“India is set to take steps to protect its cyber infrastructure and designate agencies for carrying out offensive cyber attacks on other countries. The move comes at a time when proof shows countries launching cyber attacks not only for intelligence gathering and many nations describing the attacks as an act of war. According to sources, the National Security Council (NSC) headed by Prime Minister Manmohan Singh would soon approve the comprehensive plan and designate the Defence Intelligence Agency (DIA) and National Technical Research Organization (NTRO) as agencies for carrying out offensive cyber operations, if necessary….”
Daily Archive: June 10, 2012
“Reports that the U.S. and Israel have tried repeatedly over the years to derail Irans nuclear weapons program by using malicious computer codes to cause machines at the countrys Natanz nuclear facility to malfunction have lifted the veil of secrecy over the war unfolding on the worlds newest battlefield. The elaborately designed and executed series of cyber-attacks reportedly slowed Irans progress toward getting a bomb, but they also raise troubling questions about the United States own vulnerability to such weapons and whether the nations defenses are adequate
“The recent LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate any DLP consequences and tighten their network security. As the worlds largest professional social network, LinkedIn is unique because it has legitimate uses for almost every employee.
“Former top military and intelligence officials from both Democratic and Republican administrations are calling on Senate leaders to bring up cybersecurity legislation that includes protections for critical infrastructure. The military and intelligence officials urged Senate Majority Leader Harry Reid, D-Nev., and Minority Leader Mitch McConnell, R-Ky., in a letter Wednesday to bring cybersecurity legislation to the Senate floor this year, saying the measure is “critically necessary to protect our national and economic security.”…”
“44Con 2012 is coming up! Yes guys, the premier Information Security Conference in UK is back again for action wherein the conference and training event will be taking place over five days:- Training 3rd & 4th September- Conference 5th, 6th & 7th September 2012On 5th September will be 44Con Fast Track day This is a special one day sub-event for busy people that cant get the full three days away from work as well as final year students looking to become the information security experts of tomorrow. 6th & 7th conference will have two tracks, one aimed at Information Security Professionals, Managers and decision-makers with the other for technical Information Security specialists….”
“Defense Secretary moves to plug cyber security holesUnited States Secretary of Defense Leon Panetta has approved a plan that will set in motion the first steps towards standardizing cyber operations for the military. The organizational framework approved by Panetta outlines a new command structure placing the authority for offensive and defensive operations under geographic combatant commanders. The framework also outlines the creation of a new Joint Cyber Centers known as JCC to serve as a link between U.S.
“You can also subscribe to the SANS newsletters…”
“One of the big draws of BitTorrent is that there are few barriers to entry, not least because its free to use. There are other downloading options of course, Usenet being one, but it can be a complex and relatively expensive option.
“British homes equipped with new smart energy meters can be targeted by malicious hackers, who would be able to remotely cut off power, security experts warn. The new meters collect data about how people use gas and electricity and send it every 30 minutes to a utility firm for storage and analysis. Some 400,000 households are already equipped with such devices….”