Security Tips - How to Unplug Java from the Browser

How to Unplug Java from the Browser — Krebs on Security: "For Windows users: Mozilla Firefox: From the main menu select Add-ons, and then disable any plugins with the word “Java” in them. Restart the browser. Google Chrome: Click the wrench icon in the upper right corner of the browser window, then select Settings. In the search results box to the right in the next screen, type “Java”. A box labeled “Content settings” should be highlighted. Click that, and then scroll down to the Plug-ins section. Click the “Disable individual plug-ins” link, find Java in the list, and click the disable link next to it. Internet Explorer: Apparently, getting Java unplugged from Internet Explorer is not straightforward. The U.S. Computer Emergency Response Team (USCERT) lists the following steps, which may or may not completely remove Java from IE:"

Philadelphia Federal Credit Union : Phone Fraud: "Tips for handling suspicious callers - Never give private information, such as your Social Security number, account or credit card numbers, passwords, etc. over the phone unless you initiated the call. If you receive an automated call or a call from someone claiming to be a credit union employee and they ask for your account information (such as your credit card number, account number, etc.) do not give them any information. Even if the caller has one identifying piece of information (such as your Social Security number), the call is not legitimate. Do not provide any additional account information or any sensitive or personal information. The credit union will not call you and ask for this information. Don't agree to any offer or prize where you have to pay a registration or shipping fee, or send money, to claim the "prize." Don't be pressured to make an immediate decision."

State without cyber-security officer for a year, official testifies
Greenville News
COLUMBIA — The state has gone about a year without a cyber security officer, according to testimony today as the Senate opened hearings into the massive data breach at the Department of Revenue. DOR Director Jim Etter, who has resigned but will remain ...

As leadership changes, Cyber security remains critical issue for Congress
Government Security News
The intricate, frustrating job of putting together and pushing through the comprehensive Cyber security legislation that escaped Lieberman and the 112th congress will fall to incoming Senate Homeland Security Committee chairman Tom Carper (D-DE) and ...

DEFCON 1: 5 Internet Security Stocks To Consider As Cyber Attacks Escalate
Seeking Alpha
Cyber attacks, cyber crime and network threats are increasing in volume, intensity, and sophistication as 2013 approaches. Such attacks threaten our national security and do billions of dollars of damage to our economy. 2013 will usher a new set of ...

Obama Administration in Talks to Draft Cyber-Security Executive Order
eWeek
The Obama administration has been reaching out to various interest groups for input on an executive order that would implement some of the provisions of cyber-securitylegislation that failed for a second time in the U.S. Senate. The White House is ...

eWeek

Real-world cyber city used to train cyber warriors
Help Net Security
... warriors from the U.S. Military how online actions can have kinetic effects. SANS has defined various missions within CyberCity to help train cyber warriors to defend against online attacks and teach them how to secure a city's vital physical ...

Help Net Security

Petri: A Cyber Monday hangover
Denver Post
I frequently forget my parents' birthdays, the president who came after Chester A. Arthur and the words of "The Charge of the Light Brigade," but never my three-digit security code. Those simple numbers are engraved on my heart. I need them to buy ...

Cyber threats raise security spending
EE Times India
"Banks and other financial institutions are always a step behind, despite deploying some of the most advanced cyber security solutions available on the market," says Michela Menting, cyber securitysenior analyst. "The lack of larger-scale cooperation ...

UK cyber security - fragmented and failing
Computing
Mark Brown, director of information security at professional services firm Ernst & Young, agreed with Ayers that there is no clear direction from the government as to what the cyber responsibilities of the different departments are. "It is a question ...

Computing

Business cyber security measures 'woefully inadequate'
BCS
The cyber security measures being taken by businesses are "woefully inadequate" according to a new report by antivirus specialist Kaspersky. Its research shows that only 25 per cent of IT specialists think their company is completely protected from ...

EuroparlTV video: Cyber security: How safe are you?
Euro MPs believe the EU responded 'late' to the threat of state and criminal cyber attacks and are now seeking a fix.

Cyber security according to Winnie the Pooh: new report by EU ...
The EU 'cyber security' Agency ENISA is launching an in-depth study on 30 different 'digital traps' or honeypots that can be used by Computer Emergency ...

EU must bolster its cyber security say MEPs - Computer Business ...
MEPs call for better coordination to protect cyberspace.



Cyber Monday Cyber Security

Cyber Monday 2012 sales require security awareness
ABC7Chicago.com
More: Bio, Facebook, Twitter, News Team. November 26, 2012 (CHICAGO) (WLS) --Cyber Monday has become an opportunity for retailers to catch your attention with all those ads. Cyber Monday online shopping safety tips · Cyber Monday bargains: apps, ...

ABC7Chicago.com

Cyber warriors, the need of the hour in India
Times of India
Amidst this cloud of cyber crimes, there is a silver lining that comes in the form of job opportunities for students in the field of information security. Recognising the dearth of trained cyber security experts, the Indian government has expanded the ...

Times of India

Cyber Monday: How to stay secure and find the best deals
KARE
According to the National Retail Federation, 247 million people hit the stores and the web over Thanksgiving weekend. That's up 9.2 percent from last year. In the holiday crowd at Mall of America is Linda Beyers. She did some birthday and Christmas ...

