Wikileaks website back online after DDoS cyber-attack

Wikileaks website back online after DDoS cyber-attack
BBC News
Wikileaks started publishing millions of emails from Stratfor in February. Many were related to US government agencies such as the Department of Homeland Security and the Defense Intelligence Agency. But the site was hit by a DDoS attack after it ...

BBC News

INFORMATION WARFARE: Hezbollah Under Attack
Strategy Page
The U.S. Department of Defense had long asked for permission to go on the offensive using CyberWar weapons. But the U.S. government regularly and publicly declined to retaliate against constantattack from China, mainly because there were fears that ...

US Cyber Command Chief Addresses Cyber Operations Conference
C-SPAN
The chief of the U.S. Cyber Command believes the country is vulnerable to a massivecyber attack that could come at any time. Gen. Keith Alexander, who also heads the National Security Agency, will speak about cybersecurity at today's cyberspace ...

C-SPAN

How to build effective cyber defenses
CNN (blog)
Top Obama administration officials have been pressing the U.S. Congress hard for legislation to improve network security for the computer systems that run the nation's critical infrastructure. The House passed the Cyber Intelligence Sharing and ...

Cyber-Ark Launches Version 7 of Its Sensitive Information Management Suite to ...
Virtual-Strategy Magazine
Influenced by increasing audit and cybersecurity pressures, a growing number of global enterprises rely on Cyber-Ark's Sensitive Information Management Suite to break away from known email and file transfer protocol (FTP) vulnerabilities that put them ...

The Hacker Wars
GovExec.com
... cyber weapons and cyber espionage missions. Still, since 2011, the department has told the world it stands prepared to protect U.S. national security interests through cyberspace maneuvers..... Jeffrey Carr, a cybersecurity consultant and author ...

WikiLeaks Site Operational After Major Week-Long Cyber Attack
Firedoglake
Additionally, the attack was targeting the website's “donations infrastructure” called the “Fund for Network Neutrality.” Cyber attacks on WikiLeaks have typically led to increases in donations, the organization claimed. This time that was stymied as ...

Congress Needs to Go Back To School on Cyber Legislation
Forbes
It should set aside prior bills – including S. 3414 – and open a new dialogue with the business community and cybersecurity researchers and legal experts who deal with the realities of cybercrime. A broader perspective is needed. For too long, Congress ...

Preventing Catastrophe: Time for a National EMP Awareness Day
Heritage.org
At the federal level, the Department of Homeland Security (DHS) continues to lack a national recovery plan in the event of an EMP attack. Similarly, an EMP event has not been included within the National ... Thus, contingency planning should explore ...

Executives advocate a military approach to cybersecurity
CNN (blog)
Keith Alexander, made a rare appearance at a hacker's conference in Las Vegas last month encouraging those with advanced cyber skill sets to put them to work for the U.S. government. The Senate recently failed in its effort to pass basic cybersecurity ...

Cyber thugs mock President Pranab
CIOL
NEW DELHI, INDIA: The recent attack on newly-elected Indian President Pranab Mukherjee by anti-graft brigade Team Anna, now disbanded, may have backfired, but the cyber thugs continue to ridicule him on social platforms. Pranab Mukherjee ...

CIOL

GOP senators beat back against Democrats on cybersecurity stall
The Hill (blog)
Their comments come after co-sponsors of the Cybersecurity Act, including Sen. Jay Rockefeller (D-W.Va.), said GOP members chose to ignore alarm bells from national security leaders about the threat of a catastrophic cyber attack by voting against ...

Official: Iran to File Lawsuits against Cyber Terrorists
Fars News Agency
He said once the necessary information is obtained, "effective measures will be adopted by the Presidential Center for International Legal Affairs against the masterminds of these cyber attacks". Iran announced in June ... negotiators in Moscow. In the ...

Fars News Agency

Gone Phishing! – No it's not a Vacation, But it is a Favorite Pastime for Hackers
Virtual-Strategy Magazine
Global Digital Forensics is offering a free, two hour cyber security consultation with certified experts throughout August to help organizations close out the dog days of summer on a cyber security high note. New York, NY (PRWEB) August 14, 2012. In ...

Brendan W. Goode
FederalNewsRadio.com
As the Director of NSD, Mr. Goode is responsible for leading the deployment and performance ofcyber security technologies to counter on-going, real world national cyber threats and apply effective risk mitigation strategies to detect and deter these ...

