23 July 2011

The #China Challenge: A strategic vision for #US-India relations

India is keeping a wary eye on China's rapid global ascent. Unresolved border issues that resulted in the Sino-Indian War of 1962 have been heating up again in recent years.


Link: http://bit.ly/mVbNnB

HED:Report: Iran resorting to rip and replace to kill off Stuxnet infections

ARLINGTON, VA--There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that they've been mythologized to be in the media. In fact, some experts say that Stuxnet could well have been far more effective and difficult to detect had the attackers not made a few elementary mistakes.
Link: http://bit.ly/qAXtc6

#Iran resorting to rip and replace to kill off #Stuxnet infections

Iran Reports that Iran had recovered from the infection of the Stuxnet worm may have been overblown, as a new report suggests the country is being forced to replace thousands of expensive centrifuges damaged by the worm. 


Link: http://bit.ly/qAXtc6

The "Internet in a Suitcase"


The "Internet in a Suitcase" project

June 30, 2011
Iranian officials appear to be increasingly worried about the U.S.-funded "Internet in a Suitcase" project that aims to deploy shadow Internet and telecommunication networks in repressive countries. 

#Spies Connected to #China Said to Have Carried Out #Hacking of #IMF Computers

Investigators probing the recent ransacking of International Monetary Fund computers have concluded the attack was carried out by cyber spies connected to China, according to two people close to the investigation.
Link: http://bit.ly/ntWnTx

Phone #hacking: how #NoW scandal has changed UK's image in the world

Britain's image as the land of Harry Potter and royal weddings has taken a hammering as the US media have lapped up every detail of the phone-hacking scandal. The home of chivalry emerged as a country of amoral hacks, craven politicians, corrupt cops and evil private eyes. A country where journalists are prepared to hack into the phone of a murdered child in the hope of selling a few more copies and the people in charge of those hackers are bosom buddies with the prime minister. So bad has the scandal become in the US that it has earned America's most dreaded suffix, becoming "hackgate."
Link: http://bit.ly/onWvtl

Let's stop the billions lost to #hackers & #cyber thieves

The gunman who went on a shooting rampage at a youth camp on an island near Olso on Friday fired shots from two weapons for an hour and a half before surrendering to authorities, Norwegian police officials said Saturday.

#Norway attacks: Details emerge in #Oslo bombing, camp shooting

The gunman who went on a shooting rampage at a youth camp on an island near Olso on Friday fired shots from two weapons for an hour and a half before surrendering to authorities, Norwegian police officials said Saturday.
Link: http://bit.ly/r8Hmp4

Leon Panetta: Next "Pearl Harbor" could come from #cyberattack

Leon Panetta was blunt, even for a guy who is known to speak his mind. In the heady aftermath of the Osama bin Laden mission, Panetta's authority on Capitol Hill was all but unquestioned. Despite an atmosphere of bitter partisanship, the longtime Democrat was about to be confirmed as Defense secretary by a vote of 100-0, a rare feat in any era. Now Panetta, the outgoing CIA director, was telling a rapt audience of senators at his confirmation hearing that America's national-security defense apparatus was underestimating the gravest danger out there. "We talk about nuclear. We talk about conventional warfare. We don't spend enough time talking about the threat of cyberwar," he said. "There's a strong likelihood that the next Pearl Harbor that we confront could very well be a cyberattack."
Link: http://bit.ly/qAOygM

A #hacking crime wave in #cyberspace

Listen to the chatter from top officials, and you'd think that World War III was about to break out on the Internet. The defense secretary is warning about a digital "Pearl Harbor." Former director of national intelligence Mike McConnell declares that the United States is "fighting a cyber war, and we're losing." Every new hack brings more pronouncements of network doom.
Link: http://bit.ly/q9VW3x

Dasient to Release New Research on Emerging Mobile #Hacker Threats in Android Apps

/PRNewswire/ -- The mobile malware landscape has dramatically increased in size and scope these past few months with recent reports of DroidDream, Plankton, and GG Tracker, among others, impacting hundreds of thousands of Android users. As Android adoption continues to rise among consumers, malware authors too have turned to this lucrative market of mobile applications to spread malicious code and legitimate applications are also leaking sensitive user data.
Link: http://bit.ly/r22cf7

