Cyber-security alarms ring for military

Cyber-security alarms ring for military
This prospect looms as the U.S. Government Accountability Office, the congressional watchdog, has warned that critical infrastructures and federal operations are under increasing cyber-attack, placing sensitive information at risk, with a potential ...

US preparations for cyber war against China
World Socialist Web Site
The Times article on Tuesday based itself on the unsubstantiated and self-serving claims of a report prepared by cyber-security company Mandiant alleging that a Chinese military unit based in Shanghai had been responsible for sophisticated cyber ...

Fighting Cyber Warfare at the State Level
Wall Street Journal
The state has studied security practices used in the private sector and has begun training state employees in data-protection techniques, such as how to safeguard state-owned notebook computers. Michigan has also merged its cyber and physical security ...

Microsoft Victimized by Cyber Attack
The report claim that Microsoft general manager Matt Thomlinson has admitted to such an attack to the software company by saying, "As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion."...


Cyber security to be focus of next NATO meeting
CTV News
"We are seeing continuing attacks in the cyber arena, on the private sector, on the public sector, in the defense arena," Panetta told reporters as the two-day NATO ministerial here wrapped up. "This is without question the battlefield of the future ...

CTV News

US firms must beef up cyber security
Monterey County Herald
But while such high-level international cyber intruders grab headlines, most successful online attacks are not all that sophisticated. Despite their Hollywood-enhanced image as inventive uber-geeks, most hackers don't actually have to work very hard to ...

Hacker Jeremy Hammond Slams 'Flawed, Corrupt' Cyber Laws
PC Magazine
A hacker who is facing charges for his involvement in the extensive breach of security firm Stratfor has penned a jailhouse missive that takes the feds to task for a "flawed and corrupt" approach tocyber security. Jeremy Hammond (aka yohoho ...

Cyber attacks on NZ almost double - intelligence agency
... media on the rise · Microsoft, Symantec disrupt global cyber crime ring. In the past two weeks 75,000 people were forced to change their Yahoo-Xtra passwords after hackers broke into the email provider and issued a widespread spam attack. ... The ...

No room for complacency after Telecom cyber attack - watchdog
Radio New Zealand
A telecommunications watchdog says Telecom must remain vigilant after the company asserted its customers are no longer compromised following a major cyber attack. ... He says if a company is offering an email service it is very important it's secure.

more news below

5 Ways to Prepare for Cyber War

5 Ways to Prepare for Cyber War
ABC News
The president's call for a more serious approach to the growing threat of full spectrum cyber war, or "cybergeddon," came just a week before Mandiant, an American cyber security firm, released a 60-page report detailing a Chinese military unit in ...

IDF says engaged in 'constant cyber battle'
According to Moskovitz, the military diligently counters cyber attacks that threaten the IDF's secureoperational computer systems – systems which in turn facilitate weapons systems used by the troops on the ground, and whose failure holds soldiers ...

Tom Still: Assessing the threat of cyber attacks
Wisconsin State Journal
In the emerging world of cyber-warfare, the most pervasive threats may come from nests of sophisticated computer hackers in Shanghai, Tehran or Pyongyang. The release Monday of a private report that tracked 141 ... During his State of the Union address ...

Roundtable I: Cyber Security, Syria, and Iran
ABC News
Roundtable I: Cyber Security, Syria, and Iran. Rep. Mike Rogers, Rep. Eliot Engel, George Will, and Christiane Amanpour. 24:22 | 02/24/2013. Share: Transcript for Roundtable I: Cyber Security, Syria, and Iran. Good morning and welcome to "this week.

Cyber space is China's cold war
The Canberra Times
When British Prime Minister David Cameron agreed a new cyber-security pact with his Indian counterpart Manmohan Singh last week, he was not just seeking to protect the highly sensitive personal data of millions of British households that is stored by ...

The Canberra Times

Cyber-security risks in energy sector highlighted
Gulf Times
“Qatar's progress in cyber- security in the energy sector; a vital sector for Qatar's national economy, is being recognised the world over. The balanced anti-cyber threat mechanisms based on a modern regulatory framework and the adoption of an ...

Gulf Times

Investigation continues in Central Hudson cyber attack
The Register Star
“We are continuing to work with the New York State Police and we've brought in a cyber securityforensic expert to assist us in the investigation,” said Central Hudson Spokesman John Maserjian. “At this point we do not have any evidence that ...

