Giving your cyber security a checkup

Giving your cyber security a checkup
Milwaukee Journal Sentinel (blog)
Well, do you know what else is scary? Wisconsin residents reported $5.2 million in losses from Internet-based crimes in 2011. Now that's scary. Thankfully, October is Cyber Security Awareness Month in Wisconsin. This event is a timely reminder for ...

Minister Toews Reaffirms Harper Government's Commitment to Perimeter and ...
U.S. Politics Today
Today, Public Safety Minister Vic Toews delivered a keynote address at SecureTech 2012, a conference focussing on current and emerging threats to security and public safety. The two main themes of this year's conference are perimeter and cyber security.

The Federal Government Lacks Experts To Address Cyber Security Threats
ThinkProgress
The federal government faces a shortage of cyber security experts. That's according to an article published in FCW, a technology-focused publication. FCW interviewed federal officials regarding the government's ability to effectively beef up its cyber ...

ThinkProgress

Cyber bullies -- blame the parents
CSO
See: Latest PC security advice. The survey, from PC security firm Bitdefender, also shows that a massive 82 percent of parents said their children had been exposed to cyber-bullying, including insults, threats, or having their pictures disclosed ...

Govt to invest $200 mn in 4 yrs on cyber security infra
Zee News
New Delhi: The government Tuesday said that it will invest around USD 200 million in next four years to strengthen cyber security infrastructure. "We have 1.2 billion people and will be largest in terms of population country in the world in years to come.

Zee News

FBI Expands Cybercrime Division
InformationWeek
The question the FBI is attempting to resolve is "who is conducting the attack or the exploitation and what is their motive," FBI assistant director of criminal, cyber, response and services Richard McFeely said in a statement. "In order to get to that ...

DHS Drafts Solicitation for Cyber Security Tools and Services
govWin (blog)
The recently passed Continuing Resolution provided DHS with an additional $183 million to begin transforming agency cyber security, including implementation of CDM tools and CMaaS. The solicitation draft provided additional details around the scope of ...

Call to teach Aussie seniors more about cyber security
Fraser Coast Chronicle
Representatives from Seniors Australia will tell a parliamentary committee investigating cyber security for the elderly what needs to be done to encourage older Australians to get online. Seniors Australia represents more than a quarter of a million ...

Legal fears muffle warnings on cyber-security threats
NDTV
Two talks about a nuclear power plant's potential vulnerabilities to cyber-attack were canceled after an equipment supplier threatened to sue, organizers said, even though plant officials had approved the presentations. The vendor complained that the ...

NDTV

Talking cyber security: practices, policies, scenarios
Intelligent Utility
I spoke about cyber security last week with Patrick Miller, president/CEO of EnergySec and principal investigator for its offshoot, the National Electric Sector Cybersecurity (NESCO), a public-private partnership operated by EnergySec with funding from ...

Cyber Security for Journalists: Apply now for online course on how ...
By Knight Center
Cyber Security for Journalists: Apply now for online course on how to protect your digital information.... Cyber Security for Journalists: Apply now for online course on how to protect your digital information. By Knight Center · Lea en EspaƱol ...
JOURNALISM IN THE AMERICAS Blog

On the Cyber Security Landscape in Africa
(Translated from the original Italian). Let me present you a very interesting study on cyber securitylandscape in Africa, conducted by IDG Connect, division of ...
infosecisland.com/.../22611-On-the-Cyber-Security-Landscape...

Cyber security efforts won't necessarily fall victim to budget cuts ...
Even though the axe stands ready to fall on the defense budget in the coming months, it won't necessarily sever Cyber security efforts underway in some ...
www.dni.gov/.../753-cyber-security-efforts-won’t-necessarily-...

Huawei proposes national Cyber Security Evaluation Centre - CSO ...
October 24, 2012 — IDG News Service — Telecommunications equipment provider, Huawei, has proposed a national Cyber Security Evaluation Centre, which ...
www.csoonline.com/.../huawei-proposes-national-cyber-securi...

Peter G. Neumann on Cyber Security (video)



Computer scientist Peter G. Neumann talks about his research to create more secure software and hardware.

Cyber hacking demo previews next week's GEO Huntsville conference
al.com (blog)
The conference is one of three economic development initiatives from the mayor's office, with the other two focusing on energy conservation and cyber security. ... "We went through exactly what would happen in a cyber attack," Battle said. "You lose ...

al.com (blog)

Cyber attack puts IDs of 3.6M South Carolinians at risk
Charleston Regional Business
About 3.6 million Social Security numbers and 387,000 credit and debit card numbers on file at the S.C. Department of Revenue have been exposed in a cyber attack launched from outside the United States. The state agency said that the vast majority of ...

Distributed denial-of-service mitigation key to dealing with cyber attacks: Report
Business Insurance
... a cyber attack this holiday season include having a single source for distributed denial-of-service mitigation services and making distributed denial of service a part of firms' disaster recovery plans, says a cyber security firm in a white paper ...

Cyber warriors training hard to defeat adversaries, Army cyber leaders said at ...
Defense Systems
"In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.” Commanders across the military are buildingcyber into training exercises. For example, Army cyber ...

The Next Weapon Of Mass Destruction Will Probably Be A Thumbdrive
Business Insider
based think tank that focuses on Asian security issues, concluded that groups operating from Chinese territory have been “waging a coordinated cyber espionage campaign targeting U.S. government, industrial, and think tank computer networks.” ... Which ...