KARE

Cyber Monday: Five Tips for Safe Online Holiday Shopping
ABC News
... but Cyber Monday comes with its own host of dangers. Online Black Friday shopping was already up 26 percent from last year according to comScore and if you review some of the major online security threats from the past year, you'll realize that...

ABC News

Cyber Monday security
KFVS
(KFVS) -. The Thanksgiving holiday, with it's Black Friday frenzy, may be over, but the shopping continues on-line with Cyber Monday. A record 247 million shoppers made purchases over the four day holiday weekend, up 9.2% from last year. Retailers are ...

DATCP: Be Mindful of Security on Cyber Monday
WMTV
Many shoppers are looking for online deals this Cyber Monday. But, before logging on this, you'll want to think about your cyber security. The Wisconsin Department of Agriculture, Trade and Consumer Protection says it's important for online shoppers to ...

Cyber Monday Not Entirely Safe
KIONrightnow.com
Black Friday may be over but Cyber Monday is designed to drag you back in for another round of shopping deals! But how can you protect your information ... is for I don't want to deal with crazy people." So be safe and secure and be aware on Cyber Monday.

EPHA Briefing on Cyber Security and Health Technologies
European Public Health Alliance
However, the security risk presented – be it through malfunction or deliberate attack – is less widely recognised. Regulation of security measures has not kept pace with the rapid development of this field, neither in legislation regarding cyber ...

Futurity.org – Cyber crime threatens smartphones in 2013
By Liz Klipp-Georgia Tech
The report from the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security. ... One possible example is for attackers to use stolen credit card information to purchase cloud computing resources and create dangerous clusters of temporary virtual attack systems.
Futurity.org

Cyber Security Expert Says Preventing Attacks Are Key - NJ Today
Cyber security has been on the minds of many who fear an attack could cause major problems. AT&T Chief Security Officer Edward Amoroso told NJ Today ...



Cyber Monday Warning

Cyber Monday Warning
WREG
The Monday following Thanksgiving has come to be known as Cyber Monday when people head back to work and do online shopping. ... Longer passwords are moresecure and harder to crack. ... It increases security risks. Beware of deals that sound too good ...

WREG

Cyber Security Challenge announces second round competitions
ComputerWeekly.com
Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting talented people to the profession and informing them about cybersecurity careers and training. In the latest round of competitions, professional cyber ...

Save some money to spend on Small Business Saturday, Cyber Monday
San Gabriel Valley Tribune
Save some cash, though, for the other spin-off shopping days that have emerged from Black Friday: Small Business Saturday and Cyber Monday. In an effort to bring more awareness to small businesses during the holiday season, American Express in 2010 ...

Cyber Corps program trains spies for the digital age
Los Angeles Times
It may sound like a Jason Bourne movie, but the little-known program has funneled most of its graduates to the CIA and the Pentagon's National Security Agency, which conducts America's digital spying. Other graduates have taken ... of HomelandSecurity ...

Los Angeles Times

Cyber Security Expert Says Preventing Attacks Are Key
NJ Today
AT&T Chief Security Officer Edward Amoroso says security experts like himself work to reduce the risk of cyber attacks, which could be harmful since our society has become more dependent on technology. For more New Jersey news, visit NJ Today online at ...

Online Shopping Tips For Black Friday and Cyber Monday
Huffington Post
A quick security sweep to fend off holiday hackers and thieves Cyber-scrooges are out in full force, armed with all kinds of new ways to rob you blind. Before you pull out that plastic and start spending, be sure your computer, laptop, or ...

US prime suspect in malware attack on Sarkozy
The Hindu
Flame is a technically complex malware that introduces secret monitoring capacity into high security computers, including for purposes of cyber warfare. The U.S. became a prime suspect because the malware used to hack into the Elysee Palace computers ...

The Hindu

NSA declines to release presidential Cyber directive
Government Security News
The National Security Agency (NSA) said it will not publicly release a Presidential Directive document that would establish a broader set of standards that would guide federal agencies in confronting Cyber threats. Presidential Policy Directive 20 ...

Cyber Attacks On EU Governments Caused 'Considerable Economic Damage'
TechWeekEurope UK
The report also called for “a comprehensive EU cyber security strategy which should provide a common definition of cyber security and defence and of what constitutes a defence-related cyber attack”. Yesterday, EU cyber agency ENISA encouraged ...

TechWeekEurope UK

Cyber Monday: Productivity Loss Top Concern
Channelnomics
During Cyber Monday, however, the number of users that simultaneously bombard online shopping sites exponentially rises — and this has a pretty hefty impact on businesses productivity, securityand bandwidth. The greatest concerns regarding this ...

U.S. First Committee Cyber Security statement » US Mission Geneva
By EB
Statement by the Delegation of the United States of America, to the Other Disarmament Issues and International Security Segment of Thematic Debate, in the First Committee of the Sixty-seventh Session of the United Nations General ...
US Mission Geneva

French officials accuse US of hacking Sarkozy computers

Report: French officials accuse US of hacking Sarkozy's computers - The Hill's Global Affairs: " . . . The Obama administration on Wednesday, though, denied those reports.“We categorically deny the allegations by unnamed sources that the U.S. government participated in a cyberattack against the French government,” Homeland Security spokesman Matthew Chandler told The Hill in a statement. “France is one of our strongest allies. “Our outstanding cooperation in intelligence sharing, law enforcement and cyber defense has never been stronger, and remains essential in successfully combating the common threat of extremism,” Chandler added. According to the l'Express report, Homeland Security Secretary Janet Napolitano reportedly did not deny the allegations when asked point-blank about them. . . . But an Obama administration official says Napolitano dismissed the question out of hand with laughter because it was “preposterous.”

SMBs face the biggest threats from Cyber Monday shopping
PCWorld
Because of the popularity of Cyber Monday shopping, 59% of businesses were more concerned about loss of productivity than potential security threats to networks, even though hackers are extra busy sending out spam messages promising great deals.

US 'launched Flame cyber attack on Sarkozy's office'
BBC News
The palace has since confirmed a big cyber attack did take place. The US embassy in Paris "categorically denied" the US had been involved in any cyber attack on the French government. US Secretary of Homeland Security Janet Napolitano, for her part,...

BBC News

Israeli Cyber Warfare: Hackers Create Cyber Havoc On Web Sites – OpEd
Eurasia Review
The vast majority of the cyber attacks were aimed at the sites of the security establishment, the president's residence, the foreign ministry and the prime minister's office, the minister's statement noted. The Law Enforcement Examiner's source in ...

Kudelski establishes new Cyber Security division
Broadband TV News
The Kudleski Group, best known for its media content protection, has launched a new Cyber Security division. Kudelski Security is centered around the privacy and confidentiality of data and analytics within a cloud dependent ecosystem. The portfolio ...

Alabama Among Best in Cyber Security, Revenue Chief Says
WPMI Local 15 News
Magee said she learned through a conference call following the attack Alabama is 1 of only 3 states with its level of cyber security. A hacker, believed to be operating from Russia, gained access to 3.8 million social security numbers of individual ...

The threat landscape: the next trends in cyber security
CSO Magazine
Recent cyber assaults against major organisations including Google, NATO and security companies have demonstrated the ability of zero-day attacks to evade even the most sophisticated anti-virus programs. In the coming ... The Pentagon recently reported ...

BT: Olympics cyber attackers were amateurs
Register
Twelve year old hacktivists and journalists with infected laptops were the biggest info security threats to the London 2012 Games - an event which in the end was notable for the absence of a major cyber attack, BT has revealed. The telco giant was in ...

F-Secure Announces 'Top 10 Most Dangerous Holiday Gifts' for Cyber Monday ...
Marketwire (press release)
SAN JOSE, CA--(Marketwire - Nov 21, 2012) - F-Secure is releasing its Cyber Monday Cyber-Watch List today, an annual compilation of the most 'dangerous' holiday gifts to be encountered while shopping online this year based the prevalence of 'poisoned' ...

Businesses Bracing For Security, Productivity Impact On Cyber Monday
Biztech2.com
The survey found 59 percent of businesses were more concerned about loss of employee productivity from online shopping on Cyber Monday than they were worried about potential network threats. Companies ranging in size from ... In conjunction with our ...

Stocks in Cyber Security Set to Take Off: Analyst — CNBC.com ...
The CNBC Stock Blog is a cross-section of expert opinions and insights from our TV and Web site coverage. This blog includes posts written by and about top ...




US government agency causes cybersecurity risk at NYSE

Need a reason why the US government has no business telling others how to do cybersecurity? Read the story at the link below to see how the US government SEC created a huge problem for NYSE Euronext--

NYSE hires former Homeland Security chief - Chicago Tribune: "NYSE Euronext hired former Homeland Security Secretary Michael Chertoff to make sure sensitive exchange data were not breached after U.S. securities regulators left their computers unencrypted, according to a person familiar with the matter. The computers, iPads, and other Apple devices belonged to employees in an office within the Securities and Exchange Commission's Trading and Markets Division that is responsible for making sure exchanges protect themselves from cyber threats. . . . The NYSE, however, has reason to believe other unsecured devices contained exchange data are only now being reviewed, well after the outside forensics firm Stroz Friedberg completed its independent analysis, the person familiar with the matter said. The inspector general's report states that while there were 28 laptops in question, the outside firm conducted forensic testing on "several select laptops" to determine if a breach occurred. The NYSE is concerned the review was not broad enough and did not cover all of the affected devices, the person said. It has been promised, but still has not seen, a copy of Stroz Friedberg's report, according to the source. A representative of Stroz Friedberg was not immediately available for comment. Moreover, this person said, the exchange operator is upset that the SEC knew about this problem for months, but only told the exchange in early October."

Stocks in Cyber Security Set to Take Off: Analyst
CNBC.com (blog)
Though worrisome, there is a potential beneficiary set to gain from this threat, explains one analyst: the cyber security industry. “Companies have no choice but to spend on security,” Daniel Ives, senior analyst at FBR Capital Markets, told CNBC. This ...

The Gaza Strip Cyber War
VICE
On the Telecomix Wiki, 16 cyber-security and surveillance companies that are either Israeli or have offices in Israel are listed. One such company, Allot, saw its stocks plummet last December when it broke an Israel/Iran trade embargo by selling its ...

VICE

Cyber Crime Costs Financial Sector Billions in Losses
AllAfrica.com
Nairobi — The financial sector in the East African region is losing over Sh170 billion every year through cyber crime, according to Cyber Security Africa, a UK-based information and e-commercesecurity provider. The firm's manager for Africa Sammy ...