#Apple Laptops Vulnerable To #Hack That Kills Or Corrupts Batteries

Your laptop's battery is smarter than it looks. And if a hacker like security researcher Charlie Miller gets his digital hands on it, it could become more evil than it appears, too.
Link: http://bit.ly/q7wtPj

#BlackHat 2011: Researchers demonstrate #Android hack

A team of researchers at Palo Alto, Calif.-based antimalware vendor Dasient Inc. are expected to demonstrate a serious Android phone drive-by attack that could enable an attacker to gain network access and steal data off the phone.
Link: http://bit.ly/phIEbj

22 July 2011

#Whitehat Targets #Chrome OS at #BlackHat

Google's ChromeOS is a browser-based cloud powered operating system that holds the potential to be more secure than other traditional hard disk powered operating systems. According to research from security firm Whitehat, ChromeOS has its strengths, but it also has a few weaknesses too.
Link: http://bit.ly/q2ASJh

#Cyberwar Strategy: Will Dual-Hatted #NSA Plug Holes in Leaky #Pentagon?

The DoD cyberspace strategy calls for five strategic initiatives to sustain "good cyber hygiene," but also maintains a destructive cyberattack could be considered an "act of war." While it also further empowers the NSA, will even the super spy agency be able to plug all the holes in DoD?

Link: http://bit.ly/mUFUtT

#Sony Sued by #ZurichAmerican Insurance Over #PlayStation #Hacking Coverage

Zurich American Insurance Co. claims in a lawsuit it isn't obliged to defend Sony Corp. (6758)'s U.S. unit against lawsuits and possible probes related to hacking of Sony's PlayStation Network.
Link: http://bit.ly/qmgtzW

#German national #cybersecurity centre attacked by #hackers

Just a few weeks after German authorities opened a national Cyber Defense Centre in Bonn, it was attacked by hackers and now officials are struggling to arrest all of those involved.

Link: http://bit.ly/qUQOSm

Embedded Web Servers Exposing Organizations To #Cyberattack

A researcher who has been scanning the Internet for months looking for unsecured, embedded Web servers has found a bounty of digital scanners, office printers, VOIP systems, storage devices, and other equipment fully exposed on the Net and ripe for attack.
Link: http://bit.ly/ne4yaa

New #cybersecurity risk management application for industrial control systems

Citicus has launched Citicus ICS, a new application to manage industrial process control risk. This enables organizations to identify and manage risks to SCADA and other process control systems, such as those supporting electricity generation, oil and gas production, water distribution and factory automation. These processes are the keystones of the critical national infrastructure - which is now facing an increasing number of threats.
Link: http://bit.ly/o3lfjp

Notorious #LulzSec #Hacker 'Tflow' Released on Bail

A 16-year-old British hacker fingered by law enforcement sources as a "significant figure in the investigation" of the notorious hacker group LulzSec and its parent group Anonymous was released on bail on Wednesday, FoxNews.com has learned.
Link: http://bit.ly/nNrG49

Corporate Security Chiefs Focus on ‘Human’ Side of #Cybercrime

It's no surprise that corporate IT leaders are focused on preventing data loss, especially given the recent attacks on Sony, Epsilon, Citigroup and Lockheed Martin. What is surprising, however, is where IT security chiefs see the biggest danger.

In a survey hosted by the Tuck School of Business at Dartmouth, almost 80% of participating chief information security officers said they were more worried about human, rather than technological, holes in their IT infrastructure.

READ FULL ARTICLE


--
Be sure to check out the latest issue of the CYBERWAR NEWS MORNING REPORT for daily updates on cyberwarfare, information security and hacker news.


Where is cyberwarfare in its evolution today?
The technical capabilities of cyberspace have grown so rapidly that they have quickly overwhelmed countries' ability to defend their networks—and in our case, the Defense Dept.'s ability to defend its networks—as the tools for communicating in a digital realm have just exploded. And what you see today are countries, individuals, and groups exploring the ability to do reconnaissance on the networks. What that really represents is the initial stages. That's where we are. We have to first ensure our defense and be prepared to do this quickly.

READ FULL ARTICLE

--
Be sure to check out the latest issue of the CYBERWAR NEWS MORNING REPORT for daily updates on cyberwarfare, information security and hacker news.