Cyber security at US energy agency found wanting
ComputerWeekly.com
Cyber security at the US government's largest renewable power transmission agency has been found wanting by an Energy Department inspector general. The Western Area Power Administration (WAPA), which sells and transmits power through 17,000 ...

Japan vulnerable to cyber-attack
Times of India
While the government is hurrying to set up organizations to counter internet-based attacks, the nation remains vulnerable due to a lack of sufficient numbers of cyber security specialists and effective systems and infrastructure to prevent security ...

South Carolina governor seeks to calm taxpayers after security breach
Chicago Tribune
CHARLESTON, South Carolina (Reuters) - South Carolina Governor Nikki Haley sought on Monday to temper the anger and frustration of state taxpayers left wondering if their personal information was compromised by recent cyber attacks on computers ...

DHS Awards 34 Cyber Research and Development Contracts
Signal Magazine
The Department of Homeland Security Science and Technology Directorate (DHS S&T) has awarded 34 contracts to 29 academic and research organizations for research and development of solutions tocyber security challenges. The contracts were ...

US is source of cyber terrorism: Iranian defense minister
Tehran Times
“The United States is the source of cyber terrorism and intends to pave the way for increasing its activities in relation to cyber terrorism through diverting attention and leveling accusation,” Vahidi said on Monday in response to U.S. Defense ...

ISC Diary | Cyber Security Awareness Month - Day 26 - Attackers ...
Here on Day 26 of Cyber Security Awareness Month, as the ISC focuses on standards, we received a very interesting email from David at Lamp Post Group, the ...
isc.sans.edu/diary.html?storyid=14395&rss


Hackers who attack US in line for lucrative payoffs

Hackers who attack US in line for lucrative payoffs
Tribune-Review
Both countries have integrated cyber-warfare capabilities into their military strategies, said Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University. China especially has engaged in cyberspying for at least ...

Training cyber defenders
Buffalo News
General Keith Alexander, director of the National Security Agency and commander of U.S. CyberCommand, was asked at a July security forum in Colorado how well-prepared, on a scale of 1 to 10, the United States is for a major cyber attack on an ...

Cyber attack: Four mn US social security numbers exposed
CIOL
CHARLESTON, As many as 3.6 million Social Security numbers and 387,000 credit and debit card numbers used by state taxpayers could have been exposed to a hacker in recent cyber attacks on the state Department of Revenue's computers, officials said ...

Japan vulnerable to cyber-attack
Newstrack India
"When I ask the instructor to attack my website, he immediately spotted the vulnerability," Yoshihiro Ura, a 19-year-old student at Osaka Prefecture University College of Technology, said. He was one of 40 participants at the cyber security camp in ...

Help added to SC cyber attack hotline
WACH
SLED knew about the attack on October 10th but waited sixteen days to tell the public about thesecurity breach while they worked to stop the attacker. “What I am every conscious of is when any law enforcement division tells you this will hurt our ...

Nation “increasingly vulnerable” to cyber-attack
The Copenhagen Post
A proposal currently being considered by parliament calls for the creation of a 'Centre forCyber-Security' under the control of the Defence Ministry, and would have a budget of 35 million kroner above and beyond what the ministry has already requested.

Cyber Security – First Line of Defense
DoD Live
In today's technology driven world, the battle lines are drawn with ones and zeros. There are cyberthieves waiting for you to compromise your cyber defense to exploit your bank account, identity and even your knowledge of military and U.S. defense ...

Official Calls for Iran's Smart Confrontation with Enemy's Cyber Threats
Fars News Agency
Noting that the threats in the cyber space are changing qualitatively and quantitatively, he said that the enemy is enhancing its technologies using smart systems to have their control wherever these technologies are used. Then, technologies have ...

Fars News Agency

Will the apocalypse arrive online?
Aljazeera.com
Instead, let's take the recent cyber claims at face value and assume that Richard Clarke, who prior to 9/11 warned continuously of an impending attack by al-Qaeda, is correct again. And while we're ... Cyber is "a new terrain for warfare", Panetta ...

Aljazeera.com

Cyber Security Initiatives Of India
Cjnews India (blog)
For instance, Perry4Law techno Legal Base (PTLB) has launched many far reaching and significant techno legal cyber security initiatives in India. The cyber securityresearch and development centre of India (CSRDCI) is the exclusive techno legal cyber...

Cjnews India (blog)

SC Governor Haley wants hacker 'brutalized' after cyber attack | The ...
By Arturo Garcia
But her response to the matter has been criticized by state Democrats. “You don't leave victims exposed to further criminalization so you can catch the perpetrator,” state Rep. Leon Stavrinakis told the newspaper. WIS' report on the cyber-attack ...
The Raw Story

Cyber Security Fails As 3.6 Million Social Security Numbers - Infowars
This incident will also place cyber security on the table for the presidential candidates as well. Even more than climate change, cyber security is a big complex ...
www.infowars.com/cyber-security-fails-as-3-6-million-social-s...

Cyber-Security Chief on Wave of Web Attacks - US Business News ...
The man often credited as being the father of Internet defense says it's still unclear where a recent wave of hacking attacks targeting the U.S. financial industry ...
www.cnbc.com/.../Cyber_Security_Chief_on_Wave_of_Web_...

Cyber Security Fails As 3.6 Million Social Security Numbers Breached In South ...
Forbes
Cyber security will someday be seen as right up there with Social Security, health insurance and national defense as key measures of our well-being. This attack makes it clear that not only are individuals incapable of adequately protecting themselves ...

US, Canada launch joint cyber-security plan
NDTV
The action plan, under the auspices of the US Department of Homeland Security and Public Safety Canada, aims to better protect critical digital infrastructure and improve the response to cyber incidents. "Canada and the US have a mutual interest in ...

NDTV

Concentrate on cyber attacks, not terrorism, Osborne tells spy chiefs
Telegraph.co.uk
The Chancellor is understood to have asked them to consider how current spending decisions might look in the coming decades, suggesting future generations might question why today's leaders did not devote more resources to cyber security.

Telegraph.co.uk

Insurer launches cyber insurance for small businesses
ZDNet
That hasn't stopped Famers Insurance Group from developing a new line of Cyber Liability and DataSecurity coverage that is specifically targeted at "main street businesses." As best I can tell from the information I've received and read about, this ...

Taxpayer data exposed in cyber attack on South Carolina agency
Chicago Tribune
CHARLESTON, South Carolina (Reuters) - As many as 3.6 million Social Security numbers and 387,000 credit and debit card numbers used by state taxpayers could have been exposed to ahacker in recent cyber attacks on the state Department of ...

Cyber attack hacks Social Security numbers: What do I do next?
Spartanburg Herald Journal
You can help prevent your information from being misused by taking some of the following simple steps. In addition to these steps, the S.C. Department of Revenue will be protecting the taxpayers of South Carolina, by providing one year of credit ...

SC data breach just latest in hacker onslaught
USA TODAY
"There is a lot of spoofing and head fakes going on to make it seem like an attack is originating from a different region," says Kurt Baumgartner, senior security researcher at Kaspersky Lab. Generally speaking, the more sophisticated cyber attacks ...

The Global Cyber Warfare Room Operating from Herzliya
IsraelDefense
The Global Cyber Warfare Room Operating from Herzliya. RSA, the information security division of EMC, is expanding the activities of its global cyber war room, based in one of the office buildings in Herzliya Pituach. This is the first center of its ...

Where's the hard evidence that ties Iran to all of these attacks?

Answer: There isn't ANY hard evidence--just another U.S. intelligence failure?

Frankenstory: Attack Of The Iranian Cyber Warriors
InformationWeek
On the cyber-attack front, however, where's the hard evidence that ties Iran to all of these attacks? Well, that's classified. Furthermore, at least in the case of Shamoon, this week anonymous government officials admitted to Bloomberg that the evidence is only circumstantial. But the case against Iran may not even be that, as digital forensic investigators this week also confirmed earlier reports that -- counter to U.S. government officials' assertions -- Shamoon was an amateurish, copycat Flame attack, carried out by a single individual. Thanks to the individual having incorrectly configured the malware, it not only did less damage than intended, but it helped investigators trace the infection back to a USB stick that had been plugged into the employee's PC while he was logged in. Saudi authorities, according to news reports, have arrested a suspect. (Nevertheless) Panetta continued to insist this week that the Shamoon malware...

Panetta warns Congress to avert sequestration and deal with cyber security
Examiner.com
"Third, it really must pass a cyber-security bill, cyber-security legislation. As I made clear this month, we really do need strong Cyber-security legislation to ensure that we can help defend the nation against a cyber attack", Panetta said. See ...

Examiner.com

Farmers to offer 'cyber-security' insurance to Texas policyholders
Bizjournals.com (blog)
Farmers Insurance Group is offering insurance coverage for damages stemming from cyber-securityand data breaches for small- to midsize businesses in Texas. The Los Angeles-based insurer says “the coverage will be provided automatically for all ...

Richard Clarke Keynotes at Brazil Cyber Defense Solution Workshops Hosted ...
DailyFinance
Clarke is a leading internationally-recognized expert on Cyber Security and Defense, president of Good Harbor and strategic advisor to Paladin Capital Group. Mr. Clarke will participate in the 3rdCyber Security Seminar, organized by the Brazilian ...

Hacker illegally obtained credit card and Social Security numbers
Sumter Item
Hacker illegally obtained credit card and Social Security numbers. The S.C. Department of Revenue today announced that approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers have been exposed in a cyber attack.

Huawei Proposes Security Center in Australia
eWeek
Lord said that Huawei is proposing creating a national cyber security evaluation center, where telecom equipment from all vendors could be tested for security risks and vulnerabilities. The center would allow for greater transparency into the ...

eWeek

Team of Centennial, Reservoir students place second at Cyber Challenge
Baltimore Sun (blog)
The competition was sponsored by the Science Applications International Corp., the University of Maryland, Baltimore County and the National Cyber Security Alliance. Together, Centennial seniors Reuven Rosenthal, Huang Xue, Franz Payer, Aneesh ...

Hacker Attack Warnings Don't Budge Opposing Sides on Cyber Bill
Businessweek
An executive of the Chamber of Commerce, the largest U.S. business lobby, backed a voluntary system to let the government and industry share cyber threat information during a panel discussion at the National Press Club in Washington. White House ...

