Saturday, March 20, 2010

Latest Version Of Cybersecurity Act Lessens Presidential Power

The Senate Wednesday re-introduced a cybersecurity bill it considered last year, minus a provision that would have allowed the president to shut down the Internet in the event of a major cyber attack.

The Cybersecurity Act, S. 773, co-sponsored by Senators Jay Rockefeller (D-W.Va.) and Olympia Snowe (R-Maine), is aimed at protecting critical U.S. network infrastructure against cybersecurity threats by fostering collaboration between the federal government and the private sectors that maintain that infrastructure... More >>

Copy Machines Can Store Your Private Info

The dangers of identity theft are well-publicized. We've all been warned to shred our documents, be on the lookout for fishing scams and check our credit report regularly.

But there is a new potential threat to our identity lurking in warehouses across the country. We're talking about copy machines.

"Copy machines today are just like computers," explained Boston security expert Robert Siciliano. "They have hard drives and can store data that can be extracted." .. More >>

Cyber attacks shift to the cloud, too

Cyber warfare against enterprises grows more brutal by the year, but now carriers are getting caught in the crossfire as more organizations move sensitive data into operators' clouds, according to a survey sponsored by telecom network security vendor Arbor Networks. Cloud security is a telecom issue as much as it is an enterprise issue. .. More >>

China Schools Seen Behind Cyberattacks on Google

Cyberattacks on Google and other US companies came from two Chinese schools—including one with ties to the country’s military, sources close to the investigation tell the New York Times. .. More>>

Government and infrastructure tops hacking league

Cybercriminals are now aggressively targeting government and critical infrastructure companies, a review of malware and attack patterns over the last year has found. .. More >>

Tuesday, December 22, 2009

Cloud Computing Security Guidance

The Cloud Security Alliance has released its latest guide titled "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1" which can be found here.

Hackers Intercepted Drone Spy Videos

Insurgents in Iraq have hacked into live video feeds from Predator drones, a key weapon in a Pentagon spy system that serves as the military's eyes in the sky for surveillance and intelligence collection.

Though militants could see the video, there is no evidence they were able to jam the electronic signals from the unmanned aerial craft or take control of the vehicles, a senior defense official said Thursday, speaking on condition of anonymity to discuss sensitive intelligence issues.

Obtaining the video feeds can provide insurgents with critical information about what the military may be targeting, including buildings, roads and other facilities.

Shiite fighters in Iraq used off-the-shelf software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, the Wall Street Journal reported Thursday. The hacking was possible because the remotely flown planes have an unprotected communications Relevant Products/Services link. .. More >>

FAA glitch causes widespread US air travel delays

ATLANTA – Air travelers nationwide scrambled to revise their plans Thursday after an FAA computer glitch caused widespread cancellations and delays for the second time in 15 months. TheFederal Aviation Administration said the problem, which lasted about four hours, was fixed around 9 a.m., but it was unclear how long flights would be affected.


It started when a single circuit board in a piece of networking equipment at a computer center in Salt Lake City failed around 5 a.m., the FAA said in a statement.


That failure prevented air traffic control computers in different parts of the country from talking to each other. Air traffic controllers were forced to type in complicated flight plans themselves because they could not be transferred automatically from computers in one region of the country to computers in another, slowing down the whole system. .. More >>

Sunday, October 25, 2009

Hackers Plan to Clobber the Cloud, Spy on Blackberries

October 05, 2009 — IDG News Service — A new era of computing is on the rise and viruses, spies and malware developers are tagging along for the ride.


The new playground for hackers is "the cloud," the term for computer applications and services hosted on the Internet. Some of the devices making the cloud more popular these days are BlackBerries and other smartphones.


"The focus [of security] is definitely moving towards 'the cloud' and to the security of embedded devices (Android, iPhone) to more advanced client-side attacks which leverage on Web 2.0 technologies, such as attacks on Facebook, Twitter and other popular sites," said Dhillon Andrew Kannabhiran, host and organizer of the Hack In The Box (HITB) security conference in Kuala Lumpur, Malaysia this week.


HITB is one of the most prominent security conferences in Asia and now runs twice a year. The big show is in Malaysia, while the newer, yet smaller HITB is held in Dubai. The conference brings together leading security experts and draws self-proclaimed hackers, but Kannabhiran says it's not a wild hacker party. It offers knowledgeable presentations by leading experts in an informal setting, where people can ask questions and meet presenters at events throughout the week.


"Clobbering the Cloud" and "Spying on BlackBerry Users for Fun" are actually titles of two presentations slated for the HITB conference on Wednesday. Other interesting titles include "How to Own the World - One Desktop at a Time" and "Offensive Cloud Computing With Hadoop and Backtrack." .. More >>

Monday, September 14, 2009

SKorea to train 3,000 'cyber sheriffs': report

SEOUL — South Korea plans to train 3,000 "cyber sheriffs" by next year to protect businesses after a spate of attacks on state and private websites, a report said Sunday.

