Some Signs Point to Shamoon as Malware in Aramco Attack
Dennis Fisher
https://threatpost.com/en_us/blogs/some-signs-point-shamoon-malware-aramco-attack-082212

Excerpt:
“While researchers continue to dig into the Shamoon malware, looking for its origins and a complete understanding of its capabilities, a group calling itself the Cutting Sword of Justice is claiming responsibility for an attack on the massive Saudi oil company Aramco, which some experts believe employed Shamoon to destroy data on thousands of machines.”


 

Shamoon Malware Steals Data, Makes Computers Unusable
Chloe Albanesius
http://www.pcmag.com/article2/0,2817,2408602,00.asp

Excerpt:
“Several security firms this week highlighted new malware that appears to be targeting specific companies in the energy industry. Though Shamoon includes components that reminded security analysts of the Flame malware, the threat does not appear to be widespread.


 

Shamoon virus targets energy sector infrastructure
http://www.bbc.com/news/technology-19293797

Excerpt:
"The attack, known as Shamoon, is said to have hit "at least one organisation" in the sector. Shamoon is capable of wiping files and rendering several computers on a network unusable."


 

Failure of Senate to pass Cybersecurity Act leaves us all at risk 
John Dix
http://m.networkworld.com/columnists/2012/081312-edit.html

Excerpt:
“The Senate failed to muster enough votes to pass the watered-down Cybersecurity Act of 2012 (S. 2105) earlier this month, which reminds me of the line by Col. Nathan R. Jessep in the movie "A Few Good Men": "All you did was weaken a country today ... That's all you did. You put people's lives in danger."”


 

The water pump alarm
John Dix
http://m.networkworld.com/columnists/2011/120111-editorial.html

Excerpt:
“If nothing else, the now disputed "hacking" of an Illinois water utility has brought the spotlight back to shine on the vulnerability of our national infrastructure. This subject goes in and out of vogue in various government circles, yet we still seem to be treading water, waiting for a real attack to make us serious about addressing the threat.”


 

Syrian dissidents besieged by malware attacks
Dara Kerr
http://news.cnet.com/8301-1009_3-57494231-83/syrian-dissidents-besieged-by-malware-attacks/

Excerpt:
“As the Syrian civil war continues to escalate, pro-government forces are allegedly carrying out a cyberwar against local dissidents. Syrian activists, journalists, and government opposition groups are under a barrage of targeted malware attacks, according to the watchdog group Electronic Frontier Foundation.”


 

Blogger: Israeli attack in Iran will include, missiles, assassinations
http://www.ynetnews.com/articles/0,7340,L-4269110,00.html

Excerpt:
“Any Israeli attack on Iran will open with a "coordinated strike, including an unprecedented cyber-attack which will totally paralyze the Iranian regime and its ability to know what is happening within its borders," American blogger Richard Silverstein wrote Wednesday.”


 

Imperva CEO: Companies Are Getting It Wrong On Cybersecurity
Parmy Olson
http://www.forbes.com/sites/parmyolson/2012/08/15/imperva-ceo-companies-are-getting-it-wrong-on-cybersecurity/

Excerpt:
“Protecting our online data is vital, but security executives often lament that their industry isn’t given the attention it deserves. Companies tend to react to cyber attacks rather than prepare for them, and malicious hackers meanwhile learn new tricks to circumvent the gates.”


 

Saudi Aramco says virus shuts down its computer network
http://www.reuters.com/article/2012/08/15/us-aramco-virus-idUSBRE87E18S20120815

Excerpt:
“The world's biggest oil company said that although the virus affected some computers, it did not penetrate key components of the network, which it said would return to normal operating mode soon.”


 

Cyber Arms Deals and Latin America in the Post-Stuxnet World
W. Alex Sanchez
http://www.infosecisland.com/blogview/22103-Cyber-Arms-Deals-and-Latin-America-in-the-Post-Stuxnet-World.html

Excerpt:
“Malware can be acquired online fairly easily as many websites allow hackers to upload basic malware programs for download. Usually these viruses target basic software like chat programs, cracking product keys for professional software like Windows or Adobe Suite, and Trojans that can be sent to infect other computers.”


 

No company is below the radar in CyberSecurity
Kevin Dowd
http://www.businessrevieweurope.eu/technology/no-company-is-below-the-radar-in-cybersecurity

Excerpt:
“Large companies usually recognise this and perhaps have the wherewithal to do something about it. But SMEs cannot assume they are below the radar and therefore not likely to experience phishing or data breaches. The recent report from the Anti-PhishingWorking Group, revealed a rise in attacks on SME brands and that hackers are looking to exploit any kind of a relationship between a consumer and an enterprise”


 

More human than human – Flame’s code injection techniques
http://www.cert.pl/news/5874/langswitch_lang/en

Excerpt:
“Flame aka Flamer aka Skywiper is a sophisticated trojan application discovered in 2012. Since then it has been the subject of extensive analysis by malware research community. The trojan has been recognized as extraordinarily complicatied, with a modular design and advanced algorithms.”


 

Government sets up cyber crime unit
Taddeo Bwambale
http://www.newvision.co.ug/news/633882-government-sets-up-cybercrime-unit.html

Excerpt:
“The Government has set up a Computer Emergency Response Team (CERT), a specialised unit under the Uganda Communications Commission (UCC) to detect internet crime in the country. The unit will prowl the internet to monitor and report high-tech crimes including cyber-based terrorism, computer intrusions, online sexual exploitation, and major cyber frauds.”


 

Trading Program Ran Amok, With No ‘Off’ Switch
Jessica Silver-Greenberg, Nathaniel Popper And Michael J. De La Merced
http://dealbook.nytimes.com/2012/08/03/trading-program-ran-amok-with-no-off-switch/

Excerpt:
“When computerized stock trading runs amok, as it did this week on Wall Street, the firm responsible typically can jump in and hit a kill switch. But as a torrent of faulty trades spewed Wednesday morning from a Knight Capital Group trading program, no one at the firm managed to stop it for more than a half-hour.”



Phishing the financial and banking seas
http://www.independent.com.mt/news.asp?newsitemid=148676

Excerpt:
“With the introduction of mobile devices, social networks, and the arrival of new technologies such as Near Field Communications, the attack surface area against banking and financial institutions has exploded. Consequently, these vast financial and banking seas offer plentiful opportunities for criminals to “fish” successfully at our expense.”



Retrieving Digital Evidence: Methods, Techniques and Issues
http://belkasoft.com/download/info/Retrieving%20Digital%20Evidence%20-%20Methods,%20Techniques%20and%20Issues.pdf

Excerpt:
A recent research conducted by Berkeley scientists concluded that up to 93% [1] of all information
never leaves the digital domain. This means that the majority of information is being created,
modified and consumed entirely in digital form.


 

US resists control of internet passing to UN agency
Leo Kelion
http://www.bbc.com/news/technology-19106420

Excerpt:
“The US has confirmed it would resist efforts to put the internet under the control of the United Nations. At present several non-profit US bodies oversee the net's technical specifications and domain name system. They operate at arms-length from the US government but officially under the remit of its Department of Commerce.”


 

DDoS attacks targeting traditional telecom systems
Curt Wilson 
http://ddos.arbornetworks.com/2012/07/ddos-attacks-targeting-traditional-telecom-systems/

Excerpt:
“When discussing a recent ideological telecommunications-based DDoS attack upon a law enforcement entity around April of 2012, the attackers revealed some details about their approach. In that case, their attack script was based around Asterisk and put to use on a compromised server.”