Cyber security market to expand by 44.7% in China
OfficialWire
The cyber security market has been forecast a gradual growth rate over the next eight years, with the industry set to increase at a compound annual growth rate (CAGR) of 21% through to 2020, reaching a market value of $120 billion by 2017. The ...

Cyber security landscape in Africa | Security Affairs
By paganinip
Websense security firm has recently confirmed Egypt as third for countries hosting phishing fraud. For completeness we must also consider the cyber warfare context, African countries have suffered state-sponsored attacks such as the recent ...
Security Affairs

Academy cyber teams places second - Colorado Springs Business ...
By Amy Gillentine
The cyber team's also won the 2012 National Security Agency Cyber Defense Exercise against other service academies and Air Force graduate teams back in April, as well as placing first among 331 U.S. and Canadian undergraduate teams ...
Colorado Springs Business Journal

National and International Cyber Security Exercises: Survey - Enisa
Cyber exercises are an important tool to assess the preparedness of a community against cybercrises, technology failures and critical information infrastructure ...
www.enisa.europa.eu/activities/...and.../exercise-survey2012

Impressive Speaker Lineup Announced for TECHEXPO Cyber ...
Elite one-day event promises to be an inspirational day for cyber security professionals seeking new employment opportunities. TECHEXPO has announced the ...
www.infosecisland.com/.../22604-Impressive-Speaker-Lineup-...

United Nations Counter-Terrorism Implementation Task Force report reads like a primer on Internet control and censorship

UN Report: The Internet Is Dangerous Because It's Just So Darn Open
By John Biggs
Entitled “Use Of The Internet For Terrorist Purposes,” the document, which discusses the dangers of “open Wi-Fi” and suggests ISPs maintain retention standards, focuses on the possibility of “terrorists” using the “Internet” to terrorize, ...
TechCrunch

Link to download UN Report

Happy National Cyber Security Awareness Month! - Reason
By Rachel Moran
Joe Lieberman's (I-Conn) Cyber Security Act 2012 failed to move past a filibuster after Republican opposition on the grounds that proposed security standards would lead to costly regulations for businesses. Despite this stumbling block, ...
Reason.com Full Feed

Napolitano to Address 'Diversity in Cyber Security Conference' | The ...
By Daniel Halper
Department of Homeland Security Secretary Janet Napolitano is scheduled to deliver a keynote address at the "Diversity in Cyber Security Conference" tomorrow in Washington, D.C., a press release from the organization hosting the event ...
The Weekly Standard Blog

How likely is a cyber 'Pearl Harbor'? | TechRepublic
By Patrick Lambert
This isn't a new concept, and the U.S. Government, along with security researchers all over the world, have been thinking about such a major security scenario for a long time now. Let's see what the current ... Meanwhile, Republicans seem to favor a more offensive stance when it comes to cyber warfare, along with responsible disclosure from the private sector. But the real ... As for the actualattack surface on critical systems, that also can vary, depending on what is considered critical.
on TechRepublic

Iran Cyber Attack Highlights Growing Threat, Experts Say
By The Huffington Post News Editors
“Iran has invested very heavily in its cyber warfare capabilities,” said Frank J. Cilluffo, director of the Homeland Security Policy Institute at George Washington University. "And what they lack in capability they more than make up for in intent." ...
The Huffington Post | Full News Feed
Clinton: Internet Claim About Libya Attack Proves Nothing
Voice of America
STATE DEPARTMENT — U.S. Secretary of State Hillary Clinton says an Internet claim of responsibility that followed last month's attack on the U.S. consulate in Benghazi, Libya, is not hard evidence of who killed four Americans, including the U.S...

Voice of America

In Aleppo, Syrian rebels wage war – with an Internet connection
Christian Science Monitor
“Internet, Internet!” chanted one, speaking about the illegal high-speed connection they were about to create. Onto the dusty floor of the small front room they threw down cardboard boxes of cables and tools, the modems and laptop that would soon ...

Christian Science Monitor


UK classrooms may teach students about Internet porn — RT
By RT
UK academics are pushing for teachers to educate teenage students with classes on Internetpornography. They claim children as young as 11 are being exposed to online porn, giving them unrealistic sexual expectations later in life.
News RSS : Today

UN looks to develop anti-terror Internet surveillance | The Daily Caller
By Josh Peterson
The United Nations is considering spying on social networks, tracking cell phones and pushingInternet Service Providers to retain user information in the name of combating terrorism. The organization released a 148-page document on ...
The Daily Caller

Cyber Security Research Alliance: Intel, Lockheed And Others Team Up To ...
Huffington Post
The non-profit research consortium, to be known as the Cyber Security Research Alliance (CSRA), will also include Advanced Micro Devices, Honeywell International and EMC Corp's RSA Securitydivision as founding members. The consortium will coordinate ...

Iran rejects UN criticism of its cyber security rules
Reuters
UNITED NATIONS (Reuters) - Iran rejected criticism from a U.N. human rights investigator over its tighter cyber security rules, saying they are necessary to protect it against cyber attacks and have nothing whatsoever to do with freedom of expression.

Code in Aramco Cyber Attack Indicates Lone Perpetrator
Bloomberg
Detailed forensic evidence from the Aramco attack and others shows how difficult it is to distinguishcyber warfare and espionage from a bewildering array of threats that includes hacktivists, social malcontents, criminals and others. The design ... In ...