CyberWarNews Morning Report is out!

Check out the CyberWar News Morning Report for daily updates on cyberwarfare, information security and hacker news.

Euro Hawk #UAV lands in Germany after 22hour flight

Europe moved a step closer to fielding its first operational high-altitude, long-endurance unmanned air vehicle on 21 July, when the first Northrop Grumman/Cassidian Air Systems Euro Hawk touched down in Germany.

Tactical NAV Smartphone App Directs #UAV – Thwarts #Taliban Attack

Kabul, Afghanistan – With the number of private military contractors exceeding the number of troops on the ground in both Iraq and Afghanistan, a growing concern for keeping contractors safe is more pressing than ever.

On June 28, a private contractor located near Kabul came under insurgent fire while located in an area where he and his American contractors were working. The contractor immediately called the International Security Assistance Force (ISAF) tactical operations center (TOC) for military support, and ISAF personnel then quickly responded by requesting the military grid reference system (MGRS) grid coordinates to the insurgent threat.

However, the contractor was not equipped with a military GPS device or a 1:50,000-scale map to give the proper MGRS coordinates to the TOC. Instead, the contractor used Tactical NAV on his iPhone, and was able to quickly and accurately provide the assisting military personnel with his location, and also the location where the insurgent fire was coming from. As a result, an unmanned aerial vehicle (UAV) was dispatched to survey the perimeter of the base, and the insurgent attack was thwarted.

Right to privacy puts eyes on #infosec

The Gillard Government spurred by recent data breaches will shortly issue a discussion paper seeking public opinion on introducing a right to privacy that will require increased attention to information security.
Link: http://bit.ly/oQmoOU

US has strong interest in helping India prevent terror

US strongly supports the Government of India and also the state government, Blake said adding, "We are trying to expand our counter terrorism co-operation."
On cyber security, he said, US has been taking all possible measures to prevent cyber attacks and has been cooperating with India over the issue.

Link: http://bit.ly/nuPDDm

#China-Based Spies Said to Be Behind #Hacking of #IMF Computers

Investigators probing the recent ransacking of International Monetary Fund computers have concluded the attack was carried out by cyber spies connected to China, according to two people close to the investigation.
Link: http://bit.ly/ntWnTx

Color-coding #China's #hackers

Color-coding China's hackers
Link: http://bit.ly/ptscxQ

Dutch give details on 4 #Anonymous #hacker arrests

National prosecutors Wednesday released some details about four Dutch citizens arrested on suspicion of involvement in cyberattacks as part of an international sweep targeting hackers.
Link: http://bit.ly/o235ZA

#Anonymous says #NATO is victim of #hacking

The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.

Link: http://bit.ly/oMjCch

#Cyberwar Threat Will Force Pentagon to Buy Computers Faster and Change Culture

There is no doubt that the Pentagon is gearing up for a cyber war and they're planning to purchase new computers with the speed and efficiency that would make Google proud.

Link: http://bit.ly/nQAnsi

21 July 2011

Watch out for the Chinese e-bomb!

First, the good news: Beijing is not building a microwave weapon to zap you into submission. Now, the bad: the Chinese are kind of interested in using electromagnetic radiation to fry your computers. Especially if you happen to live in Taiwan.

U.S. defense secrets stolen in #cyberattacks

U.S. Deputy Defense Secretary William Lynn says hackers have infiltrated defense industry computers and stolen 24,000 files, adding that this is not the first time. (July 14) (CBS News)

Link: http://bit.ly/oBtmfe

#Cyberattacks: #Hackers Take Aim at Small Businesses

Title: Cyberattacks: Hackers Take Aim at Small Businesses

Link: http://bit.ly/pRBIdg

Phone #hackers allegedly hit #Taliban

The group declared Wednesday that text messages announcing Omar's death from heart failure were fake, and said the phone logs of its main spokesmen, together with the Taliban website, had apparently been tampered with.


Link: http://bit.ly/qo7wX4

US #Cyberwar Plan Has New Focus on Deterrence

The military must move from defending against major cyberattacks to deterring assaults by letting enemies know the U.S. is willing to retaliate with its own virtual weapons or military force, a top general said Thursday.


Link: http://bit.ly/pZHe2x

Congress demands #cyberdefense details while #DOD aims for ambiguity

The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.


Link: http://bit.ly/qvaCqH

#NATO Web site #hacked by# Anonymous

The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.


Link: http://bit.ly/o8huPU

What are power companies doing to protect their #networks from #cyberattacks?

Last year's Stuxnet attack on an Iranian nuclear power facility has alerted electricity suppliers to the security vulnerabilities in their networks

Link: http://bit.ly/nB3uwX

#Russia opts for universal anti #cybercrime convention

Russia has suggested drafting a UN convention to fight against cybercrimes because the documents that are now in force in this area, including those of the European Union are outdated. It believes that the new doctrine will be an effective tool in fighting cybercrimes.

Seoul to build traffic control tower resistant to #cyberattacks

Experts watching the nation's battle against cyber intruders say the next phase will be played out at the local level and will require more cooperation from private industry, which controls 85 percent of the country's digital infrastructure.

Nation's #cyberwar against intruders goes local

Experts watching the nation's battle against cyber intruders say the next phase will be played out at the local level and will require more cooperation from private industry, which controls 85 percent of the country's digital infrastructure.

Kratos Receives $15 Million Award to Continue Critical Support

Kratos Defense & Security Solutions, Inc. KTOS -0.17% , a leading National Security Solutions provider, announced today that it is being awarded a $15,165,201 modification to a previously awarded contract (N00024-10-C-5132) for professional support services to the Office of the Chief of Naval Operations (OPNAV). These services include support in the areas of systems engineering, program management and related business financial management for the Pentagon, Navy Annex, and Crystal City locations.

#Hacket stole #Toshiba customers' emails & passwords

Nearly 700 Toshiba customers' emails and passwords have been stolen from the company's U.S. servers, the latest company to be hit by hackers, although it doesn't appear to be the work of the same groups that have infiltrated Arizona law enforcement,Orlando tourism or PBS.

#India Signs Agreement With US To Improve #CyberSecurity

india americaAmid widespread headlines about cyber warfare andhacking around the world, the U.S. and India have signed an agreement yesterday to allow both nations to coordinate and collaborate on cyber security issues.


Link: http://bit.lie/pDJFHi

#China Number One in Internet Use and #Hacking

Set to surpass every other country in Internet users, China now has 485 million citizens capable of accessing the Web, the China Internet Network Information Center reported on July 19. This figure reflects growth of over 27 million people since the end of 2010 and a growth spurt of 36 percent in the past 12 months.

FBI casts broad net in #Anonymous crackdown

Are the authorities quashing protest rights or defeating cyber criminals? Perhaps a bit of both


Link: http://bit.ly/p4Nup0

Arrests Could Show #Anonymous Might Not Be Exactly That

On Tuesday, U.S. law enforcement launched the most sweeping crackdown yet on the online hacker group, arresting 16 people and raiding dozens of addresses, mostly in connection with last year's cyber-attack on the online payments giant PayPal. Click here for the WSJ story.

War in Afghanistan enters #cyberspace asTech-savvy Taliban phones #hacked

KABUL: The war in Afghanistan entered cyberspace on Wednesday when the tech-savvy Taliban said their phones, email and website had been hacked to spread a false report that the movement's spiritual leader, Mullah Omar, was dead.

20 July 2011

Rumor About NSA-Google Alliance to Stay Just That

     (CN) - The National Security Agency does not have to disclose its relationship with Google amid press reports that the two partnered up after hackers in China launched a cyber attack on the U.S. government, a federal judge in Washington ruled. 

Malicious firmware designed into PC components may be next front in #cyberwar

DHS acknowledges potential for malicious firmware in IT components built overseas


Link: http://bit.ly/o3EaJF

Latest issue of CyberWarNews Morning Report is out!

Top stories today:

Google: Your Computer Appears to Be Infected

Tech Weekly: Patents, a stealth internet, Bigpoint on social gaming

16 arrested for Anonymous-branded cyber attacks

Link: CyberWarNews Morning Report


FOX NEWS: 16 Suspected #Anonymous #Hackers Arrested in Nationwide Sweep

Sixteen suspected members of "Anonymous" were arrested this morning in states across the country, from California to New York, in a federal raid on the notorious hacking group.