Auditor Adam Edelen Concerned With Kentucky's Cyber Security; Vows to Monitor
Kentucky Auditor Adam Edelen found a dozen issues with the state's cyber security efforts in the 2011-12 fiscal year—and he's vowing to closely monitor the state's measures in that area in the coming months. The findings were reported in Edelen's ...

Cyber experts: no one's safe
Boston Herald
Security experts warn that the recent cyberattacks on Apple and the New York Times are only the highest-profile examples of an escalating problem that threatens American businesses and undermines national security. “A new frontier for ... “It's not ...

Hackers circulate tainted version of China cyber ... - Yahoo! News
From Yahoo! News: BOSTON (Reuters) - Unknown hackers are trying to infect computers by capitalizing on strong interest in a recent report by a security firm ...

Cyber Security Expert Discusses U.S. Vulnerabilities at Naval ...
A cyber expert addressed the Naval Academy Feb. 19 to address how computers are playing a major role in nearly every asp.

Scramble to increase cyber security has nothing to do with Chinese ...
Obama administration officials seemed to go out of their way to downplay the notion that the policy is aimed at troublesome China while unveiling a strategy ...

more news below

Stealthy cyber security startup Morta Security

Andreessen Horowitz, Greylock And Norwest Back Stealthy Cyber Security ...
Stealthy cyber security startup Morta Security is announcing seed funding from Andreessen Horowitz, Greylock Partners, Norwest Venture Partners, Data Collective, Larry Link, and Peter Wagner. While the company did not disclose the amount raised, we ...


More Cyber Security Training is Needed
A report from Techworld published on Feb. 12 highlights the need for more cybertraining in the U.K., and it is not the only country that has noticed this. The National Audit Office (NAO) points out that the lack of adequately trained individuals ...


Cyber Security In 2013: CISPA Bill, Obama Executive Order May Counteract ...
International Business Times
... Obama Executive Order May Counteract Chinese Cyber Hacking. (Photo: Reuters) The US has been suffering from a "maintained and sustained" cyber attack from China focusing on economic intelligence. Sponsorship Link ... The CISPA bill hopes to limit...

International Business Times

National Cyber Security Strategy Launched
Kenya on Tuesday announced the launch of the country's National Cybersecurity Strategy and Master Plan(NCSMP). The NCSMP will be part of the National ICT Masterplan that will be launched on Thursday this week. The launch was held at the Sarova ...

Qatar to setup cyber security system
Staff Major General Saad bin Jassim Al-Khulaifi, Director General of PublicSecurity and Chief of Police, said that the MOI is creating an organised legislative environment and IT infrastructure to counteract cyber crime, Gulf Times reported. ACyber ...

National Audit Office warns UK needs more skilled cyber-crime fighters
BBC News
The number of IT and cyber security professionals in the UK has not increased in line with the growth of the internet, the watchdog said. Labour said the report highlighted the lack of support for "the next generation of British cyber security experts ...

BBC News

IT Breaches and Cyber Security Risks Increasing for Texas Small Businesses
GlobeNewswire (press release)
NEW YORK, Feb. 12, 2013 (GLOBE NEWSWIRE) -- Small businesses in Texas are growing more concerned about their IT risks. Hiscox, the specialty insurer providing US small businesses with the simplest way to purchase customized business insurance ...

UK lacks on cyber security professionals
New Europe
The number of IT and cyber security workers is not growing in the same line as the Internet, explained the watchdog, which was warned by government, education and business representatives, and explained that "the current pipeline of graduates and ...

New Europe

Budget 2013: Nasscom demands cyber security important components of ...
Economic Times
... competitiveness in the Budget 2013. NEW DELHI: The National Association of Software and Services Companies (Nasscom) has recommended cyber securityprovisions for important component of national security and competitiveness in the Budget 2013.

Economic Times

Microsoft Takes a Closer Look at Cyber Security and Malware
The threat of cyber-based attacks on US infrastructure is so serious that President Obama is expected to finally unveil his executive order on cyber security sometime after his State of the Union address. The State of the Union address will take place ...


Bad cyber security bill CISPA heading back to the House
Rumors of CISPA's demise were apparently greatly exaggerated, according to various privacy rights advocates and organizations today. CISPA, or the Cyber Intelligence Sharing and Protection Act, initially sought to give American companies more legal ...


US target of sustained cyber-espionage campaign
China is the top cyberthreat to the U.S. and has been intensifying attacks on U.S. businesses to identify data that will help the country gain economically, according to a recently obtained nationalsecurity document. Over the past five years, the ...

US said to be target of massive cyber-espionage campaign
Washington Post
A new intelligence assessment has concluded that the United States is the target of a massive, sustained cyber-espionage campaign that is threatening the country's economic competitiveness, according to individuals familiar with the report. The ...

With cyber attacks on the rise, is your company's data secure?
The Guardian (blog)
On one dark day in 2007, HM Revenue and Customs Service (HMRC) lost computer disks with the details of 25 million benefit recipients. When an organisation publicly endures an IT security disaster of this magnitude, corporate leaders take notice, says...

The Guardian (blog)

US getting cyber-robbed "every single day," Rogers says
CBS News
Mike Rogers, R-Mich., is set to introduce a cyber security bill "as early as this week," the House Intelligence Committee chairman said today on "Face the Nation." "We're getting robbed every single day," Rogers said during a panel discussion on the ...

Confronting Cyber Barbary Pirates
Wall Street Journal
Russia used cyber warfare against Estonia and Georgia. Last week, cyber spies infiltrated hundreds of thousands of Twitter accounts, getting access to ... In their 2008 essay "Freedom of the Cyber Seas," published in CSO Magazine, a security trade ...

Wall Street Journal

'Lax practices' to blame for cyber-attacks
The European Commission has finally published its long-awaited cyber security strategy, which reflects the realisation that cyber-attacks are not a purely military matter. Any conflict ... One-third of all UK small businesses suffered a cyber-attack ...

As Attacks Mount, Governments Grapple With Cybersecurity Policies
All Things Digital
Long in coming — cyber security has simmered in the background of the national security policy agenda for at least two years — the new order will create a set of standards that private companies operating critical infrastructure, such as power plans ...

more news below

Cooperation crucial in facing US cyber threats

Cooperation seen as crucial in facing US cyber threats
House Intelligence Committee Chairman Mike Rogers of Michigan reintroduced his cyber-securitybill on Wednesday with a pledge there would be no schism with the White House over the issue. Obama threatened to veto the bill in 2012, citing lax safeguards ...

Cyber-security To the barricades
The Economist
Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to passcyber-security legislation that matches the growing threat. “We cannot look ... It ...

The Economist

OC cyber security firm raises $15 million
Cylance Inc., an Irvine cyber security firm, has received $15 million in funding from Khosla Ventures in Menlo Park and Fairhaven Capital in Cambridge, Mass., the company announced Wednesday. Cylance said it will use the money to accelerate the ...

Cyber-security shares fall; Citi skeptical of lift
SAN FRANCISCO (MarketWatch) -- Shares of several firms in the cyber-security space slipped on Wednesday morning after a Citigroup analyst expressed skepticism that an executive order from President Obama will have much impact on the sector. In a note ...

Obama Cyber-Security Executive Order Lacks Legislative Backbone
12, President Barack Obama announced that he had signed an executive order that would allow federal agencies to share information with private industry about cyberthreats, attacks and the activities of known criminals and cyber-terrorists. The order ...


Mum's the Word on Cyber Security (blog)
On Wednesday, the president delivered a straight-talking, impassioned address detailing ambitious plans to improve and reform just about everything. In 378 words he explained how America's energy infrastructure needed to move towards more efficient and ...

UK cyber strategy held back by skills shortage
This week in the United Kingdom, the National Audit Office released its independent review of the UK's cyber security strategy, and found that while positive steps had been made since its inception, the government faces six main challenges in realising ...

Cyber-security measure getting new attention
Declaring that America is losing an aggressive cyber-espionage campaign waged from China, administration officials and lawmakers Wednesday agreed to push legislation that would make it easier for the government and industry to share information about ...


Cloud dependence worries EU cyber security agency
ITWorld Canada
European businesses and critical infrastructures are far too dependent on cloud services and that's not a very good thing, according to the European Union's top cyber security body. The cloud is a major security concern given the pervasiveness of its ...

ITWorld Canada

Cyber-security battle looms after Barack Obama directive
Because most of the networks in question are in private hands, officials say they must rely on voluntary reporting by industry of any cyber threats or attacks. Legislation would be needed to shield businesses from liability when they do report ...


Cyber security battle looms after Obama issues directive | The Raw ...
By Agence France-Presse
President Barack Obama's order aimed at ramping up protection from cyberattacks will address only a small portion of threats and sets up a fresh battle in Congress over legislation. Obama acted this week after two failed attempts in Congress ...
The Raw Story

Executive Order -- Improving Critical Infrastructure Cybersecurity ...
The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national ...

Highly anticipated executive order on cybersecurity signed ... - The Hill
Senior administration officials frame the executive order as a way to continue the conversation oncyber-security policy and have stressed that, unlike legislation, ...

more news below

BAE to beef up Vodafone cyber security

BAE to beef up Vodafone cyber security
The first part of the agreement will see a new cloud-based mobile security product rolled out to Vodafone's 1,500 largest corporate customers this spring. The product, Vodafone Mobile Threat Manager, places Detica's cyber security technology into ...

Cyber Security: Presidential Executive Order
Emergency Management (blog)
I don't recall that he mentioned it, but Congress failed to pass legislation in 2012 and so this was his recourse to them doing nothing on the issue of cyber security. Back then the business community had gotten its claws into legislators and convinced ...
See all stories on this topic »

Retailers, Restaurants Remain Attractive Targets for Cyber-Criminals
An analysis of breach data for 2012 found that retailers and the hospitality industry continued to command the most interest from cyber-criminals, accounting for 78 percent of the breaches documented by security services firm Trustwave. ... In addition...


US Cyber Security executive order falls short for the private sector
Financial Times
The cyber security executive order issued this week by President Obama has been broadly welcomed by companies although some, including Verizon Communications, the US telecommunications group, have argued that legislation facilitating information ...

Cyber skulduggery threatens us all
Financial Times
But in the past decade, criminals have not only grown more ambitious, they have also mingled withcyber industrial espionage and the developing defence sector of cyber warfare. A 2007 attack on Estonia forced it to switch off its web connection to the ...

Facebook Investigates 'Sophisticated' Cyber Attack
Fox Business
FOXBusiness. Facebook (FB) said late Friday is it is investigating what it called a “sophisticated”cyber attack. ... Facebook is continuing to work with its internal engineers, security teams, other organizations and law enforcement on the issue. The ...

more news below

Controversial CISPA Cyber-Security Bill Returns

Controversial CISPA Cyber-Security Bill Returns Next Week
PC Magazine
A controversial cyber-security bill will return next week when Reps. Mike Rogers and C.A. Dutch Ruppersberger reintroduce the measure in the House. The congressmen - chairman and ranking member of the House Permanent Select Committee on ...

Ahead of Obama Cybersecurity Order, Europe Releases Its Own Agenda
The administration has been working on an executive order designed to heightencyber-security standards, and it is expected to issue it after President Obama's Feb. 12 State of the Union address, according to Bloomberg. Though adherence would be ...


The truth about the UK's cyber security capabilities?
SC Magazine UK
The original story had come from Computing, which also featured a former cyber intelligence officer for the US Army and the Defense Intelligence Agency (DIA) named Bob Ayers. He told Computing that he felt that Britain's cyber security program was "a ...

Commission unveils plans for expanded cyber breach notification regime
In the event of a cyber security breach that has a "significant impact on the security of the core services they provide", the public administrators and market operators would have to notify designed regulators within EU member states of the incident ...

Mixed reaction to EC's cyber security plan
The European Commission has published a cyber security strategy alongside a proposed Directive on network and information security (NIS) with mixed ...

more news below

Cisco buys Czech cyber security firm

Cisco buys Czech cyber security firm - Silicon Valley Business Journal: "Cisco Systems is beefing up its security by picking up Cognitive Security, a Prague-based that uses artificial intelligence to detect cyber threats. Cognitive Security was founded in August 2009 and is led by CEO and founder Martin Rehak, who is also a researcher at the Czech Technical University. The Czech company opened a branch office in Silicon Valley in April 2010."

Time to Change the Rules of the Cyber-Security Game |
Cyber criminals and spies are breaking into companies and government agencies on a daily basis. The last few days have highlighted yet another series of such ...

Europe tops Microsoft cyber security policy report
The report said that, by identifying the underlying principles of certain policies that are correlated with over-performance in cyber security – such as intergovernmental frameworks for cooperation and voluntary codes of conduct – policymakers can ...

'Cyber-terrorism does not pose a significant threat to the Western security ...
The Voice of Russia
In this respect, at the moment, cyber-terrorism per se does not pose a significant threat to the Western security; cyber-crime does. Voice of Russia: How about the harm that a cyber-attack can cause to a state's economy or military infrastructure? We ...

