The Obama administration is getting ready to change the way the government handles cybersecurity.

The White House has drafted an executive order, a draft of which is currently circulating among federal agencies for approval, mirroring cyber legislation that recently failed to get through a Senate vote. Among other things, the order shunts much of the enforcement and management of cybersecurity issues to federal agencies. We understand that, contrary to some earlier news reports, the classified portion of the order does not contain significant new authorities but details those already existing. Keep reading →

Warning after warning has been given by military officials, intelligence agencies and private sector cybersecurity aspects about the growing national security threats emanating from cyber space.

Most recently, U.S. Secretary of Defense Leon Panetta delivered what has been referred to as the first major policy speech on cyber security by a defense secretary. His speech, delivered in New York last week, has been called a call to (cyber) arms, declaring that the United States was facing the possibility of a “cyber-Pearl Harbor.” Keep reading →

“The United States has built the most powerful military the world has ever seen, but we are not invincible. Information technology is a both an essential enabler of American power, but it is also our Achilles heel. And that’s why this project is so important,” said Virginia Congressman Jim Moran, referring to a new cybersecurity research center opened by L-3 and Virginia Tech in Arlington, Va., Oct. 5.

“Cyberspace is the soft underbelly of American power,” said Moran, who called the need for more effective solutions for cyberspace an “urgent national priority.” Keep reading →

About one of every two laptop users, according to a new survey, is unaware of the possibility that a hacker can remotely access and control web camera technology – allowing cybercriminals to secretly watch and record activities near a user’s machine.

“It is alarming that high numbers of women (who are the primary caregivers of children) and young people (who spend a significant amount of time using their laptops) do not know their webcams can be easily hacked,” said Dr. Ruby A. Rouse, who conducted the study. More than 6 in 10 women were unaware of the risk, compared to 40% of men. Additionally, 57% of Generation Y study participants were unaware of the risk, she said. Keep reading →

The demise of an industry icon, Nortel Networks, as the evidence has now made clear, was the result of a cyber attack. Who could forget Nortel Networks’s place in the technology landscape? While the company is gone, their equipment is still in operations throughout the world.

In an article that appeared in the Wall Street Journal, it was reported that hackers had roamed freely inside Nortel’s vast corporate network for over a decade and contributed to the company going bankrupt in 2009.

Indications are that the attacker’s traffic was traced back to China. This came as a result of countless hours poring over log files until the investigators found the needle in the haystack.

According to Brian Shields, a long time Nortel employee and the point person on the investigation, the cyber espionage activities resulted in the exfiltration of technical papers, R&D documents, business plans, emails and other documents. They had full access to very sensitive information about the technology and plans of the company.

For years now, U.S. intelligence organizations and subject matter experts have warned of the vast array of clandestine cyber espionage activities of the Peoples Republic of China (PRC). While some of these activities are the result of organizations in the private sector, the government is often cited as the sources of the acts of espionage. Naturally, the Chinese government has denied these allegations. Keep reading →

Ever since the discovery of the Stuxnet cyber attack on Iran’s nuclear enrichment program and the assignation of Iran’s chief Stuxnet Investigator, Iran has been hell-bent on developing offensive and defensive cyber capabilities.

Over this past year or so numerous comments about the cyber domain that have come out of Tehran and recently the leader of Iran’s Cyber Defense Organization, Brigadier General Gholam-Reza Jalali stated that Iranian computer experts are adequately prepared to defend the country against any possible cyber attack. Based on open sources they seem to have put cyber intelligence secondary to attack and defensive capabilities. Keep reading →

Terrorist groups have primarily used physical attack modalities in their efforts to undermine society. Those methods now include cyber attacks.

International sources have released information that British intelligence services have intercepted communications–that they term chatter–that suggest terrorist may be planning a cyber attack on British infrastructure.

As Britain has modernized over the years they have become much more reliant on computer, digital communications and networks. That reliance is very tempting to adversaries. The face of terrorism has continued to change year after year. They adapt, innovate and morph their strategies and tactics. Keep reading →

Last week word began filtering out about a suspected cyber attack on a water treatment system in Illinois. After a preliminary investigation into a pump failure, the issue quickly became a cyber incident.

Further analysis suggests that the actual breach and malicious activities began a couple of months ago. Workers at the water treatment facility determined the system had been hacked and the IP address used to carry out the cyber sabotage was tracked back to a computer in Russia. Keep reading →

Day after day the threats we are exposed to in cyber space grow. Just recently Panda Security announced they processed their 200 millionth malware file. Just think about that for a moment, 200 million individual pieces of malware.

The company went on to say that cyber intelligence automatically detects, analyzes and classifies more than 73,000 new malware strains a day. That clearly illustrates the continuous change that goes on in the cyber threat environment. Keep reading →

A government laptop stolen from the home of a VA data analyst in 2006 contained Social Security numbers and other personal information for 26.5 million veterans and active duty troops.

A class action suit brought by veterans groups was later settled by the agency for $20 million. Keep reading →

Page 1 of 212