Read more: http://www.foxnews.com/scitech/2011/07/19/exclusive-fbi-search-warrants-nationwide-hunt-anonymous/#ixzz1SevsLMM4




Video: #Cybersecurity: Assessing the Nation's Ability to Address the Growing #CyberThreat

Government oversight committee regarding cybersecurity.

http://www.youtube.com/watch?v=Cep_GgMXPSE

--
---

Your source for Cyber Warfare News

San Antonio is ready to become a #cyberdefense city

Speakers from the government, military and private enterprise gathered to discuss industry issues while making a case for San Antonio becoming Cyber City, U.S.A.

"President (Barack) Obama has made defending our nation's communication and information networks and networks all over the world one of its top priorities," Mayor Julián Castro said at the third annual Cyber Security Caucus Summit. "San Antonio ... will be ready to rise to the challenge."

Not only does the city have two nationally accredited cybersecurity programs, the University of Texas at San Antonio and Our Lady of the Lake University, it's home to the National Security Agency's cryptology center, the 24th Air Force at Lackland AFB, and a host of private defense contracting firms involved in cybersecurity.


http://cybercityusa.org/news/castro-says-sa-ready-become-cyber-city-0

--
---

Your source for Cyber Warfare News

Spear Phishing Leaves a Bloody Wound

Once criminal hackers get a person's username and email address, they can begin to launch a targeted spear phish scam.

Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with "account update" or other ruses.


https://www.infosecisland.com/blogview/15181-Spear-Phishing-Leaves-a-Bloody-Wound.html

--
---

Your source for Cyber Warfare News

Can Bitcoin survive after #hack?

Bitcoin – the online currency used to buy Alpaca wool socks and illegal drugs whose value dropped from$17.50 to "pennies" after a June 19 hack into its currency exchanger, Mt.Gox –has gotten plenty of media attention. But unless consumers and merchants can be persuaded that adopting it will make them better off, it's likely to go the way of other online currencies.

http://blogs.forbes.com/petercohan/2011/06/28/can-bitcoin-survive-is-it-legal/

--
---

Your source for Cyber Warfare News

Computers Are Weapons of War

In the spring of 2007, Russian computer experts hacked into
Estonia's government computer networks, blocked them from
functioning, and brought the Estonian government to a
standstill...

http://www.newsamericadaily.com/computers-are-weapons-of-war/

--
---

Your source for Cyber Warfare News

Deputy Defense Secretary William J. Lynn says #cyberthreat grows more destructive

he cyber threat the United States faces is increasing in severity and is accessible to a wide range of enemies, Deputy Defense Secretary William J. Lynn III said in a television interview broadcast July 14.

"Most of what we see today is exploitation -- that's theft, stealing secrets, either commercial or military," Lynn told Ray Suarez on "PBS Newshour." "(But) we know the tools exist to destroy things, to destroy physical property, to destroy networks, to destroy data, maybe even take human lives."

http://www.af.mil/news/story.asp?id=123264345

--
---

Your source for Cyber Warfare News

Senators: US needs to define acts of #cyberwar

U.S. officials have yet to define what cyber-attacks against American networks amount to acts of war, according to several top senators and a Pentagon nominee.  

"We've got to figure that out pretty quick," Senate Armed Services Committee Chairman Carl Levin (D-Mich.) said Tuesday. 


http://thehill.com/blogs/hillicon-valley/technology/172247-us-needs-to-define-an-act-of-cyberwar-senators-say-?utm_source=twitterfeed&utm_medium=twitter

--
---

Your source for Cyber Warfare News

19 July 2011

These Fake Chinese Microchips Were Made To Disarm U.S. Missiles

Last year, the U.S. Navy bought 59,000 microchips for use in everything from missiles to transponders that turned out to be counterfeits from China.

Wired reports the chips weren't only low-quality fakes, they had been made with a "back-door" and could have been remotely shut down at any time.

http://news.enigmagroup.org/technology/these-fake-chinese-microchips-were-made-to-disarm-u-s-missiles-2/



--
---

Your source for Cyber Warfare News

Latest issue of CyberWarNews Morning Report is available!

