Thursday, February 28, 2013

Cyber Security: Microsoft latest victim in cyber attack

Microsoft has confirmed it was a recent victim of a cyber attack, but assures no customer information was stolen. "The cyber attack on Microsoft follows similar attacks on Apple and Facebook, with Facebook blaming the breach on a zero-day Java exploit."

Read the article here.



Tuesday, February 26, 2013

Cyber Security: Cyber attacks on U.S. originating from Chinese Army Unit headquarters in Shanghai

Evidence collected from U.S. Intelligence suggest that cyber attacks on U.S. corporations, government, and other organizations are originating from a building in Shanghai where a Chinese Army Unit is headquartered.

http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&_r=0


Monday, February 25, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of February 18


Click the link below to view the summary of cyber security vulnerabilities for the week of February 18 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB13-056.html

Thursday, February 21, 2013

Tuesday, February 19, 2013

Cyber Security Advisor Newsletter – Jan. 2013 Vol. