Tuesday, November 23, 2010

Iran: Computer worm didn't harm nuclear program - Yahoo! News

Iran: Computer worm didn't harm nuclear program - Yahoo! News: "TEHRAN, Iran – Iran's nuclear chief said Tuesday that the malicious computer worm known as Stuxnet has not harmed the country's atomic program and accused the West of being behind a failed sabotage attempt.

Vice President Ali Akbar Salehi's remarks came a day after diplomats told The Associated Press in Vienna that Iran's nuclear program recently suffered major technical problems that forced the temporary shutdown of thousands of centrifuges enriching uranium — the cornerstone of Iran's program.

- Sent using Google Toolbar"

Sunday, November 21, 2010

Cyber Security Links and Information

Cyber Security is increasingly becoming a real issue. I have posted some links to information about cyber security issues.
Security Cyber Alerts
US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners.
Cyber security standards - Wikipedia, the free encyclopedia
Also many tasks that were once done by hand are carried out by computer; therefore there is a need for Information Assurance (IA) and security. Cyber
DHS | National Cyber Security Division
This Department of Homeland Security’s overriding and urgent mission is to lead the unified national effort to secure the country and preserve our freedoms.
Stay Safe Online | Brought to you by the National Cyber Security
NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals’ use, the networks they connect to, and our shared digital assets.
Oklahoma Office of Homeland
The Oklahoma Office of Homeland Security  (OKOHS) has a statutory obligation to protect the citizens of Oklahoma against acts of Cyber Terrorism.  This protection begins with every one of us practicing sound cyber security in our homes and offices.

Saturday, November 20, 2010

Cyber Security News 20 NOV 2010


Computer Security Tips: Don't Share Passwords with Co-Workers

Computer Cyber Security, Computer Security News, Computer Training, CPU Benchmarks, Current News, Cyber Arms, Cyber Arms Race, Cyber Attack, Cyber Crime, Cyber Defense, Securitycyber, Cyber War, Cybersecurity, Cybersecurity Training 
 

Internet & Web Security Review: Sophos Named Winner in Security 

Analyzing security technologies, standards, products, innovations and best practices including cyber-security, IPS, encryption, mobile security, managed services and cloud computing security worldwide.

MS-ISAC Cybersecurity Operations Center for State, Local

MS-ISAC Cyber Security Operations Center for State, Local, Territorial and Tribal Governments Launched The Multi-State Information Sharing and Analysis.

Alternatív oktatás: Afghanistan, Missile Defense On NATO Summit Agenda

The first one to be attended by Obama and Medvedev, is scheduled for November 20 to discuss, in addition to missile defense, issues ranging from proliferation, counter terrorism, anti-narcotics policy, and cyber security.

Big Security Hole in GOOGLE | Cyber Terror Book! Hacker5

Register them under cyber employment act & create a new young army for security-cyber of our country INDIA.The intention is to rehabilitate youth lured in cybercrime. JAI HIND..!! Any thing for India..!! Every thing for Indians.

Cyber Security Needs Graduates With Online Technology Management 

Latest Technology, Computers latest technology, How to, Hacking, Anti Viruses, Computer Field News, Computer Tips, Internet Tips updates and news allrounder.

SURVEILLANCE, CRIME & PHILOSOPHY & CULTURE: SPC MOST HIGHLY

A Blog Bulletin introducing current ideas on cyber-security, crime, cultural criticism, philosophy, surveillance, and poetry and religion, social-legal cyber/criminology. E-GOVERNANCE/BUSINESS

Cyber Security: FireSheep

I was just listening to a podcast on Fire Sheep: Check out some info on http://www.keprtv.com/news/local/107360348.html. This allows anyone to hijack someone on the same networks account for things like Facebook and Twitter.
Online Shopping-What To Lookout For In A Great Online Shopping 

Cyber security is not something we should ignore when making payment online. The site that you are making your payment to, most have all the necessary securities, aside from its ability to accept payment from different card company.
Great Price for $40.71 | Books Security & Encryption
--Howard A. Schmidt, Former White House Cyber Security Advisor. "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), 

Links Blogs:
  • How to Hack: Ethical Hacking and Cyber Security | Go Hacking - http://www.gohacking.com/
  • National Cyber Security - http://nationalcybersecurity.com/
  • Cyber Security Digest - http://www.cybersecuritydigest.com/
  • Cyber Security - http://cybersecurityblog.com/
  • Thompson Cyber Security Labs - http://tcsltesting.blogspot.com/
  •  
The potential for substantial loss exists with increasing use of computers and smart phones for businesses and governments. Cyber Security is becoming a leading concern for governments and businesses. For current news about cyber security risks visit Security-Cyber often. Thank you fore visiting our blog for information about cybersecurity.

Tuesday, November 16, 2010

Cyber Security News 16 Nov 2010

Countryside may turn tech

The proposed offerings include cyber security, video gaming and animation, aerospace and television production. "There are lots of hot areas now that I

China telecom briefly hijacked US Web traffic: panel

Cyber experts are watching Baidu, Google's competition in China, to see if it improves suddenly. Sudden improvement would indicate that Baidu was using

AvMed sued over loss of computers holding personal info

Cyber thieves often will wait a number of years until people lower their guard before using their identities to apply for credit cards, bank accounts or 

Actor Mark Valley resumes action role in Human Target's second season.

The United States faces a major threat in the future from cyber technologies that will require civil-military co-ordination to shield networks from attack, 

PayPal users: Beware of holiday phishing scam

The holidays come with a dramatic spike in shopping, and nobody appreciates the increase in online commerce more than cyber criminals.

Amazon Unleashes Teraflop Cloud – Hackers in Love

One of the main reasons cyber-crime is so out of control now is that the World Wide Web was built on a foundation magical thinking in the form of the ...

The Case Against COICA

Cybersecurity problems will grow.Currently, ISPs are in a position to keep DNS servers well-maintained and secure, to the benefit of their users.

Trend Micro Battles Cyber Missile with Detection Tool Security professionals fighting Stuxnet can use all the help they can get. Discovered in June by a Belarus

Smart Grid Interoperability Panel Reaches New Milestone with Process for
 (along with those on Smart Grid Architecture and on Smart Grid Cyber Security), presented to the SGIP a plan on the testing and certification process.

US faces 'huge' cyber threat in the future: Gates

Gates said the challenge for cyber security efforts inside the United States is that resources and expertise are concentrated in the military and the

Saturday, November 13, 2010

Geospatial TTPs Contribute To Cyber Security | SYS-CON MEDIA

Geospatial TTPs Contribute To Cyber Security | SYS-CON MEDIA

"The Geospatial tradecraft has benefited from the development of tactics, techniques and procedures (TTP) that have played a major role in combating terrorism in the 21st century. These TTPs have improved the situational awareness of the operational environment, vital to understanding and mitigating threats to U.S. National Security. The cyber environment provides a new haven for those intending to act against U.S. National Security interests but that threat can also be reduced through the use of geospatial TTPs. A geospatial perspective of the cyber environment can create an increased situational awareness of computer network attacks and exploitations against Command & Control, Computers & Communications that drive Intelligence, Surveillance and Reconnaissance (C4ISR) in support of U.S. National Security interests. Geospatial TTPs will once again prove their value in helping to define and reduce the threat to critical infrastructure and operating systems that support C4ISR."