US-India Cyber Diplomacy: A Waiting Game
Huffington Post
India, however, before openly committing to either side, has a clear national interest in streamlining its internal cyber capabilities evidenced by the establishment of the public-private sector group under the auspices of the National Security Council ...

Cyber security efforts won't necessarily fall victim to budget cuts, says ...
Government Security News
Even though the axe stands ready to fall on the defense budget in the coming months, it won't necessarily sever Cyber security efforts underway in some intelligence operations, said a top government official. In remarks at the SINET D.C. Showcase in ...

AMD, Intel Partner to Form Cyber Security Research Alliance
eWeek
In addition, the CSRA is in discussions with the National Institute of Standards and Technology (NIST) involving the arrangement of a joint cyber-security research symposium in early 2013 to connect researchers and early adopters from across the ...

eWeek

General Dynamics' TNE Cyber Security Capability Approved for Classified ...
Sacramento Bee
Using TNE, military and government customers can share sensitive information across securityboundaries from a single shared network. This reduces cyber operating and maintenance costs and improves operational flexibility. TNE also secures cloud-based ...

Killer Apps: Napolitano: US and allies must improve info sharing on cyber threats
Foreign Policy (blog)
As cybersecurity grows in importance, the United States and its allies need to improve information-sharing and collaboration on cyber threats, Homeland Security Secretary Janet Napolitano said today. While the United States does share information about ...
The Cyber Trade War - By Adam Segal | Foreign Policy
By ADAM SEGAL
The Cyber Trade War. The showdown between China and the United States over telecommunications technology is about much more than just security. BY ADAM SEGAL | OCTOBER 25, 2012. On Oct. 8, the House Select Intelligence ...
Foreign Policy

Cyber War Rooms: Why IT Needs New Expertise To Combat ...
By Avi Chesla
The characteristics of cyber attack campaigns have fundamentally changed, but tactics to mitigate them as well as best practices employed by IT security organizations has not. The fundamental change is the attack length – sounds simplistic, ...
SecurityWeek RSS Feed



Cyber-Threats Affect Industries Differently

Cyber-Threats Affect Industries Differently: Verizon Report
eWeek
Both industries suffered from a lack of security expertise and weakly secured point-of-sale systems, according to Verizon. Yet, healthcare has to worry about protecting medical devices and electronic medical record (EMR) systems, while retail needs to ...

eWeek

Canada's cyber-security lacking, says report
The Province
The federal government's inability to protect its own networks and critical infrastructure from cyber-threats was laid bare Tuesday, after Canada's auditor general pointed to holes in the country's cyber-security strategy despite more than a decade of ...

Huawei proposes national Cyber Security Evaluation Centre
CSO
Lord has called for more collaboration among vendors, operators, and governments to enhance cyber security, adding that no one has all the answers to tackling cyber threats. "As information and communications technology plays an increasingly ...

Iran Cyber Attack Highlights Growing Threat, Experts Say
Huffington Post
“Iran has invested very heavily in its cyber warfare capabilities,” said Frank J. Cilluffo, director of the Homeland Security Policy Institute at George Washington University. "And what they lack in capability ... "What defines an act of war in ...

Leading Technology Companies Announce Creation of Cyber Security ...
Sacramento Bee
President Obama has prioritized cyber threats as one of the most serious economic and national security challenges we face as a nation and a dependency to America's economic prosperity in the 21st century. CSRA seeks to achieve coordinated industry ...

Could Cyber Attacks Ruin Christmas for Retailers?
Fox Business
“The gloves are off in cyber space. The reality is if they want it to get worse, it can get worse,” said Dave Aitel, a former computer scientist at the National Security Agency. “I don't think people are really prepared mentally to what happens if ...

Cyber security threats are rising: Smith
The Australian Financial Review
Defence Minister Stephen Smith told the Defence Signals Directorate (DSD) cyber security conference threats are coming from foreign and domestic sources, including organised crime syndicates and nation states. "Australia is experiencing increasingly ...

The Australian Financial Review

The Cyber Attack on HSBC: What Happened
CFO.com Magazine
The Cyber Attack on HSBC: What Happened. “Denial of service” attacks like the recent launch against the global bank are a cyber threat that needs to be taken seriously – and not just by banks. Andrew Sawers ...

Cyber progress fueled by agency brass recognition
FederalNewsRadio.com
Whether it's Defense Secretary Leon Panetta's speech on a retired aircraft carrier earlier this month or the fact a cyber coordinator sits on the National Security Council and the National Economic Council, it's safe to say senior officials at all ...

Veracode Recognizes National Cyber Security Awareness Month
Equities.com
Today, enterprises and governments around the world recognize the most seriousthreats to their economic prosperity come from cyber security breaches. Underscoring the importance of cyber security, President Obama designated October as NationalCyber ...

