The UK Cyber Security Strategy Protecting and promoting the UK in a digital world
http://www.cabinetoffice.gov.uk/sites/default/files/resources/The%20UK%20Cyber%20Security%20Strategy-%20web%20ver.pdf

Excerpt:
"As with most change, increasing our reliance on cyberspace brings new opportunities but also new threats. While cyberspace fosters open markets and open societies, this very openness can also make us more vulnerable to those – criminals, hackers, foreign intelligence services – who want to
harm us by compromising or damaging our critical data and systems."


 

Government finally announces Cyber Security Strategy
Rosalie Marshall
http://www.v3.co.uk/v3-uk/news/2127751/government-finally-announces-cyber-crime-strategy

Excerpt:
"The government has published its long-awaited Cyber Security Strategy, outlining how it intends to strengthen the ability of businesses, the government, the military and consumers to tackle online crime."


 

APT Or Not APT? Discovering Who Is Attacking The Network
Robert Lemos
http://www.darkreading.com/advanced-threats/167901091/security/client-security/232200009/apt-or-not-apt-discovering-who-is-attacking-the-network.html

Excerpt:
"Advanced persistent threats -- a term that's become much maligned since the media locked onto it -- describes attackers that are targeting specific companies and data, rather than searching for vulnerable targets of opportunity."


 

21st Century Chinese Cyber Warfare
http://www.cybersummits.com/eu/pdf/day1/Red-Dragon-part-2.pdf
http://www.cybersummits.com/eu/workshops.shtml

Excerpt:
"Nation state information warfare has evolved and is evolving at a rapid pace! One begs the question - how long before this fifth dimension of cyber warfare crosses the vector with kinetic warfare?"


 

Pinoy hackers with terrorist links nabbed
Raymond Africa
http://www.malaya.com.ph/nov25/news15.html

Excerpt:
"OPERATIVES from the Criminal Investigation and Detection Group and the United States Federal Bureau of Investigation busted Wednesday night a group of Filipino hackers funded by a Saudi-based terrorist group."


 

UK firms to trial sharing of cyber attack data
Tim Castle
http://www.reuters.com/article/2011/11/25/britain-cyberspace-idUSL5E7MP24E20111125

Excerpt:
"Companies from five strategic sectors - defence, telecoms, finance, pharmaceuticals and energy - will take part in a pilot with the government starting in December to exchange information on cyber attacks and threats to their businesses."


 

Britain prepares cyber attacks on rogue states
Duncan Gardham
http://www.telegraph.co.uk/news/uknews/defence/8916960/Britain-prepares-cyber-attacks-on-rogue-states.html

Excerpt:
"GCHQ and the Ministry of Defence are developing a capability to launch cyber attacks against hostile states and terrorists, the government has admitted. Two separate units in the Defence Cyber Operations Group are working on an offensive capability to strike back at enemies who are trying to start electronic attacks on critical national infrastructure."


 

Department of Homeland Security (DHS) denies report of water utility hack
Elinor Mills
http://news.cnet.com/8301-27080_3-57330029-245/dhs-denies-report-of-water-utility-hack/

Excerpt:
"The Department of Homeland Security and FBI today dismissed the conclusions of a report that a cyber intrusion caused a pump at an Illinois water utility to burn out. But the statement doesn't explain why an Illinois state terrorism intelligence center would say it was a hacker when it wasn't."


 

The spies behind your screen
Angus Batey
http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html

Excerpt:
"Developed by Vincenzetti and a team of former computer hackers, RCS is able to "invade" a digital device undetected, bypass the most sophisticated electronic defences so far devised and, if the user so desired, disrupt the running of anything from a railway signalling system to a nuclear power station."


 

State seeks to protect IT networks
Gordon Smith
http://www.irishtimes.com/newspaper/finance/2011/1125/1224308102235.html

Excerpt:
"A CONSULTANT TO protect State assets and important infrastructure from cyber attacks will shortly be appointed by the Department of Communications, Energy and Natural Resources. Following a tender process the winning firm will create the State's first computer emergency response unit."


 

Did an Illinois Water Utility Come Under a Cyberattack?
Jeffrey Carr
http://www.slate.com/articles/technology/future_tense/2011/11/cyber_attack_on_an_illinois_water_utility_.html

Excerpt:
"A danger scenario that national security experts have been warning about has finally happened—at least, according to news headlines. Reports say that a cyberattack carried out by foreign nationals successfully shut down a pump at an Illinois water utility. But is that really what happened?



UK government 'planning to launch Stuxnet-like attacks' against hostile states
Zack Whittaker
http://www.zdnet.com/blog/london/uk-government-8216planning-to-launch-stuxnet-like-attacks-against-hostile-states/1128

Excerpt:
"The UK's cyber-security strategy includes "proactive" tactics and "plans to deliver military effects" in order to authorise the use of launching Stuxnet-like state-targeted malware."


