Iran: Computer worm didn't harm nuclear program - Yahoo! News: "TEHRAN, Iran – Iran's nuclear chief said Tuesday that the malicious computer worm known as Stuxnet has not harmed the country's atomic program and accused the West of being behind a failed sabotage attempt.
Vice President Ali Akbar Salehi's remarks came a day after diplomats told The Associated Press in Vienna that Iran's nuclear program recently suffered major technical problems that forced the temporary shutdown of thousands of centrifuges enriching uranium — the cornerstone of Iran's program.
- Sent using Google Toolbar"
Tuesday, November 23, 2010
Iran: Computer worm didn't harm nuclear program - Yahoo! News
Posted by
Jason Buchen at
5:55 AM No comments:

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Sunday, November 21, 2010
Cyber Security Links and Information
Cyber Security is increasingly becoming a real issue. I have posted some links to information about cyber security issues.
Security Cyber Alerts
US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners.
Cyber security standards - Wikipedia, the free encyclopedia
Also many tasks that were once done by hand are carried out by computer; therefore there is a need for Information Assurance (IA) and security. Cyber
DHS | National Cyber Security Division
This Department of Homeland Security’s overriding and urgent mission is to lead the unified national effort to secure the country and preserve our freedoms.
Stay Safe Online | Brought to you by the National Cyber Security
NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals’ use, the networks they connect to, and our shared digital assets.
Oklahoma Office of Homeland
The Oklahoma Office of Homeland Security (OKOHS) has a statutory obligation to protect the citizens of Oklahoma against acts of Cyber Terrorism. This protection begins with every one of us practicing sound cyber security in our homes and offices.
Posted by
Jason Buchen at
7:06 PM No comments:

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Saturday, November 20, 2010
Cyber Security News 20 NOV 2010
Computer Cyber Security, Computer Security News, Computer Training, CPU Benchmarks, Current News, Cyber Arms, Cyber Arms Race, Cyber Attack, Cyber Crime, Cyber Defense, Securitycyber, Cyber War, Cybersecurity, Cybersecurity Training |
|
Internet & Web Security Review: Sophos Named Winner in Security
Analyzing security technologies, standards, products, innovations and best practices including cyber-security, IPS, encryption, mobile security, managed services and cloud computing security worldwide. |
MS-ISAC Cyber Security Operations Center for State, Local, Territorial and Tribal Governments Launched The Multi-State Information Sharing and Analysis. |
The first one to be attended by Obama and Medvedev, is scheduled for November 20 to discuss, in addition to missile defense, issues ranging from proliferation, counter terrorism, anti-narcotics policy, and cyber security. |
Register them under cyber employment act & create a new young army for security-cyber of our country INDIA.The intention is to rehabilitate youth lured in cybercrime. JAI HIND..!! Any thing for India..!! Every thing for Indians. |
Latest Technology, Computers latest technology, How to, Hacking, Anti Viruses, Computer Field News, Computer Tips, Internet Tips updates and news allrounder. |
A Blog Bulletin introducing current ideas on cyber-security, crime, cultural criticism, philosophy, surveillance, and poetry and religion, social-legal cyber/criminology. E-GOVERNANCE/BUSINESS |
I was just listening to a podcast on Fire Sheep: Check out some info on http://www.keprtv.com/news/local/107360348.html. This allows anyone to hijack someone on the same networks account for things like Facebook and Twitter. |
Cyber security is not something we should ignore when making payment online. The site that you are making your payment to, most have all the necessary securities, aside from its ability to accept payment from different card company. |
--Howard A. Schmidt, Former White House Cyber Security Advisor. "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't),
Links Blogs: |
|
Posted by
Jason Buchen at
1:34 PM No comments:

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Tuesday, November 16, 2010
Cyber Security News 16 Nov 2010
Countryside may turn tech
The proposed offerings include cyber security, video gaming and animation, aerospace and television production. "There are lots of hot areas now that I
China telecom briefly hijacked US Web traffic: panel
Cyber experts are watching Baidu, Google's competition in China, to see if it improves suddenly. Sudden improvement would indicate that Baidu was using
AvMed sued over loss of computers holding personal info
Cyber thieves often will wait a number of years until people lower their guard before using their identities to apply for credit cards, bank accounts or
Actor Mark Valley resumes action role in Human Target's second season.
The United States faces a major threat in the future from cyber technologies that will require civil-military co-ordination to shield networks from attack,
PayPal users: Beware of holiday phishing scam
The holidays come with a dramatic spike in shopping, and nobody appreciates the increase in online commerce more than cyber criminals.
Amazon Unleashes Teraflop Cloud – Hackers in Love
One of the main reasons cyber-crime is so out of control now is that the World Wide Web was built on a foundation magical thinking in the form of the ...
The Case Against COICA
Cybersecurity problems will grow.Currently, ISPs are in a position to keep DNS servers well-maintained and secure, to the benefit of their users.
Trend Micro Battles Cyber Missile with Detection Tool Security professionals fighting Stuxnet can use all the help they can get. Discovered in June by a Belarus
Smart Grid Interoperability Panel Reaches New Milestone with Process for
(along with those on Smart Grid Architecture and on Smart Grid Cyber Security), presented to the SGIP a plan on the testing and certification process.
US faces 'huge' cyber threat in the future: Gates
Gates said the challenge for cyber security efforts inside the United States is that resources and expertise are concentrated in the military and the
Posted by
Jason Buchen at
5:25 PM No comments:

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: cyber security, security cyber
Saturday, November 13, 2010
Geospatial TTPs Contribute To Cyber Security | SYS-CON MEDIA
Geospatial TTPs Contribute To Cyber Security | SYS-CON MEDIA
"The Geospatial tradecraft has benefited from the development of tactics, techniques and procedures (TTP) that have played a major role in combating terrorism in the 21st century. These TTPs have improved the situational awareness of the operational environment, vital to understanding and mitigating threats to U.S. National Security. The cyber environment provides a new haven for those intending to act against U.S. National Security interests but that threat can also be reduced through the use of geospatial TTPs. A geospatial perspective of the cyber environment can create an increased situational awareness of computer network attacks and exploitations against Command & Control, Computers & Communications that drive Intelligence, Surveillance and Reconnaissance (C4ISR) in support of U.S. National Security interests. Geospatial TTPs will once again prove their value in helping to define and reduce the threat to critical infrastructure and operating systems that support C4ISR."
"The Geospatial tradecraft has benefited from the development of tactics, techniques and procedures (TTP) that have played a major role in combating terrorism in the 21st century. These TTPs have improved the situational awareness of the operational environment, vital to understanding and mitigating threats to U.S. National Security. The cyber environment provides a new haven for those intending to act against U.S. National Security interests but that threat can also be reduced through the use of geospatial TTPs. A geospatial perspective of the cyber environment can create an increased situational awareness of computer network attacks and exploitations against Command & Control, Computers & Communications that drive Intelligence, Surveillance and Reconnaissance (C4ISR) in support of U.S. National Security interests. Geospatial TTPs will once again prove their value in helping to define and reduce the threat to critical infrastructure and operating systems that support C4ISR."
Posted by
Jason Buchen at
7:46 PM No comments:

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Subscribe to: Posts (Atom)