Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract

Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract to Support C4ISR, Cybersecurity Programs - "August 02, 2013-- Booz Allen Hamilton today announced it has now won four of the Full and Open Pillar contracts involving a range of full system lifecycle support activities for the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic). Most recently, the firm won a contract with a total ceiling of nearly $900 million to support the integrated cybersecurity and Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) operations of the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic)."

Cyber security company FireEye files for a $175 million IPO
FireEye, which provides malware protection software to enterprises, filed on Friday with the SEC to raise up to $175 million in an initial public offering.

We Need a Dialogue on Cyber Security
Radio World
Like it or not, cyber security will continue to be a fact of life for broadcasters and ... EAS systems for any potential indications of attack or unauthorized access.

more news below

Cyber Security, Cyber Funding

Cyber Funding Under Our Noses
Government Technology
The recent leaks detailing the U.S. National Security Agency's extensive monitoring ... development for state and local governments and our overall cyber health.

Government Technology

The Tensions And Overlaps Between Cyber And Data Security
Metropolitan Corporate Counsel
The U.S. Food and Drug Administration (FDA) warns about the risk of cyber attacks on medical devices. The White House is implementing an Executive Order ...

DefCon: Former DHS cyber official to private sector: Gov't can't help ...
SC Magazine
The former deputy undersecretary for cyber security at the Department of ... can't act quickly enough to help private companies defend against a possible attack.

Klobuchar wants to reduce risk of cyber attacks to infrastructure
Alexandria Echo Press
The Cybersecurity Act of 2013 aims to help secure the nation from cyber threats by providing NIST, a non-regulatory agency within the Department of Commerce ...

BT and Vodafone helped UK cyber-spying effort, report claims
Snowden is a former National Security Agency (NSA) contractor who leaked the US ... Questions related to national security are a matter for governments not ...


more news below

Cybersecurity, Cybercrime

Cyber criminals try to steal fin data using fake tax ads: McAfee
Economic Times
Cyber criminals are busy using phishing e-mails and fake ads to steal confidential financial data of users, cyber security firm McAfee said today. NEW DELHI: As ...

Economic Times

Nasdaq faces huge cyber-security challenges
Nasdaq faces huge cyber-security challenges.... To be sure, all financial services companies are under attack these days. But the especially ...

UBA Advocates Increased Cyber-security Vigilance By Banks
Leadership Newspapers
UBA Advocates Increased Cyber-security Vigilance By Banks ... particular case, the probability of attack would be very high and the consequence, very severe.

Leadership Newspapers

more news below

CEO concerns about malware attacks and cyber-espionage

Cyber-Security Confidence Lacking Among Executives
A whopping 97 percent of enterprises with annual security budgets totaling more than ... reported concerns about malware attacks and cyber-espionage tactics. ... in five say their biggest concern is not knowing whether an attack is underway, ...

Report recommends cyber-security white paper within a year
ABC Online
A new report by the Australian Strategic Policy Institute recommends the incoming government develop a white paper focusing on the country's cyber-security ...

Graduate Cyber Security Consultant
We are looking for talented Graduates to join BAE Systems Detica's Cyber Security Business Unit (BU). The Cyber Security BU supports our clients to identify, ...

Cyber and security of NBN emerging as election issues
The Australian Financial Review
“It's disappointing Australia doesn't have a national cyber security policy,” the institute's Tobias Feakin said. “This directly weakens our ability to respond to and ...

more news below

Malware, Botnets

Malware & Botnets | "MALWARE & BOTNETS The Internet is a powerful and useful tool, but in the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions."

Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers.

The terms "spyware" and "adware" apply to several different technologies. The two important things to know about them is that:
  • They can download themselves onto your computer without your permission (typically when you visit an unsafe website or via an attachment)
  • They can make your computer do things you don't want it to do. That might be as simple as opening an advertisement you didn't want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.
Botnets are networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by criminals, usually for financial gain or to launch attacks on website or networks.

If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish.

Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution. For more information on botnets, visit the STOP. THINK. CONNECT. Keep a Clean Machine Campaign.

Protect Yourself with these STOP. THINK. CONNECT. Tips:
  • Keep a Clean Machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
  • When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
  • Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  • Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.

more news below

Spam, Phishing

Spam & Phishing | "Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment."

The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business.

It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or another matter.

If you are unsure whether an email request is legitimate, try to verify it with these steps:
  • Contact the company directly.
  • Contact the company using information provided on an account statement or back of a credit card.
  • Search for the company online – but not with information provided in the email.
  • SpamSpam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email.
Here are ways to reduce spam:
  • Enable filters on your email programs: Most ISPs (Internet Service Providers) and email providers offer spam filters. However, depending on the level you set, you may wind up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.
  • Report spam: Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam will also help to prevent the messages from being directly delivered to your inbox.
  • Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.

PhishingPhishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.

Spear PhishingSpear phishing is highly specialized attacks against a specific target or small group of targets to collect information of gain access to systems.

For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email.

The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people.

Spam & Phishing on Social NetworksSpam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.

Here are ways to report spam and phishing on social networks:
How Do You Avoid Being a Victim?
  • Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.
  • Before sending sensitive information over the Internet, check the security of the website.
  • Pay attention to the website's URL. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Information about known phishing attacks is available online from groups such as the Anti-Phishing Working Group.
  • Keep a clean machine. Install and maintain anti-virus software, firewalls, and email filters to reduce spam.

What to Do if You Think You are a Victim?
  • Report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.
  • If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s).
  • Watch for any unauthorized charges to your account.
  • Consider reporting the attack to your local police department, and file a report with the Federal Trade Commission or the FBI's Internet Crime Complaint Center.

Additional Resources:
Protect Yourself with these STOP. THINK. CONNECT. Tips:
  • When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
  • Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information.
  • Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.
  • Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
  • Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals
more news below

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud