Tag: government

FEMA Sponsored Cyber Attack Simulation on Critical U.S. Infrastructure

FEMA Sponsored Cyber Attack Simulation on Critical U.S. Infrastructure

| June 6, 2012 | 4 Replies

Chris Dougherty Virtual Threat Contributing Writer   President Barack Obama and several senior U.S. officials participated in a FEMA sponsored cyber attack simulation on Tuesday.   The simulation focused on how the U.S.  government would react to cyber warfare  targeting the country’s critical infrastructure.  The exercise was designed in part to help pinpoint weaknesses in official policies and procedures following […]

Read More

FBI Investigating Classified Stuxnet Cyberattack Leak

FBI Investigating Classified Stuxnet Cyberattack Leak

| June 6, 2012 | 2 Replies

Ms. Smith NetworkWorld   The FBI is investigating who spilled national security secrets, this time about Stuxnet and the classified cyberattack program the U.S. launched against Iran nuclear facilities. Senator Feinstein has called for Capitol Hill hearings into the leak since ‘disclosures of this type endanger American lives and undermine America’s national security.’ It’s not […]

Read More

Google Adds Cyberattack Warning For Victims of State-Sponsored Attacks

Google Adds Cyberattack Warning For Victims of State-Sponsored Attacks

| June 6, 2012 | 3 Replies

  News.com.au   GOOGLE has added a feature to warn users whose accounts it believes are targets of “state-sponsored attacks”. Google, however, closed its search engine in China in 2010 after saying it no longer wanted to cooperate with Beijing’s internet censorship following hacking attacks traced to China. A message that says “Warning: We believe […]

Read More

Anonymous Defector Jennifer Emick Reports Threats and Abuse From Hactivist Group

Anonymous Defector Jennifer Emick Reports Threats and Abuse From Hactivist Group

| June 6, 2012 | 1 Reply

  Herald Sun   WHEN you set out to destroy Anonymous, you would expect retaliation from the activist group. But a war between the group and a former member, who now profits from ratting them out, has descended to violent and vulgar threats against uninvolved children, reports Gizmodo. Jennifer Emick, 40, was an early member of […]

Read More

NSA Utah Data Center Largest Spy Compound Ever – Part 2

NSA Utah Data Center Largest Spy Compound Ever – Part 2

| June 2, 2012 | 8 Replies

James Bamford Wired.com (Threat Level)   Continued from: NSA Utah Data Center Largest Spy Compound Ever – Part 1 For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping […]

Read More

Cyber Attack ‘Flame’ on Middle East was State Sponsored

Cyber Attack ‘Flame’ on Middle East was State Sponsored

| June 1, 2012 | 4 Replies

Eric Blair Activist Post   New malware said to “dwarf Stuxnet in size and sophistication” has reportedly hijacked computer systems in Middle Eastern countries including Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt. Researchers believe the malware known as “Flame” has been stealing and deleting massive amounts of information since 2010.  They said it […]

Read More

NSA Utah Data Center Largest Spy Compound Ever – Part 1

NSA Utah Data Center Largest Spy Compound Ever – Part 1

| June 1, 2012 | 14 Replies

James Bamford Wired.com (Threat Level)     The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, […]

Read More

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

| May 25, 2012 | 3 Replies

Chris Dougherty Virtual Threat Contributing Writer   In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not realize is the fact that there is a cyber war occurring beneath the covers […]

Read More

Cyber Spies Are Exploiting Your Mac and Windows Computers

Cyber Spies Are Exploiting Your Mac and Windows Computers

| May 18, 2012 | 3 Replies

Antone Gonsalves CSO   Cyber spies have planted Java- and Flash-exploiting malware on Web sites focused on human rights, defense and foreign policy. Over the last two weeks, the Shadowserver Foundation, a nonprofit group that tracks Internet threats, has discovered several such compromised Web sites that download the malware through visitors’ browsers. The malware, which […]

Read More

10 Hacking Incidents That Made History

10 Hacking Incidents That Made History

| May 18, 2012 | 1 Reply

Joan Goodchild PC Advisor – UK   Hacking has been around for decades. Today’s crimes are often financially-motivated fraud. Here are ten hacking incidents that made history In our first Rogues Gallery, we looked at ten infamous social engineers — con men who exploited human weaknesses rather than technical vulnerabilities. But there have been computer and network hacks […]

Read More