TOP STORIES:

Marine General Calls for Stronger Offense in U.S. Cyber-Security Strategy

Skype vulnerability issue will be fixed this week


Anonymous Hacks Murdoch's Sun Web Site

Get latest issue here: http://paper.li/CyberWar_News/1309523449
---

Your source for Cyber Warfare News

Fwd: In #cyberwar circles, "advanced persistent threat" is euphemism for Chinese state-sponsored #hacking


A very detailed and informative article on current cyberwar issues:



--
---

Your source for Cyber Warfare News

In #cyberwar circles, "advanced persistent threat" is euphamism for Chinese state-sponsored #hacking

A very detailed and informative article on current cyberwar issues:



--
---

Your source for Cyber Warfare News

Reddit Co-Founder Charged With Data Theft #cybercrime

Aaron Swartz, a 24-year-old programmer and online political activist, was indicted Tuesday in Boston on charges that he stole over four million documents from the Massachusetts Institute of Technology and JSTOR, an archive of scientific journals and academic papers.

Murdoch's Sun newspaper hit by #hackers

The News Corp. phone-hacking scandal took another dramatic twist Monday when the publishing empire got a taste of its own medicine: Hackers seized control of the website of The Sun, the sister publication of the recently shuttered News of the World.

Celebs used to lure people in #cyberscams

Jay Leno Ranked Most Dangerous Hollywood Celebrity in Cyberspace; Madonna, Cameron Diaz and Barack Obama also amongst the top personalities used in cyber scams according to BitDefender analysis of 25 million spam messages.

FBI Executes Search Warrants in New York, Calif. in Hunt for 'Anonymous' #Hackers

The FBI was executing search warrants in California early Tuesday morning, following searches earlier in the day in New York, at residences believed to be associated with members of notorious hacking group Anonymous, FoxNews.com has learned.

Read more: http://www.foxnews.com/scitech/2011/07/19/exclusive-fbi-search-warrants-nationwide-hunt-anonymous/#ixzz1SZEfUKM7


--
---

Your source for Cyber Warfare News

EU mulling plans for new rules on data breach notifications

With news about data leaks surfacing on a regular basis, the European Union is considering a set of 'practical rules' governing how they should be handled. Experts say transparency is necessary when leaks happen.


http://www.dw-world.de/dw/article/0,,15248966,00.html
--
---

Your source for Cyber Warfare News

Anticipating the Pearl Harbor #cyberwar of the digital age

Civilian and military leaders are starting to ask what kind of cyberattacks equate to traditional military attacks on U.S. citizens. In the parsing of U.S. interests that demand a military response, where might digital assaults fit in?

http://seattletimes.nwsource.com/html/editorials/2015625125_edit18cyber.html

--
---

Your source for Cyber Warfare News

United States and India Sign #Cybersecurity Agreement

he United States and India signed a Memorandum of Understanding (MOU) today to promote closer cooperation and the timely exchange of information between the organizations of their respective governments responsible for cybersecurity.

http://www.dhs.gov/ynews/releases/20110719-us-india-cybersecurity-agreement.shtm

--
---

Your source for Cyber Warfare News

18 July 2011

#Hackers Targeting Critical Infrastructure

IT security — a non-issue many years ago — is nowadays a major concern and should be part of the business strategy of every critical infrastructure facility. With the increasing networking of all kinds of SCADA systems over the Internet and/or public networks, any device with an IP address is globally accessible.


Link: http://bit.ly/oBGDIS

New Alliance #ICSPA To Fight #CyberCrime Globally

The International Cyber Security Protection Alliance (ICSPA) was launched in London to fight cybercrime on a global level. This new body unites governments, International businesses and Law-enforcement agencies (including Europol) in order to fight cyber offense. Reputed security companies such as Trend Micro and McAfee have also signed up for the same.