Iran Cyber Attack Highlights Growing Threat, Experts Say
By The Huffington Post News Editors
“Iran has invested very heavily in its cyber warfare capabilities,” said Frank J. Cilluffo, director of the Homeland Security Policy Institute at George Washington University. "And what they ... "What defines an act of war in cyberspace? What is the ...
The Huffington Post | Full News Feed

Cisco Blog » Blog Archive » Cyber Security Month: Do you trust your ...
By John Stewart
Acknowledging the importance of cyber security, President Obama designated October as National Cyber Security Awareness Month to engage and educate public and private sector partners to raise awareness about cyber security and improve the resiliency of the nation in the ... Cisco is dedicated to protecting organizations from threats including malicious modification or substitution of technology, misuse of intellectual property, supply chain disruption and counterfeit products.
Cisco Blog

Army readies for offensive cyber attacks | Defense Tech
By Bryant Jordan
Senior Army officials said Tuesday that it is working to develop the service's offensivecyber warfare capabilities to go along with its cyber security capabilities to allow soldier to launch as well as detect and defeat threats. Military service ...
Defense Tech

China Cyber Threat: Huawei and American Policy Toward Chinese ...
The threat of a cyber attack from some Chinese companies should not discourage the U.S. from welcoming trade and investment from others.
www.heritage.org/.../china-cyber-threat-huawei-and-american-...

Are Chinese firms a cyber threat? – Global Public Square - CNN ...
By A. Greer Meisels & Mihoko Matsubara, Special to CNN. Editor's note: A. Greer Meisels is associate director and research fellow at the Center for the National ...
globalpublicsquare.blogs.cnn.com/.../are-chinese-firms-a-cybe...

Siemens Awarded Certification For Cyber Security Threat Protection ...
VANCOUVER, British Columbia and NUREMBERG, Germany < Oct. 23, 2012 Wurldtech Security Technologies, leaders in protecting mission-critical connected ...
www.darkreading.com/.../siemens-awarded-certification-for-c...

UK to invest in a future generation of code-breakers
He also emphasised that in the face of growing cyber threats, if the UK is to maintain a leading role on cyber issues to enhance the UK's economic growth, we ...
www.fco.gov.uk/en/news/latest-news/?view=News&amp;id...

Cyber-Threats Affect Industries Differently: Verizon Report
While financial services has to worry about targeted attacks looking to siphon money, healthcare breaches mainly affected smaller doctors' offices and were ...
www.eweek.com/.../cyber-threats-affect-industries-differently-...

China Cyber Threat

China Cyber Threat: Huawei and American Policy Toward Chinese Companies
Heritage.org
Examples include the first known large-scale act of cyber espionage, Titan Rain, in which China-based hackers broke into the networks of the Departments of State, Defense, Energy, and Homeland Security, as well as the networks of defense contractors, ...

Presidential Candidates Ignored Cyber-Security in Final Debate
PC Magazine
Our critical infrastructure is vulnerable to attack. ... Yet less than a week after Panetta warned of a potential "cyber Pearl Harbor," the two presidential candidates barely mentioned cyber-security in a debate that was supposed to be about foreign ...

UPDATE 2-Canada slow to respond to cyber threats - auditor
Reuters
The federal Conservative government has made limited progress in patching cracks in the security of Canada's physical and information technology network since a cyber attack crippled the Finance Department and Treasury Board in 2011, Auditor General ...

Siber Systems Recognizes National Cyber Security Awareness With Five Expert ...
Sacramento Bee
Visit http://www.dhs.gov/national-cyber-security-awareness-month for more information. RoboForm from Siber Systems allows users to securely create a Master Password which gives them access to multiple Logins. The solution can also create random and ...

Siemens Awarded Certification For Cyber Security Threat Protection
Dark Reading
Founded in 2006, Wurldtech is a software company providing protection for mission critical connected devices against the persistent and dynamic threat of cyber attack. Wurldtech follows our customers¹ security lifecycle by providing innovative ...

Cyber insecurity: Managing against the risk
FCW.com
Risk management has been part of IT security from Day One, but has often taken a backseat to aggressive zero-tolerance policies that sought to raise impenetrable barriers to security threats. Now we know better. An explosion in the volume and ...

Task Force Makes 11 Cyber Workforce Recommendations
govWin (blog)
As the cyber threat environment has intensified, industry and government find themselves competing for cyber security talent. In June 2012, the formation of a task force was announced whose goal would be fostering a national security workforce.

Rewrite of cyber circular aims to 'break some china'
FederalNewsRadio.com
A group of former federal cyber experts is recommending three major changes to Office of Management and Budget Circular A-130. The goal is to codify continuous monitoring, the role of the Homeland Security Department in overseeing the operational ...

Auditor warns Canada lagging on cyber security
Phys.Org
"It wasn't until 2010 that people became (fully) aware of the nature of cyber threats," he said. Ottawa announced stepped up security efforts that year but in January 2011, a cyber attack was still able to paralyze its computers, leading to a revamp of ...

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event
Sacramento Bee
COLUMBIA, Md., Oct. 23, 2012 -- /PRNewswire-iReach/ -- TECHEXPO has announced the speaker lineup for their semiannual Cyber Security hiring event, being held November 1 at the Sheraton Columbia Town Center in Maryland.