Sage TPi to Host Free Event Featuring Top Internet and Cyber Data Security ...
Virtual-Strategy Magazine
You can't afford to miss Sage Technology Partners' free event featuring internationally recognized experts in Internet and Cyber Data Security to advise businesses how best to avoid costly legal fines and penalties from new HIPAA and HITECH federal ...

FBI cybersecurity expert enters private sector
FederalNewsRadio.com
A top FBI cybersecurity expert has returned to the private sector. Timothy Ryan joins Kroll Advisory Solutions as managing director, Virtual-Strategy Magazine reports. Ryan was the FBI's supervisory special agent for cyber, leading complex ...

Increase in Business Cyber Crime Calls for Increased Liability Protection
SBWire (press release)
... effects of a cyber attack,” said a CPLIQ specialist. “This is due to the fact that they often lack the expert help and resources to fully vet the liability insurance provider choices and assess them for adequate protection in the aftermath of a ...

Foreground Security Leaders to Present on Supply Chain Security Threats, Next ...
MarketWatch (press release)
ORLANDO, Fla., Aug 14, 2012 (BUSINESS WIRE) -- Foreground Security today announced that company President and CIO, David Amsler, and Executive Vice President for Cyber SecuritySolutions, Anthony Bargar, will be presenting in three sessions at the ...

Cyber Security Risk to Smart Grids and Intelligent Buildings
Science Daily (press release)
Fisk's article, 'Cyber security, building automation, and the intelligent building' begins with a short history of the rise in intelligent control -- from the 1960s, when the only real threat was an irate engineer armed with a hammer, through the ...

Survey: We're Not So Smart When it Comes to BYOD
ADOTAS
The study, conducted last month by Coalfire, a Colorado-based IT governance, risk and compliance services company, showed that many companies are not discussing mobile device cyber-securityissues with their employees and lack policies to protect ...

Security chiefs' relief at trouble-free games
Financial Times
“There will be a huge sigh of relief in the security services after the games,” says Professor Clarke. “But there is a range of issues they will now have to face such as cuts to budgets and staff and reorienting their work to deal with issues like the ...

Financial Times

Typical Web app is attacked 274 times a year, study finds
GCN.com
Meanwhile, the Air Force's program to expand its cyber warfare simulation center to more military commands, educational institutions and other federal agencies next January may face the axe due to the possibility of large budget cuts in the Defense ...

Apple's tough iPhone security causes problems for law enforcement - report
IDG News Service
"I can tell you from the Department of Justice perspective if that drive is encrypted, you're done," Ovie Caroll, director of Department of Justice's cyber-crime lab, said during his keynote address at the 2012 Digital Forensics Research Conference ...

Video: TrapWire working with surveillance cameras and online
DigitalJournal.com
A group called "AntiLeaks" claimed responsibility for the cyber attack, but it seems more likely that the U.S. government does not want people to see the information. Documents released show that the U.S. government is secretly spying on its citizens ...

DOD's new policy 'likes' social media, but with caveats
FCW.com
The two main concerns are cybersecurity and information security, he said. Although social media... Young or old, good cyber habits should include understanding the potential dangers of bogus URLs, bad links and malicious attachments. Inside the ...

Denying domestic spying & dossiers on Americans: Does NSA Chief play word ...
Computerworld (blog)
About this Blog: Most security news is about insecurity, hacking and cyber threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security IS sexy. ... The NSA had set up a recruitment website for Def Con ...

Federal Drive interviews -- Aug. 14
FederalNewsRadio.com
If you want to see where cybersecurity spending is headed, one good place to look at is the Navy. It's become one of the biggest cyber spenders. Bloomberg Government analyst Jason Wilson has been tracking cyber spending in the Navy and has some ...

The Next War
GovExec.com
New Rules for Flexible Spending Accounts? A Way to Cut Security Clearance Costs · Rep. .... Those networks, in turn, require sophisticated cyber and electronic warfare capabilities to defend them from attack. Those are the areas of common ground. But ...

GovExec.com

Bit9 Webcast: Traditional Security Fails in Virtualized Environments
MarketWatch (press release)
15 @ 9am & 2pm ET #cybersecurity http://bit.ly/QfdnUG. What: Free live webcast "Virtualization--Your Biggest Security Gap?" Who Should Attend: IT security leaders and anyone ... Bit9, the global leader in Advanced Threat Protection, protects the world ...

