Hidden Dragon: The Chinese cyber menace
http://www.theregister.co.uk/2011/12/24/china_cybercrime_underground_analysis/

Excerpt:
"Profit-motivated crooks are trading compromised access to foreign governments' computers, which they are unable to monitise, for exploits with state-sponsored hackers. This trade is facilitated by information broker middlemen"


 

'Anonymous' hackers target US security think tank
http://ibnlive.in.com/news/anonymous-hackers-target-us-security-think-tank/215134-11.html

Excerpt:
"Anonymous boasted of stealing Stratfor's confidential client list, which includes entities ranging from Apple Inc. to the US Air Force to the Miami Police Department, and mining it for more than 4,000 credit card numbers, passwords and home addresses."


 

Rising Cybercrime Pushes African Govts into Action 
http://www.cio.in/news/rising-cybercrime-pushes-african-governments-take-action-206802011


Excerpt:
"In reaction to rising cybercrime incidents in both public and private sectors, some African governments have set up incident reporting and early warning bodies with the support of AfriNIC (Africa Network Information Center)."


 

Guidance on the rules on use of cookies and similar technologies
http://www.ico.gov.uk/news/latest_news/2011/~/media/documents/library/Privacy_and_electronic/Practical_application/guidance_on_the_new_cookies_regulations.ashx

Excerpt:
"The Privacy and Electronic Communications (EC Directive) Regulations 2003 (the Regulations) cover the use of cookies and similar technologies for storing information, and accessing information stored, on a user's equipment such as their computer or mobile."


 

Iran moves websites to guard against cyber attacks
http://news.yahoo.com/iran-moves-websites-guard-against-cyber-attacks-203048986.html

Excerpt:
"Iran has moved most of its government websites from foreign-based hosting companies to new computer facilities inside the country, to protect them against cyber attacks…"


 

International collaboration key for infosecurity in 2012
Vladimir Jirasek
http://www.computerweekly.com/opinion/Opinion-International-and-supplier-collaboration-key-for-infosec-in-2012

Excerpt:
"Outgoing year 2011 has been turbulent and eventful for information security, with a number of high-profile security incidents and an increase in cyber fraud (or e-crime), and there is no indication that 2012 is going to be any different…"


 

DDoS Basics
http://www.team-cymru.com/ReadingRoom/Whitepapers/2010/ddos-basics.pdf

Excerpt:
"This paper will explain, in extremely basic terms, the various types of DDoS attacks. We will explain the motivations of the miscreants behind these attacks and outline the differing functionality of each attack type, providing examples and suggesting measures that could be employed to mitigate future incidents."


 

Using Pastebin for Malicious Sample Collection
Jason Jones
http://dvlabs.tippingpoint.com/blog/2011/12/14/pastebin-malicious-samples-collection

Excerpt:
"Pastebin is a great service that allows for easy sharing and collaboriation of data. Recently it has been used by various groups for posting personal information, breach data, or statements. I've also found it to be a great source for collecting malicious samples and discovering new attack techniques."


 

 

Kazakhstan Disables the Internet
http://activepolitic.com:82/News/2011-12-17c/Kazakhstan_Disables_the_Internet.html

Excerpt:
"Kazakhstan's president on Saturday imposed a three-week state of emergency in an oil town where 10 people were killed in a clash between police and demonstrators. The city of Zhanaozen has had their internet and local cellphone towers disabled. They claim that they have gained control of the people by imposing a curfew."


 

Iran embarks on $1b. cyber-warfare program
Yaakov Katz
http://www.jpost.com/Defense/Article.aspx?id=249864

Excerpt:
"Tehran has embarked on an ambitious plan to boost its offensive and defensive cyber-warfare capabilities and is investing $1 billion in developing new technology and hiring new computer experts."


 

Should We Fire the First Shot in a Cyberwar?
David Talbot
http://www.technologyreview.com/web/39315/

Excerpt:
"Cyberattacks could damage or disable military networks or civilian infrastructure like power grids, or they could involve the theft of military and corporate secrets. Experts warn that such attacks could occur at light speed and be difficult to trace, especially if data is routed through computers in many different countries."


 

Industrial espionage gang sends malicious emails in security vendor's name
Lucian Constantin
http://www.networkworld.com/news/2011/121311-industrial-espionage-gang-sends-malicious-254042.html

Excerpt:
"A cybercrime gang that primarily targets companies from the chemical industry has launched a new series of attacks that involve malware-laden emails purporting to be from Symantec, the security vendor responsible for exposing its operation earlier this year."


 

Your 2012 Security Action Plan
Kenneth van Wyk
http://www.cio.com/article/696398/Kenneth_Van_Wyk_Your_2012_Security_Action_Plan

Excerpt:
"Rather than a comprehensive list of everything an IT security organization should plan on doing in the new year, these are some of the things that many probably haven't even considered."


 

Cyber-intruder sparks massive federal response — and debate over dealing with threats
Ellen Nakashima
http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html

Excerpt:
"The first sign of trouble was a mysterious signal emanating from deep within the U.S. military's classified computer network. Like a human spy, a piece of covert software in the supposedly secure system was "beaconing" — trying to send coded messages back to its creator."


 

Cyber attacks on government websites: India goes on offensive against cyber rogues
Joji Thomas Philip & Harsimran Julka
http://articles.economictimes.indiatimes.com/2011-12-03/news/30471838_1_cyber-attacks-hackers-symantec-india

Excerpt:
"A barrage of cyber attacks on government websites is compelling the government to develop a counter strategy to deal with countries that are behind these assaults. Government officials suspect Pakistani and Chinese hackers for being responsible for most of these attacks, and have asked security agencies to jointly map out the cyber infrastructure of neighbouring countries as part of a 'cyber preparedness' strategy."


 

Was Russia Behind Stuxnet?
Panayotis A. Yannakogeorgos
http://the-diplomat.com/2011/12/10/was-russia-behind-stuxnet/

Excerpt:
"The Stuxnet computer worm is widely considered to be a U.S.-Israeli cyber weapon crafted to wreak havoc in Iran's nuclear enrichment plants. But with the identity of the perpetrators still unclear, it might be time to start seeking some alternative explanations."


 

Shell warns hacks on oil and gas could kill
Stewart Mitchell
http://www.itnews.com.au/News/284263,shell-warns-hacks-on-oil-and-gas-could-kill.aspx

Excerpt:
"An oil industry expert has warned colleagues they risk life-threatening damage from hackers interested in disrupting their systems."


 

Cyber Risk Report
http://www.cisco.com/web/about/security/intelligence/CRR_dec5-11.html

Excerpt:

"The Cyber Risk Report is a strategic intelligence product that highlights current security activity and mid- to long-range perspectives. The report addresses seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical."



Freakonomics vs Cybersecurity
Robert David Graham
http://erratasec.blogspot.com/2011/12/freakonomics-vs-cybersecurity.html

Excerpt:
"The first misconception of economics cybersecurity people have is calculating where the money goes, or how much things cost. That's "business", not "economics". If you are thinking in terms of "Return on Investment" (ROI), then it's not "Economics"."


 

The Art Of Profiling Cybercriminals
Kelly Jackson Higgins
http://www.darkreading.com/insider-threat/167801100/security/vulnerabilities/232300211/the-art-of-profiling-cybercriminals.html

Excerpt:
"With cybercrime becoming the weapon of choice for more criminals, psychologists such as Shaw and Stock, as well as sociologists and criminologists, are increasingly being tapped to help construct profiles of hackers and malicious insiders so organizations can better defend against outside threats and to better spot trouble internally."


 

Basic Internet Security
http://en.flossmanuals.net/_booki/basic-internet-security/basic-internet-security.pdf

Excerpt:
"Publications about the digital world become outdated fast and a viable solution today could be serious threat tomorrow. Therefore we created this book as open source, so it can be easily updated and will be free for others to update, extend and redistribute. The focus in this book is also on free and open source tools."


 

Cybercrime drains one trillion dollars from global economy every year
http://www.actmedia.eu/2011/12/07/top+story/nato%26%2339%3Bs+jamie+shea%3A+cybercrime+drains+one+trillion+dollars+from+global+economy+every+year+/37124

Excerpt:
"Cybercrime drains one trillion US dollars from global economy annually, NATO Deputy Assistant Secretary General for Emerging Security Challenges Jamie Shea declared…"


 

Fraud trends
http://www.professionalsecurity.co.uk/newsdetails.aspx?NewsArticleID=18591&imgID=1

Excerpt:
"As previously reported by CIFAS, more than half of all frauds relate to the theft or misuse of personal or account information. But there are also increases in the fraudulent use of legitimately obtained accounts; and also in successful application frauds (where fraudsters use false information, documents etc) to obtain products and services."


 

Proactive detection of cyber security incidents
http://www.net-security.org/secworld.php?id=12063

Excerpt:
"The 16 shortcomings in detection of incidents are examined in depth. Top technical gaps include insufficient data quality (false positives in provided data, poor timeliness of delivery), lack of standard formats, tools, resources and skills."


 

Best Ways To Detect Advanced Threats Once They Invade
Robert Lemos
http://www.darkreading.com/advanced-threats/167901091/security/security-management/232200761/best-ways-to-detect-advanced-threats-once-they-invade.html

Excerpt:
"Significant attacks against major technology companies have underscored that, while good defenses can make it hard for an attacker to penetrate a network, a persistent attacker will find a way in."


 

Botnets: Hi-tech crime in the UK
Mark Ward
http://www.bbc.co.uk/news/technology-15792257

Excerpt:
"A large-scale global study suggests 5-10% of all domestic computers are regularly linked to criminal networks called botnets. The figures suggest that about 6% of the UK's 19 million net-using households are enrolled in botnets. Hijacked PCs could be sending spam, attacking websites or surrendering bank details to criminals."


 

U.S. power grid needs cybersecurity protection
http://www.reuters.com/article/2011/12/05/us-energy-usa-grid-idUSTRE7B408920111205

Excerpt:
"The threat of cyberattacks on the U.S. power grid should be dealt with by a single federal agency, not the welter of groups now charged with the electric system's security, researchers at the Massachusetts Institute of Technology reported on Monday."


 

Microsoft: Hackers launch millions of Java exploits
Gregg Keizer
http://www.infoworld.com/d/security/microsoft-hackers-launch-millions-java-exploits-180311

Excerpt:
"Hackers continue to launch attacks exploiting vulnerabilities in Oracle's Java software in record numbers…"

 


 

Hackers accessed city infrastructure via SCADA – FBI
Hal Hodson
http://www.information-age.com/channels/security-and-continuity/news/1676243/hackers-accessed-city-infrastructure-via-scada-fbi.thtml

Excerpt:
"Hackers recently accessed the critical infrastructure of three unnamed cities by compromising their SCADA (supervisory control and data acquisition) systems, the deputy assistant director of the FBI's Cyber Division said today."


 

Digital crime accounts for one in four business frauds
Nick Heath
http://www.silicon.com/technology/security/2011/11/29/digital-crime-accounts-for-one-in-four-business-frauds-39748282/?s_cid=938

Excerpt:
"E-crime was the third most common type of economic crime reported by businesses and public sector bodies in response to the PricewaterhouseCoopers Global Economic Crime Survey. The survey defined e-crime as a crime where a computer and the internet play a central role."


 

United Nations server is still hacked
Dave Neal
http://www.theinquirer.net/inquirer/news/2129560/untited-nations-server-hacked

Excerpt:
"HACKER GROUP Team Poison has reacted to claims from the United Nations that its apparent hacking on UN servers was slight, and already has been dealt with. "United Nations Lies Revealed," is the title of a short release from the hackers that appeared on pastebin with the trademark Team Poison headers and quotes a report about the leak at the BBC."


 

Insight: Did Conficker help sabotage Iran program
Jim Finkle
http://www.reuters.com/article/2011/12/02/us-cybersecurity-iran-idUSTRE7B10AP20111202

Excerpt:
"A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious "worm" that surfaced in late 2008 and infected millions of PCs. Conficker was used to open back doors into computers in Iran, then infect them with Stuxnet..."


 

Anonymous Takes From The Rich, Gives To... The Cyber Security Industry?
http://www.forbes.com/sites/parmyolson/2011/12/02/anonymous-takes-from-the-rich-gives-to-cyber-security-market/

Excerpt:
"A hacker splinter group called TeaMp0isoN says it has partnered with supporters of the extremely loose-knit network of hacktivists and pranksters, to steal credit cards from several banks including Chase, Bank of America and CitiBank and give the money to charities and "the 99%." The project, announced yesterday, is called Operation Robin Hood and in response to the Occupy Movement."


 

Keeping Pace With Cybercrime
George I. Seffers
http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=2808&zoneid=254

Excerpt:
"Evolving technologies such as mobile devices, cloud computing and steganography present challenges for those tasked with finding digital evidence of a crime. But the cyber forensics field also is evolving, and experts in industry and government are finding innovative tools for overcoming the obstacles."