 

Man-made super-flu could kill half humanity
http://rt.com/news/bird-flu-killer-strain-119/

Except:
"A virus with the potential to kill up to half the world's population has been made in a lab. Now academics and bioterrorism experts are arguing over whether to publish the recipe, and whether the research should have been done in the first place."


 

United Nations Hacked by TeaMp0isoN, Details Leaked
Eduard Kovacs
http://news.softpedia.com/news/United-Nations-Hacked-by-TeaMp0isoN-Details-Leaked-237086.shtml

Excerpt:
"The website of the United Nations Development Programme was hacked by TeaMp0isoN and tons of details were leaked as a form of protest against what they call 'the bureaucratic head of NATO used to legitimise the Barbarism of Capitalist elite'."


 

Anonymous bloggers in danger of being exposed
http://www.net-security.org/secworld.php?id=12008

Excerpt:
"You're a blogger who, for whatever reason, wishes to remain anonymous. You are careful not to mention anything that could tie the blog to you, and you have gone through the trouble of hiding any personal information that might show on the domain record and made sure other sites (or blogs) you maintain all have different IP addresses."


 

DDoS attacks, mapped
Darren Pauli
http://www.scmagazine.com.au/News/280502,ddos-attacks-mapped.aspx

Excerpt:
"Distributed denial-of-service (DDoS) attacks have quadrupled in recent months and perpetrators have targeted network defence equipment, Prolexic says. Research by the DDoS-prevention company found the volume of attack attacks were up in the last quarter."


 

OIC to come up with network to detect cyber threats
http://www.bt.com.bn/news-national/2011/11/22/oic-come-network-detect-cyber-threats

Excerpt:
"THE Organisation of Islamic Cooperation (OIC) is looking to create an early warning network to prevent the spread of cyber threats from one member country to another as this can cause huge economic loss to governments."


 

Kenya: Blueprint to Prevent Cybercrime Launched
http://allafrica.com/stories/201111221191.html

Excerpt:
"The government has partnered with the United States Agency for International Development (USAID) to enhance its capacity in dealing with increasing threat of cybercrime in the country. Information Permanent Secretary Bitange Ndemo said the partnership is a comprehensive National Cyber Security Master Plan."



Anonymous Leaks Law Enforcement Forensic Secrets
Mathew J. Schwartz
http://informationweek.com/news/security/cybercrime/232200105

Excerpt:
"Members of the hacktivist collective Anonymous Friday released two swaths of data related to government groups, current and former law enforcement agency employees, as well as details of forensics methodologies used in prosecuting computer crimes."


 

Qantas attempt at Twitter promotion a PR disaster
Brendan Casey
http://www.heraldsun.com.au/news/more-news/qantas-attempt-at-twitter-promotion-a-pr-disaster/story-fn7x8me2-1226202446245

Excerpt:
"A QANTAS social media promotion has turned into a PR disaster as users hijacked a promotional tag to tear shreds off the airline."


 

The growing impact of full disk encryption on digital forensics
http://www.sciencedirect.com/science/article/pii/S1742287611000727

Excerpt:
"The increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination."


 

Cyber training no longer basic
Amber Corrin
http://fcw.com/articles/2011/11/28/feat-military-cyber-training.aspx

Excerpt:
"… operations overlap the traditional physical arena, the cyber domain is mostly intangible, with battles waged over networks with no obvious borders and against faceless foes. To meet the threats and operational demands of this unfamiliar territory, the U.S. military is embracing new models and agendas for training its troops."


 

The one ring to rule them all
Angus Batey
http://www.smh.com.au/business/world-business/the-one-ring-to-rule-them-all-20111121-1nqx1.html

Excerpt:
"Developed by Vincenzetti and a team of former computer hackers, Remote Control System (RCS) is able to ''invade'' a digital device undetected, bypass the most sophisticated electronic defences so far devised and, if the user so desired, disrupt the running of anything from a railway signalling system to a nuclear power station."


 

Cyber cooperation needed
http://www.chinadaily.com.cn/opinion/2011-11/22/content_14138092.htm

Excerpt:
"This month a report released by the Project 2049 Initiative, a US-based think tank, details China's signals intelligence organization, and what role it thinks the People's Liberation Army has in collecting cyber intelligence"


 

Local cyberteam tops in regional contest
http://techcentral.my/news/story.aspx?file=/2011/11/21/it_news/20111121123113&sec=IT_News

Excerpt:
"CyberSecurity Malaysia team is the regional winner in the Global CyberLympics Asia Pacific Championship - the first international team ethical-hacking competition ever organised in the country."


