-
IAEA: Iran forced to stop enrichment on 16 November
The UN International Atomic Energy Agency (IAEA) reported Tuesday that Iran’s uranium enrichment program had shut down a week ago; the stoppage of the enrichment program coincides with the release of detailed expert studies of the Stuxnet virus; the conclusion of the cyber experts is that Stuxnet was aimed not at Iran’s Bushehr nuclear reactor, as initially thought, but rather at destroying Iran’s centrifuge farms; the sustained cyber attacks has already reduced the number of operating centrifuges from 4,920 in May 2009 to 3,772 in September 2010; it appears that the covert campaign Israel and the United States has been conducting against Iran’s nuclear weapons program — a campaign which includes the assassination of Iranian scientists and engineers, blowing up of machinery and supplies, attacks on Revolutionary Guard facilities, and seizing of technology shipments to Iran — is beginning to take its toll
-
-
DHS to set cybersecurity standards for some private networks
A new law — “The Homeland Security Cyber and Physical Infrastructure Protection Act of 2010” — will empower DHS to set cybersecurity standards for some private networks that are considered critical infrastructure
-
-
Chinese cyber spies target British defense official
A high official in the British Ministry of Defense was targeted by a sophisticated Chinese spear phishing operation that aimed to steal military secrets; the plan was foiled last year when the official became suspicious of an e-mail she received from a contact she had met at a conference
-
-
DHS official: Stuxnet a "game changer"
The head of the Cybersecurity Center at DHS said Stuxnet is an incredibly large, complex threat with capabilities never seen before; “This code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product, and indicate to the operator and your anti-virus software that everything is functioning as expected,” he said
-
-
New anti-cybercrime software emulates DNA matching process
The biologically inspired software digitally mimics the DNA matching process used in the real world. The software tracks the sequence of events that follow a hacker’s first access request into a secure network system and creates a “digital fingerprint”
-
-
China "hijacked" sensitive U.S. Internet traffic to Chinese servers
Highly sensitive Internet traffic on U.S. government and military Web sites was briefly “hijacked” and routed through Chinese servers earlier this year; for eighteen minutes on 8 April, a Chinese state-owned telecommunications firm rerouted e-mail traffic to and from Web sites of the U.S. Senate, the Department of Defense, along with “many others” including NASA and Department of Commerce
-
-
U.S. gov't wants Google, Facebook to expand wiretaps of subscribers
The U.S. government wants Silicon Valley companies such as Google and Facebook make it easier for law enforcement to wiretap the companies’ users; legislation under consideration would require cellphone carriers, Web sites, and other types of service providers to have a way to unscramble encrypted communications traveling over their networks
-
-
New Facebook app monitors users' social circle for danger
How long will it be before it is impractical to use Facebook without a dedicated app to protect you from spammers and scammers? New app scans your wall, inbox, and any comments on your profile for malicious links that might lead to sites that try to install malware or hijack your account details. It also checks your privacy settings and offers reminders and tips on how much you are sharing and how to change those settings
-
-
Using Facebook to nab a Facebook killer
Suffolk County police are using Facebook to solve a murder which appears to have been related to Facebook; a 31-year old woman was found dead; the police searched her Facebook page, and found two individuals with whom she had recently been in contact; one of them was using her credit cards after her death; the police has now created a page seeking information about the man, looking to arrest him
-
-
Symantec: Stuxnet targeted Iran's uranium enrichment program
Symantec says Stuxnet worm aimed to disrupt electrical motor controls, like those used by gas centrifuges to enrich uranium; Stuxnet, considered by many security researchers to be the most sophisticated malware ever, targeted Windows PCs that managed large-scale industrial-control systems in manufacturing and utility companies
-
-
U.S. Internet hosts are essential for criminal botnets
Cybercrime is often associated with Russia and China, and rightly so — but many of the servers vital to their activities are located elsewhere; facilities provided by Internet companies in the United States and Europe are crucial to these criminal gangs’ activities
-
-
Law enforcement agencies dig deeper into applicants' digital past
More and more police departments are digging deep into the social media accounts of applicants, requesting that candidates sign waivers allowing investigators access to their Facebook, MySpace, YouTube, Twitter, and other personal spaces; some agencies are demanding that applicants provide private passwords, Internet pseudonyms, text messages, and e-mail logs; of “particular concern” to law enforcement agencies is that defense lawyers could use officers’ posts to undercut their credibility in court
-
-
Best 300 U.S. student hackers compete for cybersecurity scholarships, prizes
The seventh Annual Cyber Security Awareness Week competition at the Polytechnic Institute of New York University; 120 teams from high schools across the country — consisting of 300 of the U.S. best student hackers — competed under the watchful eyes of representatives from the CIA, NSA, DHS, and NSA; the students compete for scholarships and prizes by solving simulated security crises likely to emerge in an increasingly wired world
-
-
Sector Report for Thursday, 11 November 2010: Cybersecurity
This report contains the following stories.
-
-
Cybersecurity standard published to protect global critical infrastructure
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems; the International Instrument Users Association (WIB) releases comprehensive cybersecurity standard to protect critical industrial computers;
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.