The Voice of Russia

Obama's preemptive cyber attack disclosure a warning to China
The Obama administration's finding that the president has the power to order a preemptive cyberstrike stands as a warning to China, which remains unresponsive to U.S. efforts to curtail digital attacks from the country, cyber security experts say. The ...

When Luddites Handle Cyber Security, You End Up With American Law Firms
Above the Law
Cyber security is all the rage this week, with President Obama announcing that he's working on a new cyber war plan and the Internets freaking out that the Super Bowl blackout was really a Chinese hacking effort. Some of you probably assume the ATL ...

Above the Law

Pentagon expands cyber defense amid daily attacks
CBS News
Despite its imposing facade, the U.S. Federal Reserve could not stop the latest attack. On Sunday, hackers broke ... General Michael Hayden, who headed the CIA and National Security Agency, sayscyber enemies can do much greater harm. He said hackers ...

more news below

Pentagon to increase cyber security force

Pentagon's new massive expansion of 'cyber-security' unit is about everything ...
The Guardian (blog)
This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and ...

The Guardian (blog)

Pentagon to increase cyber security force fivefold - report
The decision to expand the security force was also made late last year. The US suspected that the attacks were orchestrated in Iran, and some officials stated the deep-rooted concern that full-on cyber warfare was emerging between the two countries.


US Defense Department plans to quintuple cyber security forces
Press TV
The US Department of Defense is embarking on a colossal expansion of its cybersecurity forces from the current number of 900 to 4,900, US defense officials say. Based on the decision, the Pentagon is planning three separate forces under its Cyber...

Press TV

Unseen, all-out cyber war on the U.S. has begun
A cyber war has been brewing for at least the past year, and although you might view this battle as governments going head to head in a shadow fight, security experts say the battleground is shifting from government entities to the private sector, to ...

Pentagon to boost cyber security force
Reuters UK
The plan, which would increase both military and civilian staffing at U.S. Cyber Command, comes as the Pentagon moves toward elevating the new command and putting it on the same level as the major combatant commands. The official said no formal ...

Downgrade for cyber security white paper
The Australian
Last week, Julia Gillard nominated the threat of cyber attack as one of the defining national securitychallenges of our age, along with the rise of China. To help tackle the threat, the Prime Minister announced the creation of the Australian Cyber ...

Pentagon plans to expand its cyber-security force
Minneapolis Star Tribune
WASHINGTON - The Pentagon has approved a major expansion of its cyber-security force over the next several years, more than quadrupling its size to bolster the nation's ability to defend critical computer systems and conduct offensive computer ...

US approves major boost for cyber security
The US has approved a five-fold expansion of its cyber-security force over coming years to increase its ability to defend critical computer networks, The Washington Post reports. Citing unnamed officials, the newspaper says the Defense Department's ...

more news below

Taking cybersecurity seriously

We must all take our cyber-security seriously
The Guardian Blogs (blog)
It has been a fragile week for cyber-security, with system breaches affecting a quarter-of-a-million Twitter accounts coming on the heels of online assaults against both the New York Times and the Wall Street Journal, apparently by highly sophisticated ...

Danger does not compute in cyber war
Sydney Morning Herald
THE number of serious cyber attacks investigated by Canberra's defence spy agency doubled last year, new figures show, as security experts warn of dangerous complacency in the Australian community about data protection. Cyber specialists say many ...

Sydney Morning Herald

Cyber Attacks: when will they constitute acts of war?
Asian Tribune
The news of the cyber-attack launched at Twitter, the micro-blogging site, on Friday, which resulted in the exposure of usernames, encrypted passwords and email addresses of more than a quarter of a million users, came hard on the heels of a catalogue ...

Asian Tribune

Businesses Facing Increasing Cyber Threats: Security Experts
Disastrous cyber-war attacks that could be life threatening are not far off if the government and businesses do not take action soon, security experts warned ...

more news below

US government debates action over Chinese cyberattacks

Better Late Than Never?