The "cyber sheriffs" would be tasked with "protecting corporate information and preventing the leaks of industrial secrets," Yonhap news agency said.

In the event of cyber attacks, the National Intelligence Service, the country's main spy agency, would set up a taskforce including civilian and government experts to counter the online threats, it added. ... More >>

Saturday, August 1, 2009

Government Is Falling Behind on Cybersecurity, Report Finds

"Cyber In-Security" says the federal government is falling behind in the race to keep its computer operations safe because the workforce has too few well-trained cybersecurity experts.

"Critical government and private sector computer networks are under constant attack from foreign nations, criminal groups, hackers, virus writers and terrorist organizations," says the study, published by the Partnership for Public Service and Booz Allen Hamilton. .. More >>

Tuesday, June 9, 2009

Insider May Have Breached More Than 10,000 Patient Records At Johns Hopkins

An employee at Johns Hopkins Hospital may have leaked the personal information of more than 10,000 patients in an identity fraud scam.


According to a report filed to the administrator of the state of Maryland's Identity Theft Program (PDF), some 31 individuals with connections to Johns Hopkins have reported identity thefts since Jan. 20. Law enforcement agencies suspect the thefts might be part of a fraudulent driver's license scheme discovered in neighboring Virginia.


In researching the thefts, members of the Johns Hopkins security department discovered that a single employee who worked in patient registration may have used her access privileges to review data on more than 10,000 patients while working at the hospital. The now-former employee is expected to be indicted for stealing the data, the report states.


The hospital emphasizes that the breach was not a hacking incident, but that the employee had access to the records as part of her job... More >>

Hackers Arrested In China After Feud Causes Major Outage

DDoS feud between underground gaming services allegedly caused temporary Internet outage across more than 20 provinces .. More >>

Sunday, May 10, 2009

Thousands of Vulnerabilities Detected In FAA's Air Traffic Control Apps

A government audit (PDF) has pinpointed more than 3,800 vulnerabilities -- 763 of which are high-risk -- in the Federal Aviation Administration's Web-based air traffic control system applications, including some that could potentially put air travel at risk.


The U.S. Department of Transportation report, with the help of auditors from KPMG, determined that the ATC's Web-based applications aren't secured from attacks or unauthorized access, and that the FAA hasn't set up the necessary intrusion-detection functions to catch security incidents at ATC locations.


And the FAA's Air Traffic Organization, which heads up ATC operations, received more than 800 security incident alerts in fiscal 2008, but still had not fixed 17 percent of the flaws that caused them, "including critical incidents in which hackers may have taken over control of ATO computers," the report says.


The auditors tested 70 of the FAA's ATC Web applications, including ones that provide information to the general public, as well as to pilots and controllers, and some internal apps. Of the vulnerabilities they discovered, nearly 2,600 were considered low-risk threats, such as unprotected folders of sensitive data and weak passwords... More >>

Tuesday, April 28, 2009

Researchers Find Massive Botnet On Nearly 2 Million Infected Consumer, Business, Government PCs

Researchers have discovered a major botnet operating out of the Ukraine that has infected 1.9 million machines, including large corporate and government PCs mainly in the U.S.


The botnet, which appears to be larger than the infamous Storm botnet was in its heyday, has infected machines from some 77 government-owned domains -- 51 of which are U.S. government ones, according to Ophir Shalitin, marketing director of Finjan, which recently found the botnet. Shalitin says the botnet is controlled by six individuals and is hosted in Ukraine. .. More >>

Sunday, April 26, 2009

Computer Spies Breach Fighter-Jet Project

WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.


Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft. .. More >>

Saturday, April 18, 2009

Conficker worm hits University of Utah computers

SALT LAKE CITY (AP) — University of Utah officials say a computer virus has infected more than 700 campus computers, including those at the school's three hospitals.


University health sciences spokesman Chris Nelson said the outbreak of the Conficker worm, which can slow computers and steal personal information, was first detected Thursday. By Friday, the virus had infiltrated computers at the hospitals, medical school, and colleges of nursing, pharmacy and health.


Nelson says patient data and medical records have not been compromised.


"That's secured in a much deeper way because of the implications," he said.


Nelson said the virus is mainly attacking personal computers and could be siphoning login and password data, credit card numbers and banking information.


Directions for purging the virus from personal computers and equipment like thumb drives, digital cameras and smart phones has been distributed to staff and students.


Information technology staff shut of Internet access for up to six hours at some campus locations Friday so they could isolate the virus. They were expected to work through the weekend to eradicate it from the system. .. More >>