Auditor: Canada 'slow' on cyber security | The Raw Story
By Agence France-Presse
“It wasn't until 2010 that people became (fully) aware of the nature of cyber threats,” he said. Ottawa announced stepped up security efforts that year but in January 2011, a cyber attack was still able to paralyze its computers, leading to a ...
The Raw Story

Building a 21st Century Cyber Workforce | Homeland Security
By erin.waters
To minimize the risk of a successful cyber attack, we need everyone, including our industry partners, the general public, and yes, our partners in academia, to do their part. ... US flag Official website of the Department of Homeland Security ...
DHS Blog Feed

The auditor general on cyber security, veterans and national finance ...
By Aaron Wherry
While Finance Canada prepared a draft report in 2007 on the long-term fiscal sustainability analyses that the government committed to issuing that year, the analyses were not published; nor has any report on long-term fiscal sustainability ...
Macleans.ca

Canada falling behind on cyber-security, auditor general finds ...
By Jordan Press
Much of the lack of detail about how much money has gone to cyber-security, and what Canadians have received in return, stems from weaknesses in the government's cyber-security policy: there is a strategy to secure networks, but no action ...
canada.com

It's National Cyber Security Awareness Month - Tips for - SBA
In an effort to combat cyber-attacks, the Department of Homeland Security established October as National Cyber Security Awareness Month to educate the ...
www.sba.gov/.../it’s-national-cyber-security-awareness-mon

VMASC to Host Cyber-Security Conference This Month « News ...
ODU's Virginia Modeling, Analysis and Simulation Center is hosting and co- sponsoring the 12th annual ICS (Industrial Control Systems) Cyber-Security ...
www.odu.edu/news/2012/10/vmasc

India-Japan cyber security meet on November 5

India-Japan cyber security meet on November 5
The Hindu
India and Japan will hold their maiden dialogue on cyber security on November 5, it was decided at their “2+2” meeting in Tokyo on Monday. The four-hour meeting of the 2+2 or Foreign and Defence Secretaries from both sides, a format rarely used by New ...

Lancope Shares Top 5 Tips for Network Protection During National Cyber ...
Sacramento Bee
ATLANTA, Oct. 22, 2012 -- ATLANTA, Oct. 22, 2012 /PRNewswire/ -- Lancope, Inc., a leader in flow-based security and network performance monitoring, is leveraging National Cyber Security Awareness Month (NCSAM) to offer tips for improving enterprise ...

Cyber war targets Middle East oil companies
Phys.Org
A senior US administration official, who spoke on condition of anonymity, told AFP the cyber attackon the Gulf oil giants was believed to be carried out by a "state actor" and acknowledged that Iran would be a prime suspect. US officials have "more ...

Britain is target of up to 1000 cyber attacks every hour
Telegraph.co.uk
... unfettered access to sensitive government information”. Cyber crime is estimated to cost the UK about £27 billion annually, and earlier this year it emerged that anotherattack had cost a London business some £800 million. ... I see evidence every ...

Telegraph.co.uk

First European Cyber Security Month going well
Help Net Security
First European Cyber Security Month going well. Posted on 22 October 2012. Bookmark and Share. Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide.

Help Net Security

FCC Updates Small-Business Tool for Fighting Cyber Threats
Terra.com
While some small businesses on bootstrapped budgets might think of cyber security as an unnecessary cost -- that cyber criminals are more interested in bigger fish -- the FCC says smaller companies are increasingly in criminals' crosshairs. Like their ...

Facebook credits UAB with stopping international cyber criminals, donates ...
The Birmingham News - al.com (blog)
BIRMINGHAM, Alabama -- Facebook has donated $250,000 to UAB - a portion of the money the social media giant recovered from spammers and other cyber criminals with the school's assistance.... "As a result of numerous collaborations over the years ...

Buyer beware: Cyber scammers peddling counterfeit drugs
The Courier-Journal
Last year, 532 different medicines were identified as having been counterfeited, said Tom Kubic, president of the Pharmaceutical Security Institute, a global network of security directors for pharmaceutical manufacturers. The top three classes of drugs ...

ANPP Laments Absence of Cyber Crime Law
AllAfrica.com
... media reports where stakeholders in Nigeria Defence, Nigerian Communications Commission (NCC), the Economic and Financial Crimes Commission (EFCC) and other security agencies were worried with the emerging threat of cyber-crimes in the country ...

Big Brother is looking for a Cyber-Attack Pretext to Crack Down ...
By Juan
Cyber is “a new terrain for warfare,” Panetta tells us, a “battlefield of the future.” So perhaps it's time to ask two questions: In a world of cyber fear, what has the war on terror taught ... But in an age that has become increasingly tolerant of — or perhaps resigned to — the government's pursuit of information in violation of privacy rights, the prospects for future cyber-security policy are worrisome. After all, much of the information that might be at risk in so many potential cyber attacks — let's ...
Informed Comment

Army expected to assert cyber mission | Defense Tech
By Mike Hoffman
Pentagon officials have struggled to figure out what role they play in cyber security outside of protecting their own networks. Cyber is a growing threat within national security. Agencies like the NSA have more capabilities than a military service ...
Defense Tech

Weekend news round-up: avoiding a 'cyber Pearl Harbor'; confusion ...
“The White House decided to take the issue of cyber security into its own hands after Congress failed to pass related legislation on its own earlier this year. The information network joins provisions from previous versions of the order, which ...
Silicon Republic - News

In our opinion: Cyber security should be a national security priority ...
Using computers as weapons is a new form of warfare that may seem dubious to some, but the threat is real and the results could be devastating. Now is the ...
www.deseretnews.com/.../Cyber-security-should-be-a-national...

Deterrence Not Enough

US Cyber Experts: Deterrence Not Enough
DefenseNews.com
“The whole question of deterrence in cyber really doesn't apply to espionage,” said Irving Lachow, a fellow at the Center for a New American Security. “Every nation is spying. The only question is, who's spying ... Technical issues also loom, as ...

Defense chief calls cyberspace battlefront of the future
Chicago Tribune
"We confront a whole new threat of warfare in (cyberspace). ... This is an area we've got to pay close attention to. This is the battlefront of the future," he told a business group in Norfolk, Virginia, a city at the center of one of the largest ...

U.S. may share some cyber-threat info
San Francisco Chronicle
But the country also is poorly prepared to prevent such an attack, which could damage or knock out critical services that are part of everyday life. The White House declined to say when the president will sign the order. The draft order would put the ...

San Francisco Chronicle

Seminar on cyber law and security
The Hindu
The UGC Coordination Cell of D.G. Vaishnav College, Arumbakkam, organised a national seminar onCyber Law and Cyber Security. Faculty members from various parts of south India participated in the seminar. The objective of the seminar was to identify ...

BB&T's Website Affected By Cyber Attack
WFMY News 2
This includes world-class security infrastructures, state-of-the-art firewalls and ongoing evaluation of emerging security developments and threats," BB&T said in a statement. The Wall Street Journal said a hacker group called Qassam Cyber Fighters has ...

WFMY News 2

King County steps up cyber security after hackers hit city
Federal Way Mirror
The program is aimed at helping businesses, organizations and individuals increase their cyber security. The campaign offers simple tips on things from increasing password security to learning how to spot an email “phishing” attack and other attack ...

HSBC Websites Face Cyber Attacks
RedOrbit
HSBC said Friday that a number of its websites worldwide had been hit by a large-scale cyber attack, AFP reported. “On 18 October 2012 HSBC ... HSBC is taking steps to shore up any security holes and make sure its websites are operational. “We are ...

RedOrbit

Want to be a professional spy? Hone your social media, gaming skills
Times of India
LONDON: Britain launched a new spy recruitment drive on Thursday aimed at "Xbox generation" youngsters without a university education but with social media and computer game skills to counter the threat of cyber attack. Foreign Secretary William Hague ...

Report: White House adds intelligence-sharing measure to draft cyber order
The Hill (blog)
Under the measure, the Homeland Security Department would oversee the information-sharing effort and ensure intelligence reports about imminent cyber threats are disseminated to the potential target, according to the report. The White House began ...

Kaspersky's exploit-proof OS leaves security experts skeptical
PCWorld
Given the recent declarations from U.S. Secretary of Defense Leon Panetta and others that the nation is facing a "digital Pearl Harbor" or "digital 9/11" from hostile nation states like Iran, this sounds like the impossible dream come true -- the cyber ...

PCWorld

Iran Suspect in 'Cyber Pearl Harbor' Attack on Oil Giants
Arutz Sheva
American officials have "more than a suspicion" that Iran was to blame for the August attacks, said James Lewis, who has worked for the State Department and other government agencies on national security and cyber issues and who is now a senior fellow ...

Arutz Sheva

Generation XBox - the UK needs you for cyber-security
iTWire
Never mind the tap on the shoulder and a 'quiet conversation' at Oxford or Cambridge, the UK is hoping to attract game-playing school leavers as the next generation of code breakers. Having observed my own son's game-playing abilities (he's just 10 ...

Bunye: Cyber scams
Sun.Star
Due to increased security problem, we have increased the level of our online security. Your Account... The e-mail's poor grammar is enough to raise eyebrows, but how do we guard ourselves (and our bank accounts) from cyber phishers? The Information ...

Cyber war targets Middle East oil companies
Al-Arabiya
It took Aramco, the world's biggest oil company, two weeks after the August 15 attackto restore its main internal network, but the group said that oil production had not been disrupted. (AFP) ... U.S. officials have "more than a suspicion" that Iran ...

Al-Arabiya

Draft order would give companies cyberthreat info
The Tand D.com
Other sections establish a program to encourage companies to adopt voluntary security standards and direct federal agencies to determine whether existing cyber security regulations are adequate. The draft order directs the department to work with the ...

Voting For the Leader of the Free World...From Your Couch?
Fox Business
With cyber warfare an ever-rising threat, security experts are careful to note the many hurdles that still need to be overcome before an airtight system can be developed to handle something so vital as a presidential election. “We think there are some ...

Cyber attacks 'mainly an insider job'
Trade Arabia
The existing policy of allowing employees liberal access to a company's information technology systems is the main cause for cyber attacks in Bahrain, said a top Interior Ministry official. "In several prominent Bahraini firms all levels of management ...

eConflicts: News - Cyber-security: Innovation, Regulation and ...
By Daniel Ventre
eConflicts, blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, Chair on Cyber Defence & Cyber Security ... Dr. Chris C. Demchak, Professor, Strategic Research, NWC Center for Cyber conflict studies ...
eConflicts

Anonymizer Observes Cyber Security Awareness Month With Tips to ...
Anonymizer, Inc., http://www.anonymizer.com, Exposes Online Threats that Consumers May Not Be Aware of. San Diego, CA (PRWEB) October 16, 2012 ...
news.yahoo.com/anonymizer-observes-cyber-security-awaren...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com