Basic tips for cyber shopping safely this season
Bizjournals.com
A week from today, the media-created shopping holiday “Cyber Monday” officially kicks off the online holiday shopping rush. FTI Consulting estimates that online holiday shopping will increase by 13 percent this year and online scams are likely to ...

Cyber criminals now going mobile
Hindu Business Line
Cyber criminals never sit idle. They go where Internet users go. With the usage of mobile and cloud platforms going up significantly, cyber criminals seem to have increased their focus on this new, unchartered hunting ground. Internet security ...

Database Security on Cyber Monday
The Data Center Journal (blog)
The Monday after Thanksgiving, also known as Cyber Monday, has become the busiest online shopping day of the year for American consumers. With the influx of online activity, companies should be aware of the higher-than-normal security threats such as ...

The Data Center Journal (blog)

Asahi Technologies Announces 24/7 Cyber Attack Surveillance to Help Online ...
Equities.com
Installing a customized and credible cyber security system is the need of the hour. Asahi Technologies, with its unique capability to measure cyber risk, launches 24x7 security features with round the clock monitoring services that are on par with the ...

Small businesses still underestimate cost of security breaches
ZDNet
Summary: The good news is that more SMBs are shoring up cyber-security defenses, but many worry the measures they are taking won't be adequate. Heather Clancy. By Heather Clancy for Small Business Matters | November 19, 2012 -- 13:00 GMT (05:00 ...

Poolesville High School cyber team scores big in state competition
Gazette.Net: Maryland Community News Online
... Baltimore County at the Maryland Cyber Challenge last month. The team took first place in thecyber security competition. Close Window. Photo by Lindsay Hebert (From left) Science Applications International Corporation Chief Information Officer ...

BBB tips for Black Friday, Cyber Monday
Fall River Herald News (blog)
Black Friday and Cyber Monday, the Friday and Monday after Thanksgiving, are the most popular holiday shopping days of the year. Whether heading to the local malls or shopping online to avoid the large crowds, the Better Business Bureau warns buyers to ...

Capital Business » Cyber crime costs financial sector billions in losses
By MARGARET WAHITO
NAIROBI, Kenya, Nov 19 – The financial sector in the East African region is losing over Sh170 billion every year through cyber crime, according to Cyber Security Africa, a UK-based information and e-commerce security provider. The firm's ...
Capital Business



Cybersecurity and cybercrime 2012 review

A year in cybersecurity and cybercrime: 2012 review | ZDNet: "SOPA alone would have allowed Web sites to be shuttered, no matter where they are in the world, by blocking them at server level and starving them of oxygen. Any site even to have allegedly breached copyright could be effectively shut down by the U.S. government with little oversight or process of appeal. Google-owned YouTube, for instance, could have fallen foul of the law if someone uploaded a copyright infringing video, leading to a widespread site block. The Internet as a collective rallied around and protested in a way that had never been tested or tried before. Many major Web sites shut their doors for 12 or 24 hours during 'Black Wednesday' to protest the bill. More than 75,000 Web sites blacked out, including Wikipedia and Google. Days later, it was shelved by the U.S. House of Representatives and ultimately the geeks 'won.'"

Minister Toews Highlights Cyber Security at 2012 Halifax International ...
U.S. Politics Today
HALIFAX, NOVA SCOTIA -- (Marketwire) -- 11/18/12 -- Today, Public Safety Minister Vic Toews underscored the Government of Canada's commitment to cyber security at the 2012 Halifax International Security Forum, an annual forum that brings together ...

Cyber security a worsening concern for businesses
Foster's Daily Democrat
PORTSMOUTH — “Computer intrusions and network attacks are the greatest cyber threat to our national security,” FBI Director Robert S. Mueller III told a U.S. Senate homeland security panel in September. ... “Banks are under attack,” he said. “It's a ...
Israel targeted in cyber-warfare
The Australian
"This is an unprecedented attack," Steinitz said, indicating that Israel had "deflected 44 millioncyber attacks on government websites" since it began a widespread air campaign over Gaza on Wednesday. "All the attacks were thwarted except for ... down ...
Cyber workers in high demand
Fort Wayne Journal Gazette
In suburban Maryland, The National Security Agency at Fort Meade – the center of the cyber galaxy – has thousands of computer scientists, mathematicians and engineers gathering foreign intelligence electronically and defending the government's ...
The Top 35 Strategies to Mitigate Targeted Cyber Intrusions
Wired (blog)
“The Defence Signals Directorate (DSD) has developed a list of strategies to mitigate targeted cyberintrusions. The list is informed by DSD's experience in operational cyber security, including responding to serious cyber incidents and performing ...
Ameren shares security system with Japanese
Peoria Journal Star
Ameren Illinois is sharing portions of its highly regarded cyber-security system with officials from several Japanese gas companies. Japan's natural gas industry is seeking cyber-security systems assistance after a large amount of data was stolen from ...

Obama Secret Directive Gives Cyber-Control to Military For National Security
Axis of Logic
Google is stating in their most recent Transparency Report that the US government has stepped up their surveillance on civilians. According to the Internet giant, more personal data is being profiled on Americans and their habits on the Web. Dorothy ...

Axis of Logic

Black Friday and Cyber Monday: How to Stay Safe Shopping Online
Decoded Science
... the Christmas mood. Instead of braving the shops, why not shop online from the comfort of your own home? Cyber Monday is a convenient alternative to the crowded stores, but before you start handing over your credit card number, you need to be aware ...

