Tips for staying safe online

Securing Your Home Network |  Here are ways to secure your wireless router:
  • Change the name of your router: The default ID - called a service set identifier” (SSIS) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others.
  • Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters and symbols.
  • Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA. They are more secure than the WEP option.
  • Create a guest password: Some routers allow for guests to use the network via a separate password. If you have many visitors to your home, it’s a good idea to set up a guest network.
  • Use a firewall: Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don't permit. Your operating system and/or security software likely comes with a pre-installed firewall, but make sure you turn on these features.
Coordinated by the U.S. Department of Homeland Security, the Multi-State Information Sharing and Analysis Center (ISAC), the National Cyber Security Alliance, many governments, businesses, schools and other groups, National Cyber Security Awareness ...

Chromium Blog: Pwnium 2: results and wrap-up: "As part of our ongoing effort to reward exceptional vulnerability research in the security community, we hosted the Pwnium 2 competition at Hack in the Box 2012 in Kuala Lumpur yesterday. We’re happy to confirm that we received a valid exploit from returning pwner, Pinkie Pie. This pwn relies on a WebKit Scalable Vector Graphics (SVG) compromise to exploit the renderer process and a second bug in the IPC layer to escape the Chrome sandbox. Since this exploit depends entirely on bugs within Chrome to achieve code execution, it qualifies for our highest award level as a “full Chrome exploit,” a $60,000 prize and free Chromebook."

Wonkbook: A 'cyber Pearl Harbor'?
Washington Post (blog)
Such a destructive cyber terrorist attack could paralyze the nation…These attacks mark ... Panetta said the U.S. military has pumped $3 billion into cyber security efforts that include the recruitment of an army of cyber-warriors to fight off attacks ...

India to set up cyber security panel
By IANS,. New Delhi : To counter cyber attacks in economic and social infrastructure development, the government Monday said it would set up a joint working group to engage the private sector and will start four pilot projects for the purpose. "We hope ...

US must protect against cyber threats from China
The Hill (blog)
The issues that surface when considering Huawei and ZTE reiterate the need for Congress to establish industry cyber-security standards. Currently, the federal government's ability to sharecyber-security threat information with the private sector, as ...

'MiniFlame' malware used in cyber espionage attacks
... of attacks are less focused on quantity and more on hitting specific targets. "MiniFlame is a high precision attack tool. Most likely it is a targeted cyberweapon used in what can be defined as the second wave of a cyberattack," Alexander Gostev ...

Panetta says Tehran is developing cyber plans; former official says US has ...
Dark Reading
U.S. Defense Secretary Leon Panetta last week said that the cyber threat from Iran is becoming larger, and hinted that the U.S. has connected Iran with recent cyber attacks on Saudi Aramco and other middle eastern oil companies. According to a ...

Cyber Attacks Against Wells Fargo 'Significant,' Says CFO
Wall Street & Technology
A group that calls itself the Cyber Fighters of Izz ad-din Al Qassam has claimed credit for the recent bank attacks, declaring them a protest against the anti-Islam video posted on YouTube and stoked violent protests across the Muslim world. The ...

Iran's Cyber Warfare
Canada Free Press
The recent statement by US Secretary of Defense Leon Panetta about the need to confront Iraniancyber warfare waged against American targets highlights developments of the last two years regarding Iran's extended activity to construct defensive and ...

US Defense Secretary warns of “Pearl Harbor” cyber attack by Iran
World Socialist Web Site
Panetta was the guest of honor Thursday at a New York City dinner organized by the trade group Business Executives for National Security, a lobbying front for military contractors. His comments followed an alleged cyber attack against the Saudi Arabian ...

Combating Today's Relentless Cyber Attacks
Credit Union Times
Criminals have also complicated the situation by developing methods to evade detection fromsecurity countermeasures. A prime example is the Black Hole exploit kit – one of the most prevalent and successful tools available to cyber-criminals today.

Successful completion for Portugal's European Cyber Security Month
First reports from Portugal's European Cyber Security events show that the initiative is a success.

Maryland College Gets $5 Million NSF Cyber Security Grant ...
The award will support the National CyberWatch Center, which is headquartered at Prince George's Community College.

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud