Alliance of IT security groups issues cyber principles for government
Greg Masters
http://www.scmagazine.com/alliance-of-it-security-groups-issues-cyber-principles-for-government/article/247185/

Excerpt:
"In a new proposal aimed at governments worldwide, an alliance of IT security groups from the United States, Europe and Japan issued a call for cooperation between government and private industry to further advance cyber security initiatives while not encumbering processes with complex regulations."


 

The Threat Landscape Shifts Significantly in the European Union - Part 1
Tim Rains
http://blogs.technet.com/b/security/archive/2012/06/25/the-threat-landscape-shifts-significantly-in-the-european-union-part-1.aspx

Excerpt:
"Of the 27 member states of the European Union (EU) we have identified the locations with the highest malware infection rates. We determine this using a measure called computers cleaned per mille (CCM). The CCM is the number of computers found infected with malware for every 1,000 systems scanned by the Microsoft Malicious Software Removal Tool (MSRT) which runs on over 600 million systems worldwide on a monthly basis."


 

UK firm 'lost £800m to cyber attack' 
Kim Sengupta
http://www.independent.co.uk/news/uk/home-news/uk-firm-lost-800m-to-cyber-attack-7881204.html

Excerpt:
"Cyber attacks by a foreign state resulted in a British company losing £800m in revenue, the head of MI5 revealed yesterday. This "was not just through intellectual property loss but also from commercial disadvantage in contractual negotiations", said Jonathan Evans."


 

Cyber threats and sabotage on critical infrastructure are on the rise: Report
http://security.cbronline.com/news/cyber-threats-and-sabotage-on-critical-infrastructure-are-on-the-rise-report-200612

Excerpt:
"There has been a dramatic increase in cyber threats and sabotage on critical infrastructure and key Resources, according to a latest report by the Pacific Northwest National Laboratory (PNNL), a federal contractor to the US Department of Energy (DOE) and McAfee."

 


 

Metadata: The Hidden Treasure
http://resources.infosecinstitute.com/metadata-the-hidden-treasure/

Excerpt:
"Simple data can be described as raw values which need to be processed for the purpose of generating information and deriving knowledge. Meta data is commonly described as 'data about data'; however this definition is not complete and does not covers all properties of metadata."


 

Cyber-war: more Bangladesh Government sites hacked by Myanmar Hackers 
http://www.ehackingnews.com/2012/06/cyber-war-more-bangladesh-government.html

Excerpt:
"After Bangladesh cyber army declares cyber-war against Myanmar and hack few government sites, Myanmar Hackers group known as 'Blink Hacker Group(BCH)' hack more Bangladeshi Government sites."


 

UK businesses worst in Europe at protecting information
http://www.net-security.org/secworld.php?id=13122

Excerpt:
"The findings reveal that though many British businesses do have a data protection and information risk strategy in place, most fail to monitor its effectiveness. In Hungary, with its high level of ISO certification, businesses are more likely to have training programs, clear guidance, codes of conduct and employee communication programs in place"


 

Targeted Cyber Intrusion Detection And Mitigation Strategies
http://www.us-cert.gov/control_systems/pdf/ICS-TIP-12-146-01.pdf

Excerpt:
"Sophisticated and targeted cyber intrusions against owners and operators of industrial control systems across multiple critical infrastructure sectors have increased in recent months. ICS-CERT developed the following guidance to provide basic recommendations for owners and operators of critical infrastructure to mitigate the impacts of cyber attacks and enhance their network security posture."


 

Tanzania: Cyber Crime: How Safe Are You?
Tom Mhando
http://allafrica.com/stories/201206170306.html

Excerpt:
"Cyber crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet … Such crimes may threaten a nation's security and financial health. Issues surrounding this type of crime has become high-profile."


 

Cyber Warfare, Budget Cuts and a Shortage of Cyber Experts
Pierluigi Paganini 
http://www.infosecisland.com/blogview/21637-Cyber-Warfare-Budget-Cuts-and-a-Shortage-of-Cyber-Experts.html?utm_source=twitterfeed&utm_medium=twitter

Excerpt:
"The Flame case has raised questions about the real cyber warfare capabilities of every country, and we have spoken of the strong commitment by the Indian and German governments, praising the US capabilities for their involvement in operations such as the "Olympic Games" project."


 

How Flame virus has changed everything for online security firms
John Naughton
http://www.guardian.co.uk/technology/2012/jun/17/flame-virus-online-security

Excerpt:
"The Flame virus went undetected for two years by every online security firm. Now they need to find a new way to protect the world's PCs from malware"


 

Myth or Fact? Debunking 15 of the Biggest Information Security Myths
Cindy Valladares
http://www.tripwire.com/state-of-security/it-security-data-protection/myth-or-fact-debunking-15-of-the-biggest-information-security-myths/

Excerpt:
"The information security industry isn't excluded from having its own share of myths. So, I got in touch with some European security professionals to share their views on some of the biggest security myths that need busting."


 

The Security Paradox Of IPv6; Shoring Up The Holes
Danny McPherson
http://www.forbes.com/sites/ciocentral/2012/06/04/the-security-paradox-of-ipv6-shoring-up-the-holes/

Excerpt:
"IPv6 presents a security paradox. The capabilities IPv6 provides will enhance online security – but the shift to the new Internet address scheme may also present risks if not properly managed."


 

Back to Stuxnet: the missing link
http://www.securelist.com/en/blog/208193568/Back_to_Stuxnet_the_missing_link

Excerpt:
"… when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of the Tilded platform which Stuxnet and Duqu are based on."


 

Nigeria: Cybercrime Threatens E-Commerce Growth
Amaka Eze
http://allafrica.com/stories/201206110994.html

Excerpt:
"… industry analysts say that the growing wave of cybercrimes in the country without much effort from the government to see that pending bills aimed at criminalising the acts are passed into law, has been identified as a major drawback to the development of e-commerce in Nigeria."


 

Flame virus linked to Stuxnet: researchers
http://news.yahoo.com/flame-spy-virus-gets-order-vanish-experts-205746377.html

Excerpt:
"The Flame computer virus which has been raging in the Middle East has strong links to Stuxnet, a malware program widely believed to have been developed by the United States or Israel, a security firm said Monday… Flame, even though it was discovered just recently, appears to predate Stuxnet, which was created in 2009."



India to add muscle to its cyber arsenal
Josy Joseph
http://articles.timesofindia.indiatimes.com/2012-06-11/india/32174336_1_cyber-attacks-offensive-cyber-government-networks

Excerpt:
"India is set to take steps to protect its cyber infrastructure and designate agencies for carrying out offensive cyber attacks on other countries. The move comes at a time when proof shows countries launching cyber attacks — not only for intelligence gathering — and many nations describing the attacks as an act of war."


 

The threat from Flamer
http://www.enisa.europa.eu/media/news-items/The-threat-from-Flamer.pdf

Excerpt:
"Flamer, according to technical analyses of various security teams, is a stealthy information stealer hitting hundreds of targeted PC users across the Middle East. Though, there is no direct threat for the vast majority of users, Flamer serves as an opportunity to learn about the threats we are facing and as a reminder to continue improving cyber security across Europe. "


 

Why The U.N. Cares So Much About Flame Malware
http://idealab.talkingpointsmemo.com/2012/06/why-the-un-cares-so-much-about-flame-malware.php

Excerpt:
"… The International Telecommunications Union (ITU) itself has played a questionable role in Flame's discovery and publication. According to Kaspersky Labs, a Russian cybersecurity firm that was one of the first to detect and report Flame on computers in the Middle East, the ITU sought Kaspersky's help in finding another piece of malware that was "deleting sensitive information across the Middle East." It was in searching for this other piece of malware, nicknamed Wiper, that Kaspersky allegedly discovered Flame."


 

Hacktivist group Anonymous acts on threat, brings down govt website
Sandhya Soman & Javed Anwer
http://articles.timesofindia.indiatimes.com/2012-06-09/internet/32139853_1_govt-website-web-censorship-opindia

Excerpt:
"Hours ahead of its planned protest against certain incidents of internet censorship in India, hacker collective Anonymous has attacked and brought down the website run by Computer Emergency Response Team India (CERT-In), the country's premier agency dealing with cyber security contingencies."


 

MP-DDoser: A rapidly improving DDoS threat
Jeff Edwards
http://ddos.arbornetworks.com/2012/06/mp-ddoser-a-rapidly-improving-ddos-threat/

Excerpt:
"… MP-DDoser was first documented in February 2012 by Arbor analyst Curt Wilson in his pioneering survey of modern DDoS threats. Like many of the malware families we see these days, MP-DDoser is exclusively a DDoS bot; it has no ability to do key-logging, info-stealing, spamming, or other such mayhem. We started seeing the first MP-DDoser samples back in December 2011, which billed themselves as "Version 1.0″."


 

Cyberpower and International Security
David Betz
http://www.fpri.org/enotes/2012/201206.betz.cyberpower-international-security.html

Excerpt:
"Like the shock paddles of a defibrillator on the chest of a heart attack victim the prefix 'cyber' has an electrifying effect on policymakers and strategists wrestling with the complexities of information age security—or more commonly today, "cybersecurity." Successfully attaching the term to this or that policy appears to markedly increase its chances of survival. "


 

Understanding cyberspace is key to defending against digital attacks
Robert O'Harrow Jr.
http://www.washingtonpost.com/investigations/understanding-cyberspace-is-key-to-defending-against-digital-attacks/2012/06/02/gJQAsIr19U_story.html

Excerpt:
"Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace."


 

Cyber search engine Shodan exposes industrial control systems to new risks
Robert O'Harrow Jr.
http://www.washingtonpost.com/investigations/cyber-search-engine-exposes-vulnerabilities/2012/06/03/gJQAIK9KCV_print.html

Excerpt:
"It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet. After tinkering with code for nearly a decade, Matherly eventually developed a way to map and capture the specifications of everything from desktop computers to network printers to Web servers."


 

"Flame" malware was signed by rogue Microsoft certificate
Dan Goodin 
http://arstechnica.com/security/2012/06/flame-malware-was-signed-by-rogue-microsoft-certificate/

Excerpt:
"Microsoft released an emergency Windows update on Sunday after revealing that one of its trusted digital signatures was being abused to certify the validity of the Flame malware that has infected computers in Iran and other Middle Eastern Countries."