Decoded Science

Cyber gaming raids
Daily Express
In the first raid, at about 4pm on Monday, 40 computers and 40 Internet modems were seized at a premises in Cyber Square. Police also detained two suspects who were working in the premises at the time. Meanwhile, 20 gaming consoles and two suspects ...

Mile2: Attacking Cybercrime From The Inside Out
investmentunderground
There are increasingly more dangerous instances of cyber security breaches which involve government and military data bases being breached along with information that is sensitive to national security. Businesses are now faced with the constant threat ...

investmentunderground

 

US cybersecurity report points to China

US cybersecurity report points accusing finger at China - CSMonitor.com: "While it is still unknown who in China, specifically, is doing the hacking, technical gains are helping trackers trace cyberespionage "campaigns" back to the country. Among the culprits, according to the annual report to Congress of the US-China Economic and Security Review Commission: The People's Liberation Army. Informal "cyber warfare militia" composed of workers with high-tech day jobs that focus on military communications, electronic warfare, and computer network operations. Three intelligence and security service ministries. Patriotic hackers conducting espionage out of nationalist fervor. Criminal hackers conducting industrial espionage for private, state-owned, or government clients. Big IT companies and telecommunications firms."

Obama May Sign Cyber Security Executive Order
CIO Today
"If signing an executive order does nothing other than help move cyber securityspending up the stack of 2013 IT budgets, it will be a win for us all." Cyber securityreform died in the Senate once again. But President Obama may sign an ... the United...

CIO Today

Cyber Security Bill Blocked in U.S. Senate
eSecurity Planet
"Homeland Security Secretary Janet Napolitano said recently that attacks on U.S. financial institutions and stock exchanges showed the need for more cybersafeguards. Defense Secretary Leon Panetta said last month that unnamed foreign elements had ...

eSecurity Planet

'Spectacular' Cyber Attack Looms: Security Official
CNBC.com (blog)
Congress failed to push the Cyber Security Act of 2012, a bill that enabled the federal government to take control of all communication capabilities—including the cybersecurity standards of water, power, and utility companies—during a cyberemergency ...

CNBC.com (blog)

Cyber security at the cost of privacy?
NDTV
... Report, the government's surveillance of internet users is on the rise with India ranking second in accessing private details of its citizens, next only to the US. Watch full show:http://www.ndtv.com/video/player/india-decides-9/cyber-security-at ...

Killer Apps: Dozens of cyber vulnerabilities found at Department of Energy ...
Foreign Policy (blog)
At a time when senior defense officials are sounding the alarms about the potential for a devastatingcyber attack against America's critical infrastructure, the U.S. Department of Energy's inspector general (IG) has found dozens of unaddressed cyber ...

Cyber-threat is real and 'potentially devastating,' former CSIS spy warns
Edmonton Journal
"One significant cyber-attack on a critical infrastructure node will bring calamity upon all of us," Boisvert said during a panel discussion sponsored by the Canadian Association for Security and Intelligence Studies. "I will say categorically from my ...

Cyber attack issues and security in the news
Examiner.com
Speaking from the Senate floor, Reid said the White House believes the cybersecurity bill is of critical importance to the nation's security. Reid signaled that he's aiming to move to the cyber bill before the Senate breaks for the Thanksgiving holiday.

Thinking about Security from the Inside Out
Wired (blog)
Historically, IT security has been all about defending against external threats. However, the recent cyber-attack against oil giant Saudi Aramco reinforces the need to give equal weight to internal threats as well. On August 15, 2012, an insider at ...
 
Wired (blog)

Insight: Lockheed's F-35 logistics system revolutionary but risky
Chicago Tribune
But having such a large and widely dispersed group increases exposure to cyber attacks, said Ben Freeman, national security investigator with the non-profit Project on Government Oversight. "Even if Lockheed has top-notch cyber security, it's still ...

Lame Duck Threat: Cyber Security
Harry Reid may bring another big-government cyber security bill--perhaps the so- called Whitehouse-Kyl compromise--to the floor during the lame duck session.

What to Read on Cybersecurity | Foreign Affairs
There is an unfortunate tendency among journalists and politicians to call every breach in computersecurity an act of cyberwar, when, in fact, the vast majority of ...

OSCE's Cyber Security Confidence Building Measures Revealed by ...
This second batch of documents contains up-to-date information on the OSCE's Internal Working Group 1039 whose mandate (.pdf) is to create cyber security ...



Petraeus Mission Impossible: Cloaking Email, Online Identities

Petraeus Mission Impossible: Cloaking Email, Online Identities
InformationWeek
Meanwhile, Backtrace Security also found, hidden in a LulzSec chat file, a domain name that led to a subdomain that mirrored a page where Monsegur had posted a picture of his beloved Toyota AE86. Seeing so-called security experts commit basic ...

Cyber security legislation again voted down in Senate
Government Security News
The Cyber security bill backed by the leader of the Senate Homeland Security committee was voted down for a second time on Nov. 14, probably kicking any possible congressional action on the issue into next year and setting the stage for an Executive ...

Obama signs guidelines for cyber-operations: official
Chicago Tribune
WASHINGTON (Reuters) - President Barack Obama has signed a classified directive laying out new guidelines for cyber-operations that national security planners can use to protect U.S. computer networks from attack, a senior administration official said ...

