WikiLeaks plugged? Cyber attack on whistleblower enters 2nd week

WikiLeaks plugged? Cyber attack on whistleblower enters 2nd week
RT
The attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire ...

RT

Gauss Cyber-Spy Trojan Gives Rise to Many Theories, No Answers
eWeek
NEWS ANALYSIS: Current theories circulating in the IT security community contend that the Gausscyber-spy Trojan was created by the U.S. government in the same lab that created the Flamemalware. But nobody is sure why. A number of things are known ...

CounterTack's Independent Survey Finds Growing Awareness for Global Threats ...
Sacramento Bee
13, 2012 -- /PRNewswire/ -- CounterTack, the industry's first and only provider of in-progress cyber attack intelligence and response solutions, today revealed findings of an independently commissioned study, which shows organizations are ill-prepared ...

NSA chief seeks help from hackers
Computerworld
"This is the world's best cybersecurity community," said Alexander, who also heads the U.S. CyberCommand. "In this room right here is the talent our ... Read more about Security in Computerworld'sSecurity Topic Center. Comments (). Print. From CIO ...

Comment: Cyber thieves are smarter than you think
Retail Week
The second approach is minimisation, where you store the data in as many different secure places as you can, so that if anyone breaks in, they can only access a tiny portion of your data from that single attack. ... Social engineering—exploiting the ...

Retail Week

Cyber war in Syria
FRANCE 24
Cyber war in Syria ... Security forces are thought to be using torture to obtain the passwords of militants arrested to access their social network accounts. And in recent months, copies of sites such as Facebook and Youtube have even been created to ...

Cyber Crooks Licking Their Chops, Say Mounties
TheTyee.ca
'It is assessed with high confidence that cyber criminals will use the transition mechanisms of IPv6 to carry out their illicit activities until computer security measures are reconfigured to block them.': RCMP report. Photo: Shutterstock. Text size ...

Iroquois County: Cyber hacker tried to transfer county funds
Kankakee Daily Journal
A cyber hacker, or hackers, attempted to transfer Iroquois County funds out of the county's online bank accounts. Security measures already set up by the county and its banks prevented the transfer, according to an Iroquois County sheriff's police ...

China and U.S. discuss cybersecurity via think tanks
FierceGovernmentIT
Two establishment national security think tanks--one Chinese, the other American--have been holding what a former Homeland Security Department official says could be described as proxy negotiations on cyber war and cyber espionage. Stewart Baker, a ...

Hard National Security Choices
Lawfare (blog)
Last week Ellen Nakashima of the Washington Post wrote about a proposal that the DOD authorize its cyber specialists to take action outside of its own computer networks, a bold suggestion but one that is within SecDef's authority. On the topic of ...

STONESOFT: Gauss is a Part of Global Cyber Warfare
4-traders
Dr. Jarno Limnéll, Director, Cyber Security at Stonesoft is not at all surprised about the discovery. "Gauss is just another example of the cyber ... In a state of war, Hezbollah would represent Iran andattack Israel. Information about bank ...

The Honan Affair and the Cloud's Dark Lining
TechNewsWorld
The Mat Honan incident says more about the fragmented state of security policies implemented by cloud providers than the security of the cloud itself, according to Trend Micro's Jamz Yaneza. "The affected user admits to not having followed the proper ...

Wikileaks hit by cyber attacks, becomes inaccessible
Times of India
LONDON: The secret-busting organisation WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week. In a statement released late on Saturday, the group said the ...

Kaspersky And CrySys Offer Gauss Detection Tools
TechWeekEurope UK
The mysterious Palida Narrow font is particular to the Gauss malware, though Kaspersky researchers are unsure whether the font plays any role in the tool's work. “This font was used during the Gauss cyber-attack,” a Kaspersky security expert said in an ...

TechWeekEurope UK

News Digest: Aug. 13
Federal Times
The Obama administration is considering the use of executive branch authorities to better secure the electric grid and other critical systems against cyber attacks. The Senate failed to passcybersecurity legislation before its August recess that would ...

No company is below the radar in CyberSecurity
Business Review Europe
It is therefore incumbent on the CEO to take a lead in driving effective information security practices and ensuring that the organisation is protected from cyber attack. The question is how? How do you frame information security questions in a ...

Fresh Strike In Middle East Cyber War
Sky News
Most armed forces, including the UK, now have separate cyber-commands. The US and the European Union have imposed heavy financial sanctions on Iran. It is conceivable that the Gaussattack was part of a spying operation seeking to trace the funds of a ...

Parsing Cyberwar – Part 3: Synergies and Interference
Fabius Maximus (blog)
But there are reliable sources of insight to prepare us for the big cyber-events that lie in the future, such as this series by Marcus Ranum. Watch for this on your .... Virtually every computer security technique that blocks an attack also notifies ...

Fabius Maximus (blog)

New virus may be US, Israeli digital strike against Hezbollah
The Times of Israel
Citing “Western officials familiar with classified data on the effort,” the site wrote that “the United States and Israel jointly developed the Flame virus, which collected intelligence for a cyber-attack on Iran's nuclear program. The CIA, the ...

The Times of Israel

Energy wants ulitities to make cybersecurity top priority
FederalNewsRadio.com
Reuters reported President Obama is considering using an executive authority in the cyber battle. He wanted to make agencies and critical infrastructure operators install better controls. This follows the failure of the Senate to pass a cybersecurity ...

9 popular IT security practices that just don't work
IDG News Service
If you got rid of the exploits that required unpatched software to be present, the hackers relying on unpatched software for their dirty work would move to other avenues of maliciousness (read: social engineering), and the true reduction in cyber crime ...

Cybersecurity: How prepared is Nigeria for cashless initiative?
BusinessDay
Analysts have warned financial institutions and other stakeholders in the electronic payment industry to step up investments in security of electronic transactions or risk been overwhelmed by the spate of sophisticated cyber attacks that would soon ...

BusinessDay

Sage TPi to Host Free Event Featuring Top Internet and Cyber Data Security ...
DigitalJournal.com (press release)
Due to the significantly increasing volume of reported cyber data breaches in all verticals of industries from health care and insurance, to legal firms, micro-lenders, and banks, businesses of all sizes are overwhelmed with the many complexities of ...

The security game changes when the bad guys are backed by foreign ...
PC Advisor
Our roots were in protecting classified information and dealing with cyber-espionage, and four years ago when Google got breached and put their hand up and said, "Hey, we just got breached by the Chinese," thousands of other companies put their hands ...

Security stepped up for I-Day
Daily Pioneer
After receiving the intelligence input on possible terror attack on the occasion of Independence Day, Delhi Police has made elaborate arrangements and decided to deployed number of companies of Sashastra Seema Bal (SSB) in the national Capital. The ...

IDF to Test Missile Attack Alert System on Mobile Phones
The Jewish Press
The IDF has been fine-tuning the system over the past few months, with special focus on ensuring its resistance to cyber-attacks, from which IDF officials said the system “must be immune.” Officials at the IDF Home Front Command said that the goal is ...

Companies should watch out for Internet threats
China Daily
Web security problems have disrupted global business operations from time to time. On average, a new cyber threat emerges every second, and every five minutes there could be a hacking case, said Eva Chen, chief executive officer of Japan-basedsecurity ...

China Daily

'Cloud' to Hover Over Asia: Rackspace CEO
CNBC.com (blog)
Despite worries about cybersecurity in China, Asia-Pacific remains an attractive market, Lanham Napier, Rackspace Hosting's CEO told CNBC's “Squawk Box” on Monday. ... Doubts have emerged recently about cloud computing (explain this), amid a spate of ...

CNBC.com (blog)

Google, Salesforce were allegedly offered 'TrapWire' spy tool
ZDNet (blog)
Now approaching its 10th day of a distributed denial-of-service (DDoS) attack, WikiLeaks has released information about a video-surveillance program that is possibly being used by the US government and large organisations, such as Salesforce and Google ...

CEO of Huntsville-based Camber proud of accomplishments of growing company
al.com (blog)
Another service Camber provides is becoming more vital to national defense -cybersecurity. "There are 100000 hacks a month to try and steal information," Batson said. "We need to keep them from taking stuff out." Camber helps, through cybersimulators ...

al.com (blog)

Comings & Goings | lawblog@wsj.com
Wall Street Journal
Mr. Ryan, who specializes in cyber investigations, had been at the FBI since 1999 and filled several leadership roles, including as acting director of the FBI's New Jersey Regional Computer Forensic Lab. He also teaches a course on cybercrime and ...

Activist Post: The NWO Agenda Would Move Forward with This One ...
By Activist
Next, nobody is buying the need for cyber security legislation that they've been trying to ram through the last few years. Lawmakers ... A cyber attack that hits major U.S. banking institutions and Wall Street could provide enough devastating consequences that the controllers need to corral an increasingly cynical public back in line and jump start their sinister agenda once again. ... Posted by Activist at 9:02 AM Labels: civil liberties, cyber warfare, false flag, Howard Beale, Internet control ...
Activist Post

Monday Morning News Kick Off: Republicans Urge Obama to Avoid ...
By mattl
Keith Alexander, who leads U.S. Cyber Command and is also director of the National SecurityAgency, the U.S. is not prepared to deal with a cyber attack on the nation's infrastructure. Lack of Clearance Reciprocity Costs Millions, Survey ...
Fed Connects

Guide: How to Manage an Attack | isssource.com
By gHale
One of the biggest issues a company has in facing a possible cyber attack is they do not have a plan in place on how to deal with an intrusion. That can now change as there is now a renewed guide out on how to manage computer security ...
isssource.com

Enterprise IT Talks Proactive Security, But Stays on Defense, Survey ...
By Brian Prince
Ninety-two percent of respondents agreed that fighting back to interrupt an in-progress cyber-attackis necessary. This concept of a more proactive approach to security has given rise to a number of companies focused on helping enterprises ...
SecurityWeek RSS Feed

U.S. government is secretly spying on EVERYONE using civilian ...
By InvestmentWatch
Cameras use facial recognition to log people's activity Details released by Wikileaks which has now been hacked in cyber attack Disturbing echoes of CIA.
InvestmentWatch

Clarke: Recovery After Cyber-Attack More Costly Than Prevention ...
Never before in the history of our nation has there been such an exponential growth in technology and innovation within the span of a generation. The Internet ...
www.rollcall.com/.../Recovery-After-Cyber-Attack-More-Costl...

The Failed Cybersecurity Act of 2012 | EastWest Institute
The Cybersecurity Act of 2012 (CSA), the most significant legislative undertaking on cybersecurityissues in the United States to date, was blocked from ...
www.ewi.info/failed-cybersecurity-act-2012

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com