Video: Locking Down iOS
Threatpost (blog)
It may be true that half of all lost smartphones go unreturned and that the state of mobile securitylikely is going to get worse before it gets better, but at least you can have some peace of mind knowing that you have taken the proper steps to lock ...

Is it Obama's fault that missile defence staff watch porn on government computers?
Daily Mail
An article in The Washington Times suggests it is Barack Obama's fault that staff at the Missile Defence Agency were able to breach security by looking at porn on Government computers. It was revealed ... In July last year, America vowed to retaliate...

Daily Mail

CDW Study: Data Loss Biggest Concern of IT Healthcare Professionals
HealthTechZone
Data breaches are becoming more and more prevalent in all industries, but none with the potentially dire consequences as in the healthcare field, where confidential personal information, including SocialSecurity numbers, are often stored on health ...

Agency probes JFK security breach by man from bay
FederalNewsRadio.com
... million system of surveillance cameras and motion detectors. "Thank God it wasn't a terrorist, but we have to look at it as if we had another attack," said Isaac Yeffet, former chief of security for Israeli airline El Al. "That's the only way we'll ...

Wikileaks website back up after cyber-attack | Digital Times | Digital ...
By Fergal Gallagher
Wikileaks website back up after cyber-attack. by Fergal ... The secret revealing site recovered overnight with help from CloudFlare, a Web performance and security company, which responded to WikiLeaks' request for help on Twitter.
Digital TimesDigital Times |...

Emerging cyber threats to critical systems | Medill National Security ...
By Elizabeth Bunn
James Clapper, the U.S. Director of National Intelligence, called the threat of cyber attack a “critical national and economic security concern” in his 2012 Worldwide Threat Assessment report and testimony in January. “We currently face a cyber ...
Medill National Security Zone

Cybersolution Security » FISMA Focus
By jim
Experts have long cited cyber-terrorism as one of the potentially most dangerous threats to nationalsecurity. Consider what might happen if a hostile government or terrorist organization launched anattack on our nation's power grids, ...
FISMA Focus

Safe Money: A Virtual Safe for Virtual Money – that Actually Works ...
By e_kaspersky
Only the most slothful of IT Security vendors these days don't offer built-in protection againstphishing; however, the quality of protection is another matter. But this is in no way enough to be safe in real life scenarios (about ... This way, even if a cyber-crook dupes a user with an e-mail supposedly from his bank and has him or her open a fake site, Safe Money recognizes the attack, warns the user thereof, and blocks the threat. And it goes without saying that spoofing (substituting site ...
Nota Bene

Catapult Technology Exhibits at TechNet Land Forces East ...
By ericb
The overall theme of TechNet Land Forces East is cyber, which is a good fit for Catapult'scybersecurity expertise. The theme focuses on the ground component of the Army and Marine Corps, including components of U.S. Cyber Command, Army Cyber Command, Marine Corps Forces CyberCommand, 10th U.S. Fleet Cyber Command, 24th Air Force Cyber, Department of HomelandSecurity, U.S. Coast Guard, Defense Advanced Research Projects Agency (DARPA), Academia, and...
Catapult Technology

Control Systems and MS Attack Surface Analyzer
By Michael Toecker
I see it used to test that patches and updates don't adversely affect existing cyber security controls. Those of you in the NERC CIP world should really like the wording there, and it's completely accurate. When used correctly, the tool can be ...
Digital Bond's SCADA Security Portal

Hackers Linked To China's Army Seen From EU To DC - Trade Reform
By Ellen Croibier
“Until we can have this conversation in a transparent way, we are going to be hard pressed to solve the problem,” said Amit Yoran, former National Cyber Security Division director at the Department of Homeland Security. .... Cybersecurity experts have connected the group to a series of headline-grabbing hacks, ranging from the 2008 presidential campaigns of Barack Obama and John McCain to the 72 victims documented last year by the Santa Clara, California-based security firm ...
Trade Reform

Cybersecurity Bills Threaten Freedom
Various cybersecurity acts threaten constitutional freedoms. On March 27, HR 4263: SECURE IT Act of 2012 was introduced. Now in committee, no further action ...
rense.com/general95/cybersecurity-threat.html

Cybersecurity Overview | Homeland Security
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
www.dhs.gov/cybersecurity-overview

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com