NYU-Poly Contest Challenges Young Videographers: Make Us All Cyber-Secure
Sacramento Bee
This is the first year Adobe is sponsoring the contest, which is part of the university's Cyber Security Awareness Week (CSAW) games, a three-day face-off among the country's top computersecurity students that begins today, November 15, 2012.

Georgia Tech Releases Cyber Threats Forecast for 2013
Dark Reading
Those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging CyberThreats Report for 2013. The report was released at the annual ...

Cyber Monday is almost here: 5 ways to stay secure while shopping online
VentureBeat
This story was contributed by Bob Bunge, cyber security expert and associate professor in the College of Engineering and Information Sciences at DeVry University. Online purchases grew by approximately 10 percent from 2010 to 2011, with the average ...

VentureBeat

Cyber Security Bill Dead After Second US Senate Rebuff
ClaimsJournal.com
Senate Majority Leader Harry Reid declared a U.S. cyber security bill, opposed by business and privacy groups, dead on Wednesday after it failed a test vote for the second time. The bill would have increased information-sharing between intelligence ...

SC governor orders cabinet-wide Cyber protections after massive data breach
Government Security News
The Governor of South Carolina ordered cabinet-wide Cyber Security measures to be put in place as the state reels under a massive electronic breach of its revenue department's data. Cyber thieves stole over 3.5 million Social Security numbers and ...

Cyber Threats Forecast For 2013 By Georgia Tech
RedOrbit
On Wednesday, the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) released the Georgia Tech Emerging CyberThreats Report for 2013 at the Georgia Tech Cyber Security Summit, a gathering of industry and ...

RedOrbit

Report: Chinese Espionage 'Growing and Persistent Threat' to US Economy
Minyanville.com
Released yesterday, the federally-mandated annual assessment of Sino-American relations and the associated national security implications maintains that "Chinese actors are the world's most active and persistent perpetrators of economic espionage ...

New Network Takes Aim at Cyber Threats to National Security
SurfKY News
Lisa Monaco, Assistant Attorney General for National Security, said at a cyber-conference last month in Seattle, “We often think of national security threats, like that of a catastrophic terroristattack, as questions about prevention. But the cyber ...

Attorneys: Obama's 'secret' cyber security law may allow 'military ...
By Stephen C. Webster
The White House on Wednesday receieved a Freedom of Information Act (FOIA) request (PDF link) from two attorneys with the Electronic Privacy Information Center (EPIC), demanding that President Barack Obama release the text of what they ...
The Raw Story

Defense.gov News Article: Panetta 'Disappointed' as Cyber ...
“Secretary Panetta was disappointed to learn that the Senate failed to move forward on the Cybersecurity Act of 2012, which would have enhanced our nation's ability to protect itself againstcyber threats, which are growing at an alarming rate,” Little said. Cyberattacks threaten to have crippling effects on America's ... legislation would have enhanced those efforts. If the Congress neglects to address this security problem urgently, the consequences could be devastating.” Biographies: ...
American Forces Press Service News Feed

Pre-election, Obama quietly signed off on new rules for cyber security
By Graeme McMillan
You may not have known it, but the United States has been better protected against cyber-terrorism since last month, due to a classified directive redefining the military's responses to online attacksigned by President Obama.



Congress urged to probe Chinese cyber-espionage

Congress urged to probe Chinese cyber-espionage
Reuters
WASHINGTON (Reuters) - The U.S. Congress should conduct an in-depth assessment of Chinesecyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage, a federal advisory group said Wednesday. The ...

Yes, the FBI and CIA can read your email. Here's how | ZDNet: "The U.S. government -- and likely your own government, for that matter -- is either watching your online activity every minute of the day through automated methods and non-human eavesdropping techniques, or has the ability to dip in as and when it deems necessary -- sometimes with a warrant, sometimes without. . . . What caught Petraeus out was, of all things, his usage of Google's online email service, Gmail. . . . "

Cyber security bill is one of the most important issues facing Congress
Examiner.com
We are going to have a vote on cyber security. I spoke to the chairman of the committee a short time ago, Senator Lieberman. He is going to come over tomorrow and give a speech about the importance of this legislation. He and Senator Collins have...

Examiner.com

Haley orders extra cyber security
WPDE
South Carolina Governor Haley announced Wednesday she handed down an Executive Order requiring extra forms of cyber security be implemented in all of her cabinet agencies. The order requires all of the cabinet agencies to use 24-7 monitoring by South ...

AT&T Cyber Security Is $1 Billion Business Opportunity, Company Says
Huffington Post
Jules said AT&T's strategy for its global business solutions unit was to accompany big multinationals as they expand overseas to provide them not just with connectivity but new products and services like security and machine-to-machine technology ...

Report: Obama authorizes new cyber warfare directive
The Hill (blog)
“The directive establishes principles and processes for the use of cyber operations so that cybertools are integrated with the fully array of national security tools we have at our disposal,” the official said. “It provides a whole-of-government ...

Georgia Tech Cyber Threats Forecast for 2013: In Two Words - 'Very Active'
Techzone360
The annual Georgia Tech Cyber Security Summit is always a great event for catching up on what IT and risk assessment professionals need to be mindful of for protecting their data and the networks that critical information flows over. The event is also ...

New Cyber Group Aims To Spread Basic Security
DefenseNews.com
The critical control concept, where a simple list of security ideas is created as a starting point for cybersecurity efforts, is not new. The NSA created a version for internal use several years ago. At the suggestion of several cyber experts, John ...

HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security
eWeek
After the Cyber-Security Act of 2012 failed to pass, Rockefeller sent a letter on Sept. 19 to 500 CEOs, including many from health care organizations, to suggest that they conduct an audit of their level of preparedness for cyber-attacks. He inquired ...

Report warns electricity grid vulnerable to attack
Reuters
WASHINGTON (Reuters) - The electrical grid is vulnerable to terrorist attacks, including cyberstrikes, that could cause far more damage than those associated with natural disasters such as Hurricane Sandy, according to a report released on Wednesday ...

Tips to avoid cyber thieves
Bluefield Daily Telegraph
Don't share passwords with anyone. Avoid using common words, phrases, or personal information. Update regularly. • Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available free ...

ACLU worries about effects of Obama's 'vague' secret cyber security ...
By Stephen C. Webster
CISPA, however, included some things that Democrats actually wanted to do, like setting securitystandards for networks outside the government, which was at the heart of the squabble over cyber security earlier this year on Capitol Hill. Since that dust-up, Obama's staff has been drafting an executive order that would ... Building a relationship now in case there is an attack on private networks? Making resources available to critical infrastructure? There's so many ways you can go ...
The Raw Story

Georgia Tech releases cyber threats forecast for 2013 | Science Codex
By News
Those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging CyberThreats Report for 2013. The report was released at the annual Georgia ... One possible example is for attackers to use stolen credit card information to purchase cloud computing resources and create dangerous clusters of temporary virtual attack systems. Search History Poisoning – Cyber ...
Science Codex - Science news,...

Obama Signs Cyber Warfare Strategy - Business Insider
By Geoffrey Ingersoll
Nakashima reports that that the directive had been signed back in October, but the new cyber security defense capabilities are secret, and they can't be accessed. Crucially the new rules seem to allow for far more pre-emptive action. From the ...
Business Insider



Lockheed says cyber attacks up sharply, suppliers targeted

Lockheed says cyber attacks up sharply, suppliers targeted
Chicago Tribune
1 supplier, Lockheed Martin Corp, on Monday cited dramatic growth in the number and sophistication of international cyber attacks on its networks and said it was contacting suppliers to help them shore up their security. Chandra McMahon, Lockheed ...

Federal agencies, private firms fiercely compete in hiring cyber experts
Washington Post
Along the Baltimore-Washington Parkway, the concentration of government agencies and contractors brimming with computer geeks rivals any cyber defense area on the planet. And in this age of growing cyber threats, those firms are engaged in a ...

Researcher to tackle cyber security for North American power grid
SecurityInfoWatch
Because electrical substations play such a key role in our nation's critical infrastructure, they can be attractive targets for nation-state actors, cyber-terrorists, hacktivists, extortionists and a variety of other adversaries. Cyber-security ...

Seven 2013 Cyber Security Predictions From Websense Security Labs
Business Solutions Magazine
Seven 2013 Cyber Security Predictions From Websense Security Labs. November 13, 2012. Malicious mobile apps, government-sponsored attacks and sandbox avoidance expected. SAN DIEGO—From mass Wordpress compromises to a spear-phishing attack on the White ...

Craven CC Cyber Collective students play to win
New Bern Sun Journal
The first event, Cyber Security Awareness Capture the Flag, organized by the Polytechnic Institute of New York University, was designed to have students find “flags” integrated in computer systems, or hidden in network traffic — a combination ...

Cyber-cops in United Arab Emirates given more leeway for crackdowns on Web ...
Washington Post
... the country's rulers or calling for demonstrations. The measures are another sign of tougher cyber-policing efforts by Western-backed leaders across the Gulf amid growing concerns over perceived political or security threats since the Arab Spring ...

Cyber-attack: An act of war?
ITWorld Canada
But what happens when enemy (or unfriendly) countries launch cyber-attacks that damage physical infrastructure (as the Stuxnet virus is widely believed to have done in Iran), or terrorists cause economic damage? Is it time to fuel up the bombers ...

ITWorld Canada

Two Thirds Of Brits Back Pre-Emptive Cyber Strikes On Enemy States, Reveals ...
Dark Reading
13 November, 2012 - LogRhythm, the leader in cyber threat defence, detection and response, today announced the results of a survey that suggests that the UK public is growing increasingly concerned about national cyber security, following the number of ...

Experts: State needs long-term cyber security plan | The Greenville ...
COLUMBIA — A month after state officials learned of a massive data breach at the Department of Revenue, officials are still discussing what security measures ...

US Cyber Security Direction
The recent election results put Obama into a second term. It wasn't mentioned much in the debates but the state of cyber and security in the United States is a ...



Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout

Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout
InformationWeek
The pioneering Stuxnet computer virus, which was designed to attack a single Iranian uranium enrichment facility, went on to infect PCs around the world. Security experts have identified thousands of resulting Stuxnet infections. On Monday ...

Symantec predicts cyber crime developments in 2013
Wired (blog)
Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation states ...

Petraeus revelation began as cyber-harassment probe; investigation ended 4 ...
NBCNews.com (blog)
After investigating a potential case of "cyber-harassment" for several months, the FBI wrapped up its case after interviewing Paula Broadwell -- the biographer of former CIA director David Petraeus -- on Friday, Nov. 2, four days ... "I was contacted ...