 

Honing our cybersecurity skills
http://techcentral.my/news/story.aspx?file=/2011/11/21/it_news/20111121124627&sec=it_news

Excerpt:
"Most representatives from the public and private sectors, who took part in the recent X Maya 4 exercise aimed at improving their skills to handle a cybersecurity ¬crisis, learned a lot. But there is still a small ¬percentage of staff in these ¬sectors who have yet to grasp ¬cybersecurity issues and would have some ¬difficulty in the event of a ¬cyberattack, according to the National Security Council (NSC)."


 

Hacker targets South Houston sewer system
Carol Christian
http://www.chron.com/news/houston-texas/article/Hacker-targets-S-Houston-sewer-system-mayor-2277795.php

Excerpt:
"A hacker identified only as "pr0f" posted diagrams of the South Houston sewer system online to show how easy it is to infiltrate the system."


 

N.Korea 'Hacked E-Mails of Computer Security Boffins'
http://english.chosun.com/site/data/html_dir/2011/11/17/2011111701153.html

Excerpt:
"The National Intelligence Service has concluded that North Korea was behind a hacking attack on the e-mail accounts of 27 alumni of Korea University's Graduate School of Information Security."


 

UK to test banks with simulated cyber attack
http://ibnlive.in.com/news/uk-to-test-banks-with-simulated-cyber-attack/203855-11.html

Excerpt:
"Banks in London, already on high alert for how to deal with a break-up of the euro zone, will on Tuesday be tested to see how they would cope with a cyber attack on their operations."


 

Hacker Says Texas Town Used Three Character Password To Secure Internet Facing SCADA System
Paul Roberts
https://threatpost.com/en_us/blogs/hacker-says-texas-town-used-three-character-password-secure-internet-facing-scada-system-11201

Excerpt:
"…The hacker who compromised software used to manage water infrastructure for South Houston, Texas, said the municipality said the district had HMI (human machine interface) software used to manage water and sewage infrastructure accessible to the Internet and used a password that was just three characters long to protect the system, making it easy picking for a remote attack."


 

Water utility hackers destroy pump, expert says
Dan Goodin
http://www.theregister.co.uk/2011/11/17/water_utility_hacked/

Excerpt:
"Hackers destroyed a pump used by a US water utility after gaining unauthorized access to the industrial control system it used to operate its machinery, a computer security expert said."


 

Security Predictions for 2012
http://www.websense.com/assets/reports/2012-Predictions-WS-Security-Labs.pdf?cmpid=slblog

Excerpt:
"With an influx of bring your own devices (BYOD) and mobility, social media exploding, cloud computing
knocking, and other operational challenges thrown in for good measure, if 2011 was the shocker, then 2012 is likely to be the kitchen sink of security concerns."


 

2012 Cyber Security Warnings: Online Identity More Valuable Than Credit Cards
http://www.huffingtonpost.co.uk/2011/11/17/2012-cyber-security-warni_n_1099193.html

Excerpt:
"A web security firm say your social media profile could be more valuable to than your credit card to cyber thieves in 2012"


 

Hackers attack Norway's oil, gas and defence businesses
http://www.bbc.co.uk/news/technology-15790082

Excerpt:
"Oil, gas and defence firms in Norway have been hit by a series of sophisticated hack attacks. Industrial secrets and information about contract negotiations had been stolen"


 

Terrorists, Spies, and Hackers: The New National Security Landscape
http://www.fbi.gov/news/stories/2011/november/director_111711/director_111711

Excerpt:
"Cyber thieves in Eastern Europe drain bank accounts in America. Spies steal industry secrets and sell them overseas. And alone in their bedrooms, disaffected youths become radicalized by Internet propaganda and vow to wage jihad."


 

New Lingua Franca For Exchanging Cyberattack Intelligence
Kelly Jackson Higgins
http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/231903102/new-lingua-franca-for-exchanging-cyberattack-intelligence.html

Excerpt:
"Free, open-source framework from Mandiant aimed at simplifying the sharing of attack information technical details among victim organizations"


 

U.S. reserves right to meet cyber attack with force
David Alexander
http://www.reuters.com/article/2011/11/16/us-usa-defense-cybersecurity-idUSTRE7AF02Y20111116

Excerpt:
"The United States reserves the right to retaliate with military force against a cyber attack and is working to sharpen its ability to track down the source of any breach…"


 

Criminals get tech-savvy
http://arabnews.com/saudiarabia/article532402.ece

Excerpt:
"Criminals are adopting ever more sophisticated methods to carry out their illegal activities as the world continues to move into the high-tech age…"


 

Fighting in the Fifth Dimension
http://www.aljazeera.com/programmes/aljazeeraworld/2011/10/2011101916939402528.html

Excerpt:
"Helped by advances in electro-magnetics and modern information and communications technology, a new form of electronic warfare has been created. It is called cyberwar and is increasingly recognised by governments and the military as posing a potentially grave threat."


