Cyber security and the Caribbean
David Jessop

"Most Caribbean governments and companies have yet to take seriously the threat posed by cyber attack. This is despite signs that the region is not immune to the actions of those who use the Internet to breach national security, undertake criminal activity or behave maliciously."


Internet Enemies Report 2012

"This report, which presents the 2012 list of countries that are "Enemies of the Internet" and "under surveillance," updates the report published on 12 March 2011."


For cloud services, security first - growth second, is the winning strategy
Richard Stiennon

"As more and more attacks on data stores hit the news it is becoming evident that security is going to be the primary concern of anyone moving their data off site, particularly to the cloud."


Stewardship in Cyberspace
Melissa E Hathaway and John E. Savage

"ISPs come in many forms and sizes and go by many names: the phone company, the cable company, the wireless company, etc. They are the Internet stewards: planning and managing resources, providing reliable connectivity, and ensuring delivery for traffic and services."

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)
James Bamford

"Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world's communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks."


U.S. Department of Defense preps cyber rules of engagement, plans to work more closely with ISPs
Sean Buckley

"The Pentagon left no room for argument last year when it declared cyber attacks a potential act of war. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," a military official reportedly remarked."


Europe needs a coherent security policy, says digital commissioner
Jennifer Baker

"Internet security cannot be left to the national security agencies said the EU's digital agenda commissioner as she outlined her plans for a Europe-wide cybersecurity strategy."


2012 Data BREACH Investigations Report

"The online world was rife with the clashing of ideals, taking the form of activism, protests, retaliation, and pranks. While these activities encompassed more than data breaches (e.g., DDoS attacks), the theft of corporate and personal information was certainly a core tactic. This re-imagined and re-invigorated specter of "hacktivism" rose to haunt organizations around the world."


Significant Cyber Incidents

"Significance is in the eye of the beholder, but we focus on successful attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars."


Cost Of UK's Data Breaches Up 68 Per Cent In 5 Years
Darren Allan

"When it comes to UK companies, that cost has risen considerably, indeed it's up 68 per cent over the last five years. The study, however, used a fairly small sample of 36 firms, finding that the average cost of a breach had risen every year over the last half a decade."




The First Italian Cybercrime Report is Available
Paolo Passeri

"Yesterday, during the Italian Security Summit 2012, the Italian Clusit Association has unveiled the first Italian Cybercrime Report for which I acted as a contributor (in particular I compiled the section dedicated to the Italian Cyber Attacks), putting also at disposal my 2011 Cyber Attacks Timeline for the Report's introduction."


National Security Agency Pressed to Reveal Details on Google Deal
John P. Mello Jr.

"The Electronic Privacy Information Center is locking horns with the National Security Agency over a secret deal the agency cut with Google following an attack on Gmail by Chinese hackers in 2010."


Cyber threat from abroad on the rise
Cao Yin and Xu Wei

"Cyber attacks on China launched from bases overseas surged in 2011, rising to 8.9 million computers affected from 5 million the previous year, according to a network security report. Japan was the source of most attacks (22.8 percent), followed closely by the United States (20.4 percent) and the Republic of Korea (7.1 percent)."


Stuxnet, The Nation's Power Grid, And The Law Of Unintended Consequences
Brian Royer

"The debate persists: Should the feds supply security oversight for utilities to stop the next Stuxnet? Or can they really go it alone?"


Russia comes up with cyberwar strategy

"Russia's Defense Ministry has published the concept of the armed forces within the information space that reflects Russia's strategy in cyberwar. For about 3 months Russia has its own strategy of warfare in cyber space."


Iran and the era of cyber infection
Dominic Basulto

"Like it or not, we've entered a new era in which the global geopolitical balance may be determined by hackers and cyber-activists in hooded sweatshirts rather than career diplomats in fashionable pantsuits"


The evolution of malware and the threat landscape – a 10-year review

"As the Internet has extended its reach over the last 10 years, malware (malicious software) has evolved and become more complex. Early forms of malware sought to generate high-profile nuisance attacks, but today its aims are increasingly pernicious, focusing on theft and other illicit activities. Malware has become much more of a concern for organizations; Internet connectivity was still the exception to the rule for many organizations before 2002, but it quickly became the norm as the first decade of the 21st century unfolded."


