Microsoft has confirmed it was a recent victim of a cyber attack, but assures no customer information was stolen. "The cyber attack on Microsoft follows similar attacks on Apple and Facebook, with Facebook blaming the breach on a zero-day Java exploit."
Read the article here.
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Thursday, February 28, 2013
Tuesday, February 26, 2013
Cyber Security: Cyber attacks on U.S. originating from Chinese Army Unit headquarters in Shanghai
Evidence collected from U.S. Intelligence suggest that cyber attacks on U.S. corporations, government, and other organizations are originating from a building in Shanghai where a Chinese Army Unit is headquartered.
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&_r=0
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&_r=0
Monday, February 25, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of February 18
Click the link below to view the summary of cyber security vulnerabilities for the week of February 18 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB13-056.html
Thursday, February 21, 2013
Cyber Security: Australian cyber incidents going unreported
According to a 2012 survey, 44% of some 255 companies did not report cyber attacks because they believed the incidents were not worth an investigation.
http://www.computerworld.com.au/article/454014/security_incidents_going_unreported_cert_australia/?
http://www.computerworld.com.au/article/454014/security_incidents_going_unreported_cert_australia/?
Tuesday, February 19, 2013
Cyber Security Advisor Newsletter – Jan. 2013 Vol. 16
Greetings for 2013,
The first of every year is a good time to look ahead and review how we have performed against last year’s plans and how to augment them going forward. This also includes reviewing any new requirements that we may have to add. With the all action in securing industrial automation, we probably have items to add that were not on the list last year.
Please find Volume 16 of the Invensys Critical Infrastructure and Security Practice (CISP) newsletter attached to this email.
As we continue our efforts to educate on the need to address cyber security, the details that rise to the top are consistent. All successful Security Solutions are part of an overall program that addresses who will manage, maintain, and upgrade the solution for its lifetime. The latest and greatest technology can’t really just be dropped in and expected to perform; you must match it with your plans and strategy. The message is, consider what the needs are, develop a program, THEN determine the technical controls.
Click here to open the January 2013 newsletter.
Cyber Security: Obama's executive order for improving critical infrastructure cyber security
Read President Obama's executive order on improving critical infrastructure cyber security.
http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
Monday, February 18, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of February 11
Click the link below to view the summary of cyber security vulnerabilities for the week of February 11 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB13-049.html
http://www.us-cert.gov/cas/bulletins/SB13-049.html
Thursday, February 14, 2013
Cyber Security: U.S. government considering stronger actions against China for persistent cyber attacks
The Obama administration is looking for other ways to take action against China-based cyber attacks, since "high-level talks with the Chinese government to address persistent cyberattacks against U.S. companies and government agencies haven’t worked."
http://www.washingtonpost.com/politics/federal_government/us-looking-at-ways-to-take-stronger-action-against-china-based-cyberattacks-newspapers-hacked/2013/01/31/c5dcf144-6c04-11e2-8f4f-2abd96162ba8_story.html
http://www.washingtonpost.com/politics/federal_government/us-looking-at-ways-to-take-stronger-action-against-china-based-cyberattacks-newspapers-hacked/2013/01/31/c5dcf144-6c04-11e2-8f4f-2abd96162ba8_story.html
Tuesday, February 12, 2013
Cyber Security: Tips on how to create a strong password
Click the link below for tips on how to create a strong password.
Monday, February 11, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of February 4
Click the link below to view the summary of cyber security vulnerabilities for the week of February 4 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB13-042.html
http://www.us-cert.gov/cas/bulletins/SB13-042.html
Thursday, February 7, 2013
Cyber Security: The New Yorks Times hacked
Digital evidence discovered by The New York Times and computer experts suggest that Chinese hackers repeatedly infiltrated The New York Times' network for 4 months.
http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0
http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0
Tuesday, February 5, 2013
Cyber Security: Anonymous posts 4,000+ U.S. bank executive credentials
Read about Anonymous' latest cyber attack--this time on U.S. banks--"demanding U.S. computer crime law reform."
http://www.zdnet.com/anonymous-posts-over-4000-u-s-bank-executive-credentials-7000010740/
http://www.zdnet.com/anonymous-posts-over-4000-u-s-bank-executive-credentials-7000010740/
Monday, February 4, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of January 28
Click the link below to view the summary of cyber security vulnerabilities for the week of January 28 as collected and reported by ICS-CERT.
http://www.us-cert.gov/cas/bulletins/SB13-035.html
http://www.us-cert.gov/cas/bulletins/SB13-035.html
Subscribe to:
Posts (Atom)