 

How cybercriminals get through the back and front doors
Paul Demery
http://www.internetretailer.com/2011/11/10/how-cybercriminals-get-through-back-and-front-doors

Excerpt:
"As the holiday shopping season gets into full swing, retailers can expect to see more criminal attempts to crack their web sites and network security systems. And this year cyberthieves are likely to step up stealthy techniques like spear phishing and SQL injections to compromise web sites and steal customer account data…"


 

Fear of China masks the work of other web spies
Ry Crozier
http://www.itnews.com.au/News/279623,fear-of-china-masks-the-work-of-other-web-spies.aspx

Excerpt:
"F-Secure CEO Mikko Hypponen has accused 'other countries' of scapegoating China to mask their own targeted spy and espionage activities on the internet."


 

Security threats to expand in 2012
http://www.net-security.org/secworld.php?id=11939

Excerpt:
"Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their corporate networks, according to Digital Assurance."


 

Cyberwar Most Likely to Take Place Among Smaller Powers, Experts Say
Jesse Emspak
http://www.securitynewsdaily.com/cyberwar-small-powers-1329/

Excerpt:
"…the truth is that cyber conflict is far more likely to involve smaller players — and the dangers associated with that possibility are just as real. That's because war is more common in small, unstable areas: it's where the most conflicts are."




Iran develops software to fight Duqu malware
http://security.cbronline.com/news/iran-develops-software-to-fight-duqu-malware-141111

Excerpt:
"Iran has said that a new software developed in the country is fighting the Duqu computer virus, after the cyber weapon was detected in some main sites."


 

Cyber criminals exploit psychological weaknesses
Gordon Smith
http://www.irishtimes.com/newspaper/finance/2011/1111/1224307367706.html

Excerpt:
"CYBER CRIMINALS exploit psychological weaknesses, not just technological flaws, to manipulate victims and make their scams work…"


 

Cyber attacks hit Fujitsu local government system in Japan
http://www.theaustralian.com.au/australian-it/government/cyber-attacks-hit-fujitsu-local-government-system-in-japan/story-fn4htb9o-1226192105614

Excerpt:
"A FUJITSU computer system run by about 200 Japanese local governments has been hit by a series of cyber attacks and is in a vulnerable condition, the company said. The online system, developed to enable local residents to request official certificates and documents on the internet, was paralyzed twice this week, a Fujitsu spokesman said."


 

Hackers target business accounts at banks
Ellen Messmer
http://news.techworld.com/security/3317421/hackers-target-business-accounts-at-banks/

Excerpt:
"Banks are having to fend off ever more attacks from hackers who break into computers of their business customers and try to make fraudulent funds transfers electronically for large amounts."


 

U.S. Government Turns to Crowdsourcing for Intelligence
Dan Parsons 
http://www.nationaldefensemagazine.org/archive/2011/December/Pages/USGovernmentTurnstoCrowdsourcingforIntelligence.aspx

Excerpt:
"Past intelligence failures have been costly and damaging to U.S. national security. Trying to avoid previous pitfalls, agencies are on a constant treasure hunt for new technologies that might give them an edge."


 

Gangsters decapitate Mexican blogger
Ioan Grillo
http://www.globalpost.com/dispatches/globalpost-blogs/que-pasa/gangsters-decapitate-mexican-blogger

Excerpt:
"Mexican tweeters and bloggers were shaken anew on Wednesday when a decapitated body appeared by a statue next to a message that the victim was killed because of what he wrote on the Internet."


 

'Bank Transfer': What About Security?
Tracy Kitten
http://www.bankinfosecurity.com/ismg-ads/ad-google.php?arr_ref=http://www.bankinfosecurity.com/articles.php?art_id=4227

Excerpt:
"Between Occupy Wall Street and the so-called Bank Transfer movement, consumer outrage with big banks is fueling new account growth at community banks and credit unions. But how well prepared are the smaller institutions to handle increased security risks and fraud-prevention demands that come with such quick growth?"


 

'Biggest Cybercriminal Takedown in History'
http://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/

Excerpt:
"The proprietors of shadowy online businesses that have become synonymous with cybercrime in recent years were arrested in their native Estonia on Tuesday and charged with running a sophisticated click fraud scheme that infected with malware more than four million computers in over 100 countries — including an estimated 500,000 PCs in the United States."


 

Esthost Taken Down – Biggest Cybercriminal Takedown in History
Feike Hacquebord
http://blog.trendmicro.com/esthost-taken-down-%E2%80%93-biggest-cybercriminal-takedown-in-history/


Excerpt:
"On November 8, a long-living botnet of more than 4,000,000 bots was taken down by the FBI and Estonian police in cooperation with Trend Micro and a number of other industry partners."



How to check if you are a victim of Operation Ghost Click

Rik Ferguson
http://countermeasures.trendmicro.eu/how-to-check-if-you-are-a-victim-of-operation-ghost-click/

Excerpt:
"Trend Micro and the FBI are very pleased to announce today the dismantling of a criminal botnet, in what is the biggest cybercriminal takedown in history. This concerted action against an entrenched criminal gang is highly significant and represents the biggest cybercriminal takedown in history."



Worldwide security service spending to reach $35.1 billion
http://www.net-security.org/secworld.php?id=11923

Excerpt:
"Worldwide security services spending is on pace to reach $35.1 billion in 2011, up from $31.1 billion in 2010, according to Gartner. The market is forecast to total $38.3 billion in 2012, and surpass $49.1 billion in 2015."


 

Hackers shut down Salvadoran ministry websites
http://www.google.com/hostednews/afp/article/ALeqM5gyuTPuwLs3uJftF5h9B7maaGP89w?docId=CNG.850bcd3404f997227ec4dc17b232e8bb.181

Excerpt:
"Online "hacktivist" group Anonymous has attacked the websites of El Salvador's presidency and government ministries, forcing several to be shut down"


 

Global internet router glitch knocks websites offline across Europe and US
Jenny Williams
http://www.computerweekly.com/Articles/2011/11/08/248400/Global-internet-router-glitch-knocks-websites-offline-across-Europe-and.htm

Excerpt:
"A software bug in a router update brought down websites across the world after data networks crashed. Websites in North America and Europe were affected after Level 3 Communications suffered an outage. Reports suggest a firmware update for Juniper Networks routers caused data networks to crash after a glitch in its Border Gateway Protocol (BGP)."


 

How to find out if your email address has been compromised
Woody Leonhard
http://www.infoworld.com/t/hacking/how-find-out-if-your-email-address-has-been-compromised-177847

Excerpt:
"A handful of researchers at well-known security firm HP/TippingPoint DVLabs spend their spare time looking for publicly posted lists of cracked email addresses. They've also written programs that comb repositories of dumped stolen data, including Pastebin. Their collection has grown to 5 million known compromised accounts, and it's growing daily."

 


 

PricewaterhouseCoopers (PwC) director says cybersecurity is in free fall
http://www.infosecurity-magazine.com/view/21762/pwc-director-says-cybersecurity-is-in-free-fall/

Excerpt:
"PricewaterhouseCoopers (PwC) has called on business and government leaders to take ultimate responsibility for cybersecurity and collaborate together more closely to address the pressing cyber threat."


 

In a world of cybertheft, U.S. names China, Russia as main culprits
Ellen Nakashima
http://www.washingtonpost.com/world/national-security/us-cyber-espionage-report-names-china-and-russia-as-main-culprits/2011/11/02/gIQAF5fRiM_story.html

Excerpt:
"This accelerating theft of information, at a time when the American economy is suffering, has prompted U.S. officials to single out countries that conduct online spying for economic advantage. While hackers come from scores of countries and range from foreign intelligence services to corporations to criminals, the source of U.S. concern mainly has been China and Russia.


 

Productivity, Data Losses Biggest Cost In Cyberattacks
Kelly Jackson Higgins
http://www.darkreading.com/security/perimeter-security/231902313/productivity-data-losses-biggest-cost-in-cyberattacks.html

Excerpt:
"…attacks against Domain Name System (DNS) infrastructure and network-layer denial-of-service (DoS) attacks overall are the most difficult to defend against and are the most frequent and painful to an organization."

 


 

Incident Response: 5 Critical Skills
http://www.bankinfosecurity.com/articles.php?art_id=4214

Excerpt:
"…with increased regulations like breach notification, advanced threats and malware this role has expanded into specific areas like investigations, application development and forensics."


 

Cyber-attacks: Defence against the dark arts
Nigel Brown
http://www.humansinvent.com/#!/3285/cyber-attacks-defence-against-the-dark-arts/

Excerpt:
"The frontline of online warfare affects us all, but what is being done to defend our freedom? And should we all be taking more precautions against this imminent threat? A spokesperson for GCHQ explained to Humans Invent exactly what the term cyber-attack entails."


 

CIA secretly monitors world on Twitter, Facebook
Kimberly Dozier
http://www.msnbc.msn.com/id/45164661/ns/technology_and_science-tech_and_gadgets/#.TriM3GXpODt

Excerpt:
"In an anonymous industrial park in Virginia, in an unassuming brick building, the CIA is following tweets — up to 5 million a day. At the agency's Open Source Center, a team known affectionately as the "vengeful librarians" also pores over Facebook, newspapers, TV news channels, local radio stations, Internet chat rooms — anything overseas that anyone can access and contribute to openly."


 

Hacker selling access to compromised websites gets hacked
Lucian Constantin
http://www.computerworld.com/s/article/9221494/Hacker_selling_access_to_compromised_websites_gets_hacked

Excerpt:
"A hacking group called d33ds broke into the online shop of a rival hacker who sells unauthorized access to high-profile websites and data."


 

Online social networks: Malware launch pads
http://www.net-security.org/malware_news.php?id=1895

Excerpt:
"Social networks serve as seamless communication channels, but at the same time they are ideal launch pads for malware infections. As a result there has been a tremendous increase in the dissemination of malware infections through social networks."


 

The virus problem is worse than you think
Dan Emory
http://www.crn.com.au/News/279193,the-virus-problem-is-worse-than-you-think.aspx

Excerpt:
"Virus and malware issues are a constant threat. Patching and up-to-date anti-virus signatures only get you so far in this day and age. Unfortunately for anyone who owns a business, runs a computer network, surfs the internet, or uses a computer to do anything other than play Solitaire, the protection we are offered from present-day anti-virus tools is almost nonexistent."


 

The rough guide to online safety
http://www.getsafeonline.org/media/GetSafeOnline_RoughGuide.pdf

Excerpt:
"The internet is now a fact of modern life for all of us: a source of fun, of income or simply an easy way of accessing information or buying stuff. In a way it would be surprising (given human nature) if all that
online activity hadn't caught the attention of a few determined criminals. So while there are a few dangers online nowadays there is no need to fret unduly about the scale of the threat."


 

London Conference on CyberSpace: The Biggest Cyber Attacks Of All Time
Ewan Palmer
http://uk.ibtimes.com/articles/241238/20111101/biggest-cyber-attacks-time-hacking-china-google.htm

Excerpt:
"Representatives of 60 nations gather to discuss how to tackle the rising levels of cybercrime amid reports of recent hack attacks on a US satellite, allegedly by the Chinese, and claims today that at least 48 chemical and defence companies were victims of a coordinated cyber attack that has also been traced to China…"


 

First joint EU-US cyber security exercise
http://www.net-security.org/secworld.php?id=11884

Excerpt:
"The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU's Network and Information Security Agency (ENISA) and the US Department of Homeland Security."


 

Would police use malware to catch cyber-criminals?
Alex Hudson
http://news.bbc.co.uk/2/hi/programmes/click_online/9630072.stm

Excerpt:
"The rapid increase in the cost of cyber-crime means police and governments are having to protect themselves from a threat that is often nearly impossible to trace. But the web has also become a vital space to gather evidence on suspects for traditional crimes."

 


 

Security lockdown overshadows government's cyberspace conference
http://www.telegraph.co.uk/technology/news/8867128/Security-lockdown-overshadows-governments-cyberspace-conference.html

Excerpt:
"Hosted by the British government, and specifically the Foreign Secretary William Hague, this gathering of around 700 officials, business leaders and civil society types aimed to thrash out some "rules of the road" for how states behave online and regulate the internet. Hot issues like digital espionage, cybercrime and surveillance were all on the agenda."


 

Hackers Wreak Havoc on Palestinian Internet Services
Richard Adhikari
http://www.technewsworld.com/rsstory/73653.html

Excerpt:
"Hackers reportedly shut down Internet service in Palestine Tuesday. Service was apparently completely shut down in Gaza and partially shut down in the West Bank after hackers unleashed malware on the main ISP in Palestine, Paltel."


 

Anonymous Cancels Operation Cartel as Los Zetas Track Hacktivists
Carl Franzen
http://idealab.talkingpointsmemo.com/2011/11/report-anonymous-cancels-operation-cartel.php

Excerpt:
"Members of the hacktivist collective Anonymous who threatened to post identifying information online about the civilian associates of Los Zetas, one of Mexico's most powerful and violent drug cartels, have backed down just days before the November 5 target date for their operation."

 


 

Double Trouble
Neal O'Farrell
http://www.identityguard.com/downloads/ebook-double-trouble.pdf

Excerpt:
"The latest study from Javelin Research concludes that more than 8 million Americans fell victim to identity theft in 2010. To put that in perspective, that's more than the total number of burglaries, attempted burglaries, auto thefts, arson, purse snatching, and pick pocketing combined."


 

Men jailed following E-Crime investigation
http://content.met.police.uk/News/Men-jailed-following-ECrime-investigation/1400004118200/1257246745756

Excerpt:
"The ring leaders of a major organised criminal network which siphoned nearly £3 million from the bank accounts of unsuspecting members of the public were yesterday (Monday 31 October) jailed following an investigation by the Met's Police Central E-Crime Unit (PCeU)."


 

Web Security Expert Warns Of Cyber World War
Sam Kiley
http://news.sky.com/home/technology/article/16101158

Excerpt:
"A leading internet security expert has warned that a cyber terrorist attack with "catastrophic consequences" looked increasingly likely in a world already in a state of near cyber war."




Duqu: Status Updates Including Installer with Zero-Day Exploit Found
Vikram Thakur
http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit

Excerpt:
"The group that initially discovered the original Duqu binaries, CrySyS, has since located an installer for the Duqu threat. Thus far, no-one had been able to recover the installer for the threat and therefore no-one had any idea how Duqu was initially infecting systems. Fortunately, an installer has recently been recovered due to the great work done by the team at CrySyS."

 


 

RM861,000 lost in cyber scam
Rashitha A. Hamid
http://thestar.com.my/news/story.asp?file=/2011/11/3/nation/9826439&sec=nation

Excerpt:
"Police arrested four Nigerians and a Malaysian woman who allegedly conned a retired Australian policeman of US$275,000 (RM861,437) in a cyber scam."


 

China a minimal cyber security threat: Paper
Tim Lohman
http://www.computerworld.com.au/article/405767/china_minimal_cyber_security_threat_paper

Excerpt:
"…China had carried out a number of high-profile and successful hacks, denial of service attacks and website defacements in recent years. However, its offensive cyber-warfare capabilities were "fairly rudimentary."


 

Australian Security Intelligence Organisation (ASIO) Report to Parliament 2010-11
http://www.asio.gov.au/Publications/Report-to-Parliament/2010-to-2011.html

Excerpt:
"The report details ASIO's work throughout 2010-11, including new initiatives and ongoing activities. It also provides an overview of the security threat environment – both domestically and internationally."


 

Report: French Nuclear Company Areva Hit by Virus
Christopher Brook
http://threatpost.com/en_us/blogs/report-french-nuclear-company-areva-hit-virus-103111

Excerpt:
"Word of the incident first came to light on September 16, when employees of the firm were notified that there would be three days of maintenance performed on the company's system to "strengthen security measures." These security measures, implemented in conjunction with the National Security Agency Information Systems (ANSSI), appear to be in direct response to the break-in."


 

RIM backdoor access for Indian probers
Anna Leach
http://www.theregister.co.uk/2011/10/28/blackberry_help_indian_government_sip_data/

Excerpt:
"The Canadian firm opened the small facility earlier this year to deal with requests from Indian intelligence agencies, the paper reports. RIM will hand over messages and emails from suspect individuals to the Indian government – providing it is satisfied that the demands are legally justified."


 

Met police using surveillance system to monitor mobile phones
Ryan Gallagher and Rajeev Syal
http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance

Excerpt:
"Britain's largest police force is operating covert surveillance technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."


 

Information Security around the World
David Lacey
http://www.computerweekly.com/blogs/david_lacey/2011/10/information_security_around_th.html

Excerpt:
"Security technology has always been popular in the US and the Far East, much less so in Europe. Continental Europe prefers to focus on people and processes. The UK is the home of bureaucracy and exports it aggressively. ISO 27000 is popular in Commonwealth countries but is frequently despised outside."


 

U.K. Touts Its Cybersecurity Cred
Alistair Macdonald and Daniel Michaels
http://online.wsj.com/article/SB10001424052970204505304577003944003807240.html

Excerpt:
"Last year, British defense consultants NDI UK Ltd. received a call from a government agency with ominous news: NDI's computers had been targeted by hackers in China. Cybersleuths from the government's Center for the Protection of National Infrastructure quickly descended on the company to inspect and clean its systems."


 

Foreign Office blocked "significant" cyber attack, says GCHQ chief
Anh Nguyen
http://www.computerworlduk.com/news/security/3314473/foreign-office-blocked-significant-cyber-attack-says-gchq-chief

Excerpt:
""The UK's Foreign and Commonwealth Office (FCO) suffered a "significant" attack on its computer systems this summer, the head of the intelligence agency GCHQ has revealed. Iain Lobban, director of Government Communications Headquarters (GCHQ), said that the amount of e-crime and attacks on government and industry systems continued to be "disturbing"."


 

Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force
Susan W. Brenner
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1950703

Excerpt:
"This article examines the Fourth Amendment implications of two tactics that may become part of law enforcement's efforts to investigate and otherwise control criminal activity. The first is the use of certain types of software, most notably Trojan horse programs, to conduct surreptitious, remote searches of computers and computer media."


 

UK security strategy draws on growing expertise across Whitehall
Warwick Ashford
http://www.computerweekly.com/Articles/2011/10/28/248304/UK-security-strategy-draws-on-growing-expertise-across.htm

Excerpt:
"The key elements of the strategy are: making the public safe online and ensuring the UK is a good place to do business online; making the UK more resilient to cyber attack and better able to protect its interests; ensuring the UK can help shape an open, secure and vibrant cyber space; and building UK knowledge, skills and capability to underpin these objectives."


 

Spy Smartphone Software Tracks Every Move
Sam Kiley
http://news.sky.com/home/technology/article/16099260

Excerpt:
"Software designed to completely mine every secret on a smartphone can track its users, record their calls, copy their emails, read their text messages and bug the rooms the phones are sitting in."