STONESOFT'S UPDATED STRATEGY: AIMING AT RAPID GROWTH IN 2013 ...
Reuters
The company's updated strategy for the years 2013-2014 is based on rapid growth in the rapidly growing security market. Stonesoft's growth strategy is divided into cyber security-, customer-, product-, channel-, and marketing strategies, each of which ...

Cyber-Theft from Our Nation's Banks a Growing Threat
Wizbang (blog)
Banks and the financial services industry need to step up their game on cyber security and lawmakers should act to bring more transparency to the process. The days of just doing a minimal job at prevent cyber-theft must end and better theft prevention ...

Israel police to launch cyber-security unit
Jerusalem Post
Speaking at the HLS conference on homeland security in Tel Aviv, Danino said that he participated in an Interpol conference in Rome last week in which cyber crime was identified as an issue that threatens the whole world. “Terrorist groups and ...

Introducing the Michigan Cyber Range
Public CIO (blog)
What test & research facilities are quipped and available to simulate different advanced malware attack scenarios – without impacting operational networks? Is there a way to bring together world-class training, virtual ... Critical areas that will ...

ICAO must act on cyber security
Air Traffic Management
Cyber security encompasses the protection of electronic systems from malicious electronic attackand the means of dealing with the consequences of such attacks. It comprises managerial, operational and technical activities, and relates to the ...

Lunarline Seeks to Fill Open Positions at Corporate Gray Security Clearance ...
Sacramento Bee
12, 2012 -- /PRNewswire/ -- Cyber security and privacy company, Lunarline, will be at the Corporate Gray Security Clearance Job Fair on Friday, November 16. The event will be held from 9:00am to 12:30pm in the Waterford Reception Center in Springfield, ...

Communication Ministers Urge Int'l Cooperation for Cyber Security
Liberian Daily Observer
A high level ministerial meeting on “Addressing the challenges of a Hyperconnected World” has called for international cooperation in ensuring global cyber security and combating incoming cyberthreats, which is essential for building a safe ...

Cyber Security shields users' systems | New Gear | PC Retail
Cyber Security aims to keep Mac users safe from all types of web threats, including viruses, worms and spyware, offering them the peace of mind that they can share personal or sensitive data online without the worry of it falling into the wrong ...
PCR: Stream

Don't Be a Victim of a Cyber Attack: International Hacker Puts ...
By Ann Brown
Can you imagine 3.6 million social security numbers stolen? It happened. And such massive personal data theft can only happen via a cyber attack. Late last month, an international hackerillegally obtained tax information from a South ...
Madame Noire | Black Women's...

European Commission Officials Hacked At Internet Governance Forum

European Commission Officials Hacked At Internet Governance Forum: "A European official says her staff members were hacked when they joined her for a conference on Internet security in Azerbaijan. European Commission Vice President Neelie Kroes said in a blog post Saturday that her advisers' computers were compromised as they attended a meeting of the Internet Governance Forum in Baku, the Azeri capital. Her spokesman, Ryan Heath, said the attack occurred while they were in their hotel. Heath said he and a colleague got messages from Apple Inc. warning them that their computers had been accessed by an unauthorized party, something he said he believed was an attempt to spy on him. "I'm presuming it was some kind of surveillance," he said in a telephone interview. "What we're going to do is to get the computers forensically analyzed to see what if anything was taken out of them.""

Security firms: Beware of cyber ransomware
Israel Hayom
Internet security firm Symnatec Corporation published a report last week on an increasingly popular form of cyber extortion known as Ransomware, which has netted criminal groups hundreds of thousands of dollars. Ransomware locks a user out of their ...

Experts: State Needs Long-Term Cyber Security Plan
WLTX.com
He's served as a commissioner on a presidential commission on cyber security and serves on the board of the National cyber Security Alliance, the International cyber Security Protection Alliance, and the National Board of Information Security Examiners ...

Israel's HLS 2012 Event Highlights Cyber Security Innovations
Defense Update
Cyber-security specialist protecting the network's most sensitive asset – its 'privileged accounts' is Cyber-Ark. Authorized to access to all system resources, these accounts are the primary attack vector for enterprise cyber-assaults. In addition to ...

Defense Update

SC Taxpayers confused about cyber attack
WACH
... WACH Fox · WACH Fox's feed. 0. Read more: Local, Community, News, Legal, South Carolina Hacking, International Hackers, Tax Information Exposed, Stolen Information, Stolen Social SecurityInformation, Private Information Exposed, Cyber Attack ...

Michigan Launches 'Cyber Range' to Enhance Cybersecurity
Government Technology
“Every day, breaches to computer systems threaten the security of data – data that may include personal information about Michigan's citizens,” Snyder said in the release. “This partnership to establish the Michigan Cyber Range benefits all levels of ...

Windows Defender Stops 85 Percent of Common Malware: BitDefender
eWeek
In an analysis, the firm found 15 percent of what the security firm classifies as the malware families most favored cyber-criminals this year were able to successfully run on Windows 8 with Windows Defender on. That translated into 61 of the 385 ...

eWeek

Cyber Criminals can make your Diwali unforgettable with Scams ...
By noreply@blogger.com (Mohit Kumar)
Cyber criminals become hyper active during festivals. Diwali is no exception. Shantanu Ghosh, Vice-President and Managing Director (India Product Operations) of Internet security solutions company Symantec has observed that malware ...
The Hacker News [ THN ] - World's...



cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com