Check out the latest issue of #CyberWar News Morning Report

Top stories:

Widespread site compromise leading to Zeus

First look inside the military's cyber war room

http://paper.li/CyberWar_News/1309523449

Latest Microsoft Security Intelligence Report (SIR v.10) is available for review

The latest Microsoft Security Intelligence Report (SIR v10) is
available. Investigation of the current threat landscape.
It analyzes exploits, vulnerabilities, and malware based on data from
over 600 million systems worldwide, as well as internet services, and
three Microsoft Security Centers.

http://www.microsoft.com/security/sir/default.aspx

Cyber Criminals Switch to Alternative Second-Level Domains After Google Ban

Pushed by the recent Google ban on .co.cc, cyber criminals have began
migrating to alternative bulk domain providers, making it harder for
both Google and the rest of the world to block the malicious sites en
masse.

http://news.softpedia.com/news/Cyber-Criminals-Switch-to-Alternative-Second-Level-Domains-After-CO-CC-Ban-211620.shtml

#Anonymous, #DOD Strategy, Microsoft Patch Tuesday Lead Week's Security News

Renewed cyber-attacks by the Anonymous group, the cyber-security strategy plan from the Department of Defense and Microsoft's Patch Tuesday release were the most prominent developments in the past week's IT security news.
Link: http://bit.ly/qc160q

The false cries and fog of #cyberwar

Assorted "cyber attacks" have attracted much attention in the past few months. One headline in this genre recently proclaimed "Anonymous Declares War on Orlando." This is wrong on so many levels that it almost defies analysis. 

#Hacker creates hand mounted #laser weapon

A do-it-yourself hacker has created something straight out of comic
book fantasy: a hand-mounted laser that burns hot and bright enough to
blind a human or set flesh on fire.

http://www.rawstory.com/rawreplay/2011/07/hand-mounted-laser-could-be-used-as-weapon/

Predicting the Great #CyberWar

In 1998, John Arquilla, professor at the Naval Postgraduate School,
tried to envision it in a piece for Wired Magazine, The Great Cyberwar
of 2002, in which a loose coalition of rogue states, terrorist groups
and drug cartels team up to prod the United States into a war with
China and Russia by knocking out power grids, blowing up chemical
plants and causing airliners to collide in midair.

http://allthingsd.com/20110716/cyberwar-its-not-fiction-anymore/?mod=tweet

#China military deploys first communications #UAV during naval exercise

...During its mission it disrupted communications, while also acting
as a node for a Chinese military communications network, relaying
"large numbers of information packets" among Chinese forces. When an
'enemy' aircraft approached, the ground control station initiated a
"counter-surveillance deployment plan", and by reducing its altitude
and initiating radio silence the Silver Eagle evaded detection..

http://www.flightglobal.com/articles/2011/07/12/359324/china-deploys-communications-uav-in-naval-exercise.html

#Anonymous Working On #AnonPlus: A Facebook For #Hackers, Non-Hackers Alike

Rather than rest on their keyboards after being kicked off Google+, the hacking group known as Anonymous has created a holding page for AnonPlus, a "new social network where there is no fear…of censorship…of blackout…nor of holding back."

2011: The Year of the #Hacker and #Malware

Predictions that 2011 would be the year of malware and cybercrime have certainly panned out, with the website of Australia's SBS TV network the latest to suffer hacker infiltration.


Link: http://bit.ly/qjyZIM

17 July 2011

Phone #hacking: A scandal that rocked Britain

The chief executive of a newspaper company resigns after allegations that her colleagues have hacked into the phone accounts of murder victims and their families; a Prime Minister moralises noisily in Parliament, trying to distract attention from the fact that he has been spending family holidays with this disgraced CEO, and that he appointed as his director of communications a man who employed those phone hackers; meanwhile, the country's most senior police officer is forced to admit that he, too, engaged someone implicated in the scandal – a ruthless and abrasive tabloid journalist from the same newspaper company – as his personal adviser.

#CyberWar News Morning Report is out!

http://m.paper.li/CyberWar_News/1309523449#headlines

US and Romanian authorities bust cybercrime group after $10M #cybercrime scams

The US authorities have accused 22 Romanian people involved in cybercrime activities in the US and await for the legal procedures to extradite them to Romania. The cybercrime group has conned over 2,000 people in the US, causing prejudices of over USD 10 million, according to Mark Gitenstein, the US Ambassador to Bucharest.

Rumor circulate about #NSA & Google anti # hacking alliance

 (CN) - The National Security Agency does not have to disclose its relationship with Google amid press reports that the two partnered up after hackers in China launched a cyber attack on the U.S. government, a federal judge in Washington ruled.