Clouds and law enforcement access

"When talking about use of cloud services an issue that often comes up is whether the ability of foreign law enforcement services to access data makes it illegal to use a service in that country."


India drops plans for government control of Internet
Kieren McCarthy

"India has dropped its plans to create a new United Nations body that would oversee the Internet, with the country's foremost Internet governance voice telling .Nxt it was "not well thought out"."


Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
Elizabeth Montalbano

"U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New York City's electric supply during a summer heat wave. The demonstration was part of an effort by lawmakers to encourage bi-partisan cooperation on cybersecurity to underscore how important it is for the feds to align on the issue."

Standards for cyber security testing to be introduced
Nicola Roxon

"Australian businesses will have clear and agreed standards for cyber security testing with today's announcement that an Australian branch of the Council of Registered Ethical Security Testers (CREST) has been established."


Obama to Simulate Cyber Attack on New York Power to Lobby Senate
Eric Engleman and Chris Strohm

"The Obama administration will simulate a cyber attack crippling New York City's electric supply during a summer heat wave to drum up support for cybersecurity legislation."


'Inadequate' Irish cybercrime law may benefit hacking accused
Jennifer Hough

"Irish cybercrime law is inadequate and outdated and this may favour two young Irish students alleged to be at the centre of a global hacking ring if the US seeks to extradite them, a law expert has said."


UK gives £100k to implement Convention on Cybercrime

"The UK's Foreign and Commonwealth Office has committed £100,000 to implementing the Council of Europe's Convention on Cybercrime, a set of standardised rules for policing electronic crime. The Council of Europe, a separate organisation from the European Union focused on law and human rights, first drafted the treaty in Budapest in 2004, with the intention of harmonising electronic crime laws across European countries and beyond."


Terror of the 'b0ogleman'
Yuen Meikeng

"Five government websites have been defaced by a hacker known as "b0ogle". Three of the websites belong to the Water Supply Department, Energy, Green Technology and Water Ministry and Sewerage Service Department."


A Framework for Vulnerability Reports
Howard Anderson

"A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities."


Don't Believe the Hype: Most 'Cyberwar' Attacks Aren't Unusual

"If you listen to government or military officials, security experts or news pundits long enough — such as on this week's broadcast of "60 Minutes" — you'll be convinced that every single cyberattack is the newest instance of a dawning cyberwar."


Anonymous hacked?
Chris Matyszczyk

"A report by Symantec suggests that members of Anonymous may have downloaded a Zeus Trojan that gave hackers access to their financial details. Anonymous, for its part, declares Symantec's report "libelous.""


Report: Hackers seized control of NASA computers
Dan Merica

"Hackers targeting sensitive NASA computers have gained access to employee credentials and taken control of systems at NASA's Jet Propulsion Laboratory, among other things, a federal report says."


Tracking Down Advanced Threats In Your Network
Robert Lemos

"While the term "advanced persistent threat" (APT) has become a marketing buzzword, persistent attackers do pose a real threat for companies, Greg Hoglund, founder and chief technology officer of HBGary, told attendees here today at the RSA Conference."


Impact of terminating the DNS server of DNSChanger

"Recently, the Information Security News reported that the U.S. Federal Bureau of Investigation (FBI) will shut down those domain name server (DNS - Note 1) associated with the DNSChanger Botnet on March 8. What is the impact of this incident to the Internet users? Hong Kong Computer Emergency Response Team Coordination Center (HKCERT) would like to give some the background information of DNSChanger, method to detect infection and solution for the affected users to handle it in time."


Log management deserves a company's respect

"Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it's the law. Still, few companies take advantage of the benefits of log maintenance when it comes to detecting and responding to data breaches"


White House, NSA weigh cybersecurity, personal privacy
Ellen Nakashima

"The National Security Agency has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks but has been rebuffed by the White House, largely because of privacy concerns, according to administration officials and internal documents."