US government debates action over alleged Chinese cyberattacks | ZDNet: The new National Intelligence Estimate will address cyberattacks as a threat to the economy -- often seen when you consider not only the problems caused by downtime, but also in relation to the money organizations and businesses have to spend in order to defend against and repair the damage left by cyberattackers. One U.S. official said that it will "cite more directly a role by the Chinese government in such espionage," according to the news agency. In addition, the report is expected to address ways to pave the way for diplomatic and trade measures against the government unless the situation is placed under control. Secretary of State Hillary Rodham Clinton said this week: "We have to begin making it clear to the Chinese that the United States is going to have to take action to protect not only our government's, but our private sector, from this kind of illegal intrusions."

more news below

U.S. homeland chief: cyber 9/11 could happen "imminently"

U.S. homeland chief: cyber 9/11 could happen "imminently" - Yahoo! News: "Homeland Security Secretary Janet Napolitano warned on Thursday that a major cyber attack is a looming threat and could have the same sort of impact as last year's Superstorm Sandy, which knocked out electricity in a large swathe of the Northeast. Napolitano said a "cyber 9/11" could happen "imminently" and that critical infrastructure - including water, electricity and gas - was very vulnerable to such a strike. "We shouldn't wait until there is a 9/11 in the cyber world. There are things we can and should be doing right now that, if not prevent, would mitigate the extent of damage," said Napolitano, speaking at the Wilson Center think tank in Washington and referring to the September 11, 2001, attacks. Napolitano runs the sprawling Homeland Security Department that was created 10 years ago in the aftermath of September 11 and charged with preventing another such event." 

more news below

China outsourcing costs developer his job

Security audit finds dev OUTSOURCED his JOB to China to goof off at work • The Register: " . . . A security audit of a US critical infrastructure company last year revealed that its star developer had outsourced his own job to a Chinese subcontractor and was spending all his work time playing around on the internet. The firm's telecommunications supplier Verizon was called in after the company set up a basic VPN system with two-factor authentication so staff could work at home. The VPN traffic logs showed a regular series of logins to the company's main server from Shenyang, China, using the credentials of the firm's top programmer, "Bob". . . "

Mega users: If you're hacked once, you're hacked for life | ZDNet: "Mega's site states that it is "the master encryption key to all of your data" and that "if you lose it, you lose access to all of your files that are not in a shared folder and that you have no previously exported file or folder key for." However, tying the password deeply into the encryption scheme also means that it is impossible to reset or change a user's password without throwing away the encryption keys. Combined with the current inability for users to close their account and create a new one, and users are stuck with whatever password they signed up with. Hopefully, that wasn't "password," while they figured out whether they wanted to keep using the service."

Big things for small player in cyber security
Cambridge News
It came as something of a surprise to me that over 40% of companies worldwide are not prepared forcyber threats and the like. This steered me towards the sector where IT experts focus on addressing the need for security across the internet to protect ...

UK, NZ to work together on cyber security
"New Zealand and the United Kingdom have a long history of co-operation on defence and securitypolicy based on our shared values, and cyber space is one of the greatest national, global and strategic challenges now of our time," said Hague.

Super-cyber security NZ-UK alliance
"New Zealand and the United Kingdom are already working closely together to confront the growing threats to our cyber security, and it is vital to our wider, shared economic, security and defence interests that we do so." The two said they did not ...

Kaspersky Labs finds "Red October" cyber-espionage malware
CBS News
Kaspersky Labs, an online security firm, announced Monday that for at least five years, a cyber-espionage campaign has breached computer networks at diplomatic, government and scientific research organizations. A campaign called "Red October," or...

CBS News

Cops secure SC from cyber law protesters
Philippine Star
The MPD leadership said that the policemen deployed to the SC have been advised to "observe maximum tolerance" as they manage the crowd of protesters of the new cyber law who held a vigil on Monday night near the high court's compound. More groups ...

NZ and UK to work on cyber security
3News NZ
New Zealand and the United Kingdom are set to work more closely on cyber security, following talks between Foreign Affairs Minister Murray McCully and British Foreign Secretary William Hague. Mr Hague arrived in Auckland today for his second visit to ...

3News NZ

The hunt for Red October: five-year cyber espionage campaign uncovered
Sydney Morning Herald
Cisco makes security priority · Security resources for companies. A Russian cybersecurity company issued a report on Monday saying that it had identified a sophisticated cyber espionage campaign that has been in operation since 2007. The spy campaign ...

Sydney Morning Herald

India hit by 'Red October' cyber spy campaign
Times of India
MOSCOW: India is among the nations hit by a cyber espionage that has been targeting diplomatic, governmental as well as scientific research organization at least for five years, according to a Russian cyber security firm. Termed as 'Red October', the ...

Times of India

'Red October' cyber-attack discovered by Russian researchers
"Red October," a cyber-attack that has been targeting government institutions since 2007, has been discovered by Russian researchers. Russian cyber-security firm Kaspersky and other cyberemergency response teams have been on a hunt to track down the ...

more news below

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud