurity legislation that would allow DOD, industry and other key agencies to share information about threats “at ...

Law Commission says New Zealand law must adapt to combat harmful digital ...
New Zealanders who are victims of serious personal attacks in cyber-space will have access to a specialist Communications Tribunal with the power to issue takedown orders and to reveal the identities of anonymous offenders if the Law Commission's ...

Alexander: Train Like You Fight | AFCEA SIGNAL Scape
By Max Cacas
Keith Alexander, USA, Commander of U.S. Cyber Command, and speaking today at TechNet Land Forces East in Baltimore, is that the people under his command are “not trained to a standard needed to protect our systems.” ... My company focuses on Applied Artificial Intelligence and Cyber Security and one thing I've learned from studying for an MS in Cyber Security from University of Maryland University College is that people are the weakest link in cyber defense and attack.

Republicans Hoping For September Cyber Bill
By Staff
Republicans Hoping For September Cyber Bill. By Staff|8/14/2012 4:08 PM. A group of Senate Republicans challenged Majority Leader Harry Reid (D-Nev.) today to take up cybersecurity legislation when Congress returns to session next ...
Talk Radio News Service

Uganda Government Under Attack By ... - Cyber War News
By Lee J
A hacker who uses the handle @DramaSett3r and flys under the anonymous flag has been leaking data over the past 24hrs that come from the Uganda based government. These attacks that have been carried out are in the name of ...
Cyber War News

Pentagon Requests Simulation Which Mimics Cybersecurity Attack
By David J. Barton
Pentagon Requests Simulation Which Mimics Cybersecurity Attack. The Pentagon has requested acyber threat simulation program that would be able to train and assess federal cyber employees, reports NextGov. The hope is that an ...
The New New Internet

"friday-lunch-club": Israel's 'Secret' plan for an aggression against Iran!
By G, M, Z, or B
The Israeli attack will open with a coordinated strike, including an unprecedented cyber-attack which will totally paralyze the Iranian regime and its ability to know what is happening within its borders. The internet, telephones, radio and television , communications satellites, and ... These IAF planes will be armed with electronic warfare gear previously unknown to the wider public, not even revealed to our U.S. ally. This equipment will render Israeli aircraft invisible. Those Israeli war ...

Cyber Stalking: the dangers of over sharing information | Visual.ly
By uknowkids
Odds are no one wants to kidnap your kids. In fact, cyber-stalkers are much more likely to be ex-boyfriends or astranged parents. You may not ... More Infographics. Big Frack Attack: Is Hydraulic Fracturing Safe? Do You Know Who's Watching ...

HUTCHISON: A cybersecurity solution | Politics - Home
In her weekly column, U.S. Sen. Kay Bailey Hutchison writes about cybersecurity.

Statement by Chairman Rogers on Senate Cybersecurity Legislation ...
For Immediate Release Contact: Susan Phalen August 2, 2012 Susan.Phalen@ mail.house.gov. Statement by Chairman Rogers on Senate Cybersecurity ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud