26 Jun 2012

Drones vulnerable to terrorist hijacking, researchers say

“‘Spoofing a GPS receiver on a UAV is just another way of hijacking a plane,’ Humphreys told Fox News. In other words, with the right equipment, anyone can take control of a GPS-guided drone and make it do anything they want it to.” (Source: EXCLUSIVE: Drones vulnerable to terrorist hijacking,

Read More
26 Jun 2012

MI5’s cyber-attack warning

“MI5 is working to counter ‘astonishing’ levels of cyber-attacks on UK industry, the organisation’s chief has said.   In his first public speech for two years, Jonathan Evans warned internet ‘vulnerabilities’ were being exploited by criminals as well as states. The attacks were a threat to the integrity of information,

Read More
22 Jun 2012

Computer virus hits office printers

“Thousands of office printers around the world have been spewing out page after page of gibberish because of a computer virus.” Source: BBC News – Computer virus hits office printers

Read More
21 Jun 2012

Cyber-war :more Bangladesh Government sites hacked by Myanmar Hackers

“After Bangladesh cyber army declares cyber-war against Myanmar and hack few government sites, Myanmar Hackers group known as ‘Blink Hacker Group(BCH)’ hack more Bangladeshi Government sites.” Source: Cyber-war :more Bangladesh Government sites hacked by Myanmar Hackers | e Hacking News [EHN] | Hackers News

Read More
21 Jun 2012

China tech company brags: We hack U.S. telecoms

“A major Chinese telecommunications company has been boasting how it was able to hack into U.S. and international telecommunications networks and intercept what it suggested was ‘malicious’ data.” Source: China tech company brags: We hack U.S. telecoms

Read More
15 Jun 2012

Policy would require agencies to patch cybersecurity holes within 72 hours of discovery

“The Homeland Security Department later this month will present to federal computer contractors and remote cloud suppliers standards for finding and fixing cyber threats within 72 hours, DHS officials announced on Thursday.” Source: Policy would require agencies to patch cybersecurity holes within 72 hours of discovery – Cloud – Nextgov.com

Read More
15 Jun 2012

Australia-NATO sign cyber-security pact

“Australia and the North Atlantic Treaty Organisation (NATO) have signed a cyber-security pact to combat attacks on computing networks and defence systems.” (Source: Australia-NATO sign cyber-security pact | Articles | FutureGov – Transforming Government | Education | Healthcare.)

Read More
15 Jun 2012

Disaster awaits U.S. power grid as cybersecurity lags

“Digital signatures that protect access to power-plant control systems are highly insecure, an industry leader warns — and some companies want to make the problem worse.” (Source: Disaster awaits U.S. power grid as cybersecurity lags | Security & Privacy – CNET News.)

Read More
14 Jun 2012

The Antivirus Era Is Over

“Some experts and companies now say it’s time to demote antivirus-style protection. ‘It’s still an integral part [of malware defense], but it’s not going to be the only thing,’ says Nicolas Christin, a researcher at Carnegie Mellon University. ‘We need to move away from trying to build Maginot lines that

Read More
14 Jun 2012

Accused British hacker charged in U.S. over LulzSec attacks

“A federal grand jury in Los Angeles has indicted a 20-year-old British citizen on charges related to attacks by the LulzSec hacking group on the Fox and PBS television networks and Sonys film and TV studio, authorities said on Wednesday. Ryan Cleary, who is already jailed in the United Kingdom

Read More