 

War on web sleaze: Church of England threatening to withdraw millions invested in ISPs over rise of internet porn
Chris Greenwood
http://www.dailymail.co.uk/news/article-2055452/Internet-porn-Church-England-threatening-withdraw-millions-invested-ISPs.html

Excerpt:
"The Church of England is threatening to use its financial power to stem the tide of internet pornography. It is considering withdrawing the millions it has invested in Internet Service Providers (ISPs) unless they take action."


 

MoD calls on academics, industry and inventors to pitch cyber security ideas
Warwick Ashford
http://www.computerweekly.com/Articles/2011/11/01/248324/MoD-calls-on-academics-industry-and-inventors-to-pitch-cyber-security.htm

Excerpt:
"The Ministry of Defence is calling for innovative solutions from academia and industry to protect and secure UK interests in cyberspace. From 1 November to 8 December, the MoD's Defence Science and Technology Laboratory (DSTL) is inviting research proposals regarding cyber spectrum, cyber challenges and cyber influence."


 

What Is Critical to Your Infrastructure?
Adrian Davis
http://www.infosecurity-magazine.com/view/21529/what-is-critical-to-your-infrastructure-/

Excerpt:
"It's worth remembering that not everything within a national infrastructure sector is critical. In the various sectors of the economy there are certain critical elements of infrastructure, the loss or compromise of which would have a major, detrimental impact on the availability or integrity of essential services, leading to severe economic or social consequences, or loss of life."


 

Foreign hackers targeted potash industry in hit on Finance, Treasury Board networks
Ian MacLeod
http://www.ottawacitizen.com/business/Foreign+hackers+targeted+potash+industry+Finance+Treasury+Board+networks/5625133/story.html

Excerpt:
"Saskatchewan's potash industry was the target of January's unprecedented cyber theft of classified federal data, the Citizen has learned. The foreign hackers masqueraded online as an aboriginal group to gain access to the Finance and Treasury Board networks…"


 

Anonymous online activists threaten Mexican drug cartel
Elinor Mills
http://news.cnet.com/8301-1009_3-20127534-83/anonymous-online-activists-threaten-mexican-drug-cartel/

Excerpt:
"The online collective Anonymous is making threats to a Mexican drug cartel over the alleged kidnapping of one of its activists in Veracruz."


 

GCHQ chief reports 'disturbing' cyber-attacks on UK
http://www.bbc.co.uk/news/uk-15516959

Excerpt:
"Cyber attacks on the UK are at "disturbing" levels, according to the director of Britain's biggest intelligence agency. Government computers, along with defence, technology and engineering firms' designs have been targeted…"


 

Ottawa warned about hackers weeks before crippling cyber attack: CSIS report
Jim Bronskill
http://www.theglobeandmail.com/news/national/ottawa-warned-about-rogue-hackers-just-weeks-before-crippling-cyber-attack-report/article2219129/

Excerpt:
"A newly released intelligence assessment, prepared last November, sounded a security alarm about malicious, targeted emails disguised as legitimate messages — the very kind that shut down networks two months later."


 

Number of fake antivirus attacks has decreased considerably, researchers say
Lucian Constantin
http://www.networkworld.com/news/2011/102811-number-of-fake-antivirus-attacks-252521.html

Excerpt:
"The frequency of attacks that distribute fake antivirus software, a long-time pillar of the underground economy, has decreased considerably in recent months. However, security researchers warn that the industry is not yet dead and new versions of attacks continue to be released."


 

Anonymity and traceability in cyberspace
Richard Clayton
http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-653.pdf

Excerpt:
"The process of mapping from an event occurring in the cyberspace world of the Internet to the everyday world we're familiar with is known as tracing and the property of interest, the ability to do that tracing, has become known as traceability. In contrast, the ability to use the Internet without others being able to determine that you are responsible is now referred to as anonymity."


 

Upgrading cyber defenses
http://www.yle.fi/uutiset/news/2011/10/upgrading_cyber_defenses_2987415.html

Excerpt:
"Like most other developed countries, Finland wants a credible network defense capability. The defense forces have already started hiring professionals. While the army, navy and air force can raise their levels of preparedness when a crisis threatens, cyber defense has to be constantly at a state of high alert. Attacks come even in peacetime."


 

China denies it is behind hacking of U.S. satellites
http://www.reuters.com/article/2011/10/31/us-china-us-hacking-idUSTRE79U1YI20111031

Excerpt:
"Beijing on Monday denied a U.S. commission's claim that China may have been responsible for hacking incidents on U.S. environment-monitoring satellites, saying that the committee had "ulterior motives" in writing such a draft report."


 

China's Cyber Warfare Capabilities
Desmond Ball
http://www.securitychallenges.org.au/ArticlePDFs/vol7no2Ball.pdf

Excerpt:
"China has the most extensive and most practiced cyber-warfare capabilities in Asia, although the technical expertise is very uneven. China began to implement an Information Warfare (IW) plan in 1995, and since 1997 has conducted numerous exercises in which computer viruses have been used to interrupt military communications and public broadcasting systems."