25 Jan 2013

Time to break wall of silence on escalating cyber attacks

“It was at the World Economic Forum meeting in Davos six years ago that I first became seriously worried about the credit bubble. It was clear back then, in January 2007, that problems were developing in complex credit. But it was also clear that the public and private sector were

Read More
24 Jan 2013

Backdoors Found in Barracuda Networks Gear

“A broad variety of the latest firewall, spam filter and VPN appliances sold by Campbell, Calif. based Barracuda Networks Inc. contain undocumented backdoor accounts, the company disclosed today. Worse still, while the backdoor accounts are apparently set up so that they would only be accessible from Internet addresses assigned to

Read More
23 Jan 2013

One-Third of Cyber Attack Traffic Originates in China

“About one-third of the world’s cyber attack traffic was traced back to China, according to a report by Akamai Technologies to be published today. Between July and September of last year, about 33 percent of the attacks originated in China, double the percentage in the previous quarter, the report said.” Source:One-Third

Read More
23 Jan 2013

Gillard In Security Speech At ANU details Cyber Attack Fear

“Prime Minister Julia Gillard has warned that Australia is a prime target for malicious cyber attacks by hackers and nations. Launching the nation’s first national security strategy on Wednesday in Canberra, Ms Gillard flagged the establishment of a new Australian Cyber Security Centre.” Source:Gillard In Security Speech At ANU |

Read More
21 Jan 2013

Proposed EU cyber security law will require proactive network security

“Last week, the European Commission proposed new legislation to require major tech firms like Google and Facebook to report any security breaches to local cyber crime authorities or risk sanctions like fines. The bill, which is currently being finalised, will force EU member states to establish local cybersecurity agencies to

Read More
17 Jan 2013

Zero-day exploits: Should the hacker gray market be regulated?

“Like most technologies, the exploits have a dual use. They can be used as part of research efforts to help strengthen computers against intrusion. But they can also be weaponized and deployed aggressively for everything from government spying and corporate espionage to flat-out fraud. Now, as cyberwar escalates across the

Read More
17 Jan 2013

DoD Looking to ‘Jump the Gap’ Into Adversaries’ Closed Networks

“Iran’s uranium enrichment facility at Natanz may have had one of the most secure computer systems in the world. The building housing the nuclear program’s equipment is underground, protected by a combination of concrete walls, earth and military guards. And it was a ‘closed’ network, sealed off from the Internet

Read More
16 Jan 2013

Microsoft bombs another security test

“For the second time in a row, Microsoft Security Essentials has failed to be certified as effective by AV-Test.org, an independent testing lab based in Germany. The lab publishes test results every two months, and the test from November and December 2012 looked at 25 consumer antivirus security programs. Three

Read More
16 Jan 2013

Hackers Disrupt Mexico Defense Ministry Website

“Hackers claimed a cyber attack on the Mexican defense ministry website on Wednesday, posting a manifesto from the Zapatista rebel group for two hours. The name of the group ‘Anonymous Mexico’ was visible on the website in front of a black background, with phrases from the manifesto of the Zapatista

Read More
16 Jan 2013

Malicious virus shuttered U.S. power plant -DHS

“A computer virus attacked a turbine control system at a U.S. power company last fall when a technician unknowingly inserted an infected USB computer drive into the network, keeping a plant off line for three weeks, according to a report posted on a U.S. government website.” Source: UPDATE 1-Malicious virus

Read More