29 Oct 2012

DHS Warns of ‘Hacktivist’ Threat Against Industrial Control Systems

“The U.S. Department of Homeland Security is warning that a witches brew of recent events make it increasingly likely that politically or ideologically motivated hackers may launch digital attacks against industrial control systems. The alert was issued the same day that security researchers published information about an undocumented software backdoor

Read More
29 Oct 2012

FBI starts new initiative to name hackers

“The cybercrime division of the FBI, under a new program, has retooled to focus on determining the identities of intruders at the other end of the keyboard, bureau officials announced. Giving priority to the labeling of suspects follows claims by the Pentagon that the military now has the capability to

Read More
29 Oct 2012

France Euromillions site hit by religious hackers

“The French site of the Euromillions lottery has been hacked, with the homepage replaced by a passage from the Koran condemning gambling.” Source: BBC News – France Euromillions site hit by religious hackers

Read More
28 Oct 2012

Pentagon cyber-threat sharing program lost participants

“A Pentagon effort designed to share information on computer threats with defense contractors has lost members, InsideDefense reports. Five of the initial 17 members have pulled out of the Defense Industrial Base Enhanced Cybersecurity Services group, a component of the department’s cybersecurity information assurance program, a Pentagon spokesman confirmed to

Read More
27 Oct 2012

US, Canada launch joint cyber-security plan

“Canada and the United States announced Friday they were launching a joint cybsersecurity plan to protect their digital infrastructure from online threats. The action plan, under the auspices of the US Department of Homeland Security and Public Safety Canada, aims to better protect critical digital infrastructure and improve the response

Read More
27 Oct 2012

3.6 million Social Security numbers compromised

“The Social Security numbers of millions of South Carolinians, as well as credit and debit card information for hundreds of thousands, have been hacked in what the state’s governor described Friday as an international cyberattack.” Source:South Carolina taxpayer server hacked, 3.6 million Social Security numbers compromised – This Just In

Read More
26 Oct 2012

We now have drones equipped with EMP beams

“If you’re worried about surveillance drones cruising over your neighborhood, then this new technology from Boeing will have you running for your microwave shielded shelter. Last week, defense company Boeing conducted the first successful test of a drone called the Counter-electronics High-powered Advanced Missile Project (CHAMP) that can emit a

Read More
24 Oct 2012

U.S. DHS reshuffles its cyber office, adds two more divisions

“Trying to keep in step with the increasing need for cybersecurity capabilities, the U.S. Department of Homeland Security’s Office of Cybersecurity and Communications will be reshuffling its employees and adding two more divisions. Since its creation in 2006, the CS&C Office consisted of the National Communications System (including its National

Read More
24 Oct 2012

Hackers get 10 MONTHS to pwn victims with 0-days before world finds out

“Hackers exploit security vulnerabilities in software for 10 months on average before details of the holes surface in public, according to a new study. Researchers from Symantec reckon that these zero-day attacks, so called because they are launched well before vendors are even aware of the vulnerabilities, are more prevalent

Read More
23 Oct 2012

Protecting Canadian Critical Infrastructure Against Cyber Threats

“Critical infrastructure consists of physical and information technology assets, such as the electricity distribution networks, telecommunications networks, banking systems, manufacturing and transportation systems, as well as government information systems and services that support the continued and effective functioning of government. Elements of critical infrastructure can be stand-alone or interconnected and

Read More