Cyber Security: China Biggest Threat, Cyber Pearl Harbor, Russian Underground, Passwords and Anonymous v Karl Rove

China Deemed Most Threatening Actor in Cyberspace China is “the most threatening actor in cyberspace” as its intelligence agencies and hackers use increasingly sophisticated techniques to gain access to U.S. military computers and defense contractors, according to the annual report of the  U.S.-China Economic and Security Review Commission mandated by Congress.  The report added that Chinese hackers have…

CLBR Segment 1: Russia’s Underground Cyber Economy

Has Moscow Become the Cyber Crime Outlet Mall? with Rik Fergus Director of Security Research and Communication at Trend Micro OVERVIEW:   Russian Underground 101 – a Trend Micro Report Trend Micro has released a report providing an overview of the cyber crime services and prices offered by the Russian underground revealing “a vibrant community of…

Cyber Security Zone: LinkedIn Tops Target Roll Call

LinkedIn, eHarmony Headlines Latest Hacked Roll Call With breaches at LinkedIn and eHarmony reaching a combined 8 million users, there has been renewed attention towards using strong passwords and using different passwords for different sites.   The infographic from security firm Rapid7 below demonstrates, demonstrates the dangers of weak passwords. If you are concerned about…

Cyber Attacks Jump 81 Percent in 2011, ISSA Summit and April Targets

 Cyber Attacks Jump 81 Percent in 2011 Symantec’s annual internet security threat report reports that Symantec blocked over 5.5 billion attacks in 2011 – an increase of 81 percent.  The report also details that hackers exposed 187 million identities in 2011; mobile vulnerabilities increased 93 percent and advanced targeted attacks spread to organizations of all…

CLBR Segment 1: Josh Levy from Free Press on CISPA and Stop Cyber Spying Week

Stop Cyber Spying Week On Monday, public interest groups and civil liberties organizations launched a week of Internet-wide protests against the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the controversial cybersecurity legislation that would negate existing privacy laws and allow companies to share user data with the government without a court order. The…

Cyber Security: FCC Proposes Cyber Security Guidelines & March Victims

FCC Offers Voluntary Cyber Security Guidelines The Federal Communications Commission’s Communications, Security, Reliability, and Interoperability Council (CSRIC) released its initial recommendations addressing cyber security threats in commercial networks.    CSRIC recommended that ISPs (i)  adopt an Anti-Bot Code of Conduct that would help detect and remediate bots; (ii) take the first steps towards implementation of DNSSEC secure…

Top Stories of 2011

TOP STORIES OF 2011 #1  AMAZON WARS 2010 ended with the Amazon Tax in effect in three states totally approximately ten percent of the population and GDP.  With the addition of Arkansas, Calfornia, Connecticut, Illinois, Pennsylvania and Vermont the tax has some applicability in states which comprise about 1/3 of the population and GDP the…

Cyber Security: 2012 Threat Predictions

Year end cyber security threat reports by McAfee and Cisco provide some useful warnings and recommendations for 2012.     McAfee lists the top 10 threats as: Industrial threats will mature and segment Embedded hardware attacks will widen and deepen  Hacktivism and Anonymous will reboot and evolve  Virtual currency systems will experience broader and more…

Ted’s Tubes: Cyber Security, ICANN XXX Suit and Canadian Spam Law

Cyber Security: Utility False Alarm is a Warning Reports that a Springfield, Illinois water station pump failure was due to Russian hackers are now being disputed by the Department of Homeland Security, which is also investigating another hacking incident involving a Texas utility.    The incident, however, raises concerns about alleged weak security at critical…

Cyber Security/Cyber Espionage Notebook 1.0

(1) DATA BREACH REGULATION Summary of State Data Breach Laws http://bizsecurity.about.com/od/informationsecurity/a/statebreach_laws.htm Bill to Plug Data Breaches Stalls, Politico http://www.politico.com/news/stories/1111/67464.html#ixzz1ceKiD0Qo (2) CYBER ATTACKS AND CYBER ESPIONAGE Is a Cyber Pearl Harbor on the Horizon, Time Magazine http://battleland.blogs.time.com/2011/08/22/is-a-cyber-pearl-harbor-on-the-horizon/ Cyber Attacks a Growing Threat to US Businesses and National Security, Cyber Report https://ilccyberreport.wordpress.com/2011/09/15/cyber-attacks-a-growing-threat-to-us-business-and-national-security/ Feds Cite Chinese Cyber Army…

Cyber Attacks a Growing Threat to US Business and National Security

Cyber Attacks a Growing Threat to US Business and National Security Bennet Kelley September 15, 2011 The past few weeks have seen a series of cyber attacks against the U.S. government (including penetrating the CIA and US Senate websites); Gmail accounts for U.S. officials, Chinese activists and journalists; multiple defense contractors including Lockheed Martin;international bodies…