BBC video: Facing up to threat of cyberwar updated summery of events

January 28, 2012

Military experts gathered in London this week to discuss the growing threat of cyber-attacks to international security.

The US is aiming to recruit 10,000 “cyberwarriors” to try to combat the problem, which poses risks to everything from power grids and water supplies to businesses and individuals.

http://www.bbc.co.uk/news/technology-16754276


US launched cyber attacks on other nations

January 25, 2012

The assumption that the US has the technological know-how to cripple a competing nation has always been just that: as assumption. In a recent sit-down interview, however, a former spy chief confirmed that America has already waged cyber attacks.

http://rt.com/usa/news/us-attacks-cyber-war-615/


USA: Hackers manipulated railway computers, TSA memo says

January 24, 2012

Hackers,executed an attack on a Northwest rail company’s computers that disrupted railway signals for two days in December, according to a government memo recapping outreach with the transportation sector during the emergency.

On Dec. 1, train service on the unnamed railroad “was slowed for a short while” and rail schedules were delayed about 15 minutes after the interference, stated a Transportation Security Administration summary of a Dec. 20 meeting about the episode obtained by Nextgov. The following day, shortly before rush hour, a “second event occurred” that did not affect schedules, TSA officials added. The agency is responsible for protecting all U.S. transportation systems, not just airports.

http://www.nextgov.com/nextgov/ng_20120123_3491.php?oref=topstory


NSA releases security-enhanced version of Android

January 19, 2012

The National Security Agency (NSA) has released SE Android, a security-enhanced version of Android, which provides and enforces stricter access-control policies than those found in the popular mobile operating system by default.

SE Android is based on NSA’s previous research into mandatory access controls that gave birth to the Security-Enhanced Linux project back in 2000. SE Linux is a collection of Linux kernel security modules and other tools that provide a flexible mechanism for restricting what resources users or applications can access.

http://www.computerworld.com/s/article/9223487/NSA_releases_security_enhanced_version_of_Android


Chinese cyber attack targets U.S. DoD Common Access Card

January 19, 2012

2012-01-19 (China Military News cited from armytimes.com and by Andrew Tilghman) — A Chinese-based cyber attack is targeting the Defense Department’s Common Access Cards with technology that could steal information from military networks while troops and civilians work at their desks, researchers say.

http://www.china-defense-mashup.com/chinese-cyber-attack-targets-us-dod-common-access-card.html


Booz Allen Hamilton: New Cyber Index Ranks Ability of G20 Nations to Withstand Cyber Attacks

January 13, 2012

A new benchmarking study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.

The index is at www.cyberhub.com.

The Cyber Power Index, developed by the Economist Intelligence Unit and sponsored by Booz Allen Hamilton, measures both the success of digital adoption and cyber security, and the degree to which the economic and regulatory environment in G20 nations promote national cyber power.


2012 Global Risks report

January 12, 2012

WEF report: Cyber-attack risk to global stability is real

http://www.theregister.co.uk/2012/01/12/world_economic_forum_risks/

The report:

http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2012.pdf


Norton Symantec: Hacking group has gained access to some of the security product’s source code.

January 8, 2012

Symantec, the makers of Norton AntiVirus, has confirmed that a hacking group has gained access to some of the security product’s source code.

http://nakedsecurity.sophos.com/2012/01/06/symantec-norton-antivirus-source-code-hackers/


Cyber Crime: Anonymous hacks Sony again

January 6, 2012

 

Several websites operated by Sony have been attacked by hacktivist group Anonymous, allegedly for the corporation’s support of the US Stop Online Piracy Act (SOPA).

 

The Sony Pictures website and its Facebook page were both hacked and defaced by the attack, although both were quickly recovered and repaired by the company.

http://www.computing.co.uk/ctg/news/2135819/anonymous-hacks-sony

Anonymous on youtube:

http://www.youtube.com/watch?v=WjOPXpd9PSU

 

 


Malware Erase Evidence of Theft from Online Post Transaction Statements

January 5, 2012

Post transaction attacks, as the name implies, occur after the evil deed has already been done and the account holder has closed the online banking session. These are designed to conceal illegitimate activity for as long as possible to either allow money to transfer to its final destination – uninterrupted, or continue to control the account and perform further transactions.

http://www.trusteer.com/blog/gift-wrapped-attacks-concealed-online-banking-fraud-during-2011-holiday-season