Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

Memory Cards of 3,000 Vodafone Mobiles Infected With Malware

Close to 3,000 memory cards in HTC Magic phones may be infected with malware after initial assumption by the company, Vodafone, that it was an isolated incident when first discovered by a customer. "It is unclear how the batch of memory cards became infected and an investigation is under way, said a spokesman for Vodafone in Spain. There are no problems with either the HTC Magic phone or its Android OS. The malware only affected phones sold in Spain." more

China a Decade Into Sweeping Cyber Warfare and Espionage Capabilities

According to a report released today by the U.S.-China Economic and Security Review Commission, China is well into a "military modernization program that has fundamentally transformed its ability to fight high tech wars." The report further indicates that if Chinese operators are in anyway responsible for even some of the current exploitation efforts targeting US Government and commercial networks, "then they may have already demonstrated that they possess a mature and operationally proficient CNO [computer network operations] capability." more

U.S. Comprehensive National Cybersecurity Initiative Single Largest Fund for 2009

Walter Pincus of The Washington Post is reporting that President Bush's single largest request for funds and "most important initiative" in the fiscal 2009 intelligence budget is for the Comprehensive National Cybersecurity Initiative, a little publicized but massive program whose details "remain vague and thus open to question," according to the House Permanent Select Committee on Intelligence. CNCI or "Cyber Initiative" is a highly classified, multiyear, multibillion-dollar project designed to develop a plan to secure government computer systems against foreign and domestic intruders and prepare for future threats. "It is no longer sufficient for the U.S. Government to discover cyber intrusions in its networks, clean up the damage, and take legal or political steps to deter further intrusions," says Director of National Intelligence Mike McConnell. more

Report Shows Substantial Rise in Phishing Attacks in 2008

According to a recent security report, the number of phishing attacks on financial services customers has increased dramatically this year, with fraudsters focusing on three banks whose customers they have judged to be particularly vulnerable. Just as phishing seemed to have slipped off the consumer radar, online fraudsters have leapt on the chance to capitalize on this false sense of security and have increased their phishing activity... more

Schneier: "Someone Is Learning How to Take down the Internet"

"Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet," wrote renowned security expert, Bruce Schneier, in a piece published in Lawfare. more

Cybersecurity Lacking Coordinated Strategy for Sharing Intelligence

During yesterday's cyber security hearing held by the U.S. House Permanent Select Committee on Intelligence, experts expressed concern over lack of coordinated strategy or mechanism for sharing intelligence about intrusions with companies as well as the need for a systematic way for companies to share information with the government. "U.S. intelligence agencies are unable to share information about foreign cyber attacks against companies for fear of jeopardizing intelligence-gathering sources and methods," reports Ellen Nakashima of the Washington Post. Telecom companies may monitor and collect data to protect their own networks, but they cannot share that information freely with the federal government absent a court order, said James A. Lewis, the Canadian Security Intelligence Service (CSIS) commission program manager. more

Energy Industry Number One Target by Cyber Criminals, According to New Study

Web security company, ScanSafe reports that, in the past quarter, companies in the Energy industry faced the greatest risk of Web-based malware exposure, at a 196% heightened risk compared to other verticals. The Pharmaceutical and Chemicals industry faced the second highest risk of exposure at 192% followed by the Construction & Engineering industry at 150%. The Media and Publishing industry were also among those at highest risk, with a 129% heightened risk compared to other verticals. more

U.S. Government Plans to Boost Cybersecurity ID Ecosystem

Declan McCullagh reporting in CNET: "President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today. It's 'the absolute perfect spot in the U.S. government' to centralize efforts toward creating an 'identity ecosystem' for the Internet, White House Cybersecurity Coordinator Howard Schmidt said." more

Coalition Recommends Tools to Combat Phishing

ISPs and e-commerce sites can employ more tools to combat phishing scams, including "white lists" of legitimate Websites and using false identification information to scam the scammers, according to a report released Thursday.

The report, released by a coalition of consumer groups, technology vendors, financial services organizations and law enforcement agencies, also calls on Internet companies to step up their consumer education efforts. more

UK to Get Its Own Cyber Czar

Following the recent creation of a similar post by US President, UK government has also announced the formation of a cyber security chief. Reported by the Independent: "Britain is to appoint its first national cyber security chief to protect the country from terrorist computer hackers and electronic espionage, Gordon Brown will announce tomorrow. The Prime Minister's move comes amid fears that the computer systems of government and business are vulnerable to online attack from hostile countries and terrorist organisations..." more

Implications of California Telecom Attack Gone Un-Reported

In an article titled "A Cyber-Attack on an American City", Bruce Perens writes: "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities..." more

What Trump and Clinton Said About Cybersecurity in the First US Presidential Debate

The Internet and tech got very little mention last night during the first of three presidential debatest. The only notable exception was cybersecurity where moderator Lester Holt asked: "Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?" The following are the responses provided to the question by the two candidates. more

Global Recession Appears to Have Also Hit the Malware Industry

According to reports by German software security company G Data, since the beginning of summer, the malware community appears to have been scaling back its activities. This considerable reduction is, according to the estimates of G Data security expert Ralf Benzmüller, not solely due to the forthcoming holiday season. The global recession appears to have also hit the eCrime economy. "This phenomenon emerges every year as something new. At the start of the holiday season, the number of malware programs falls. One reason for this is the worldwide onset of the travel season, which, based on experience, causes a drop in the number of active Internet users. However, this does not explain a collapse of more than 30 percent," says Ralf Benzmüller. more

Information Warfare Publicly Admitted, No Longer Just a Tool for Espionage

Gadi Evron reporting today on Dark Reading: "A National Journal Magazine article called "The Cyberwar Plan" has been making waves the last few days in our circles -- it's about how cell phone and computer attacks were used against Iraqi insurgents by the National Security Agency (NSA). Its significance is far more than just what's on the surface, however. The article describes several issues and that in my opinion confuses what matters..." more

A Responsible Domain Industry Needs a Responsible Registrant Appeals Process

As the steward of .ORG, Public Interest Registry is committed to serving as an "exemplary registry" for the DNS. As part of that mission, PIR published our Anti-Abuse Principles last year that serve as our north star to address questions of abuse. As PIR has stated on many occasions, generally speaking, the DNS is not the appropriate place to address questions of website content abuse because of the blunt tool we as a registry have and the collateral damage that can be caused by suspending a domain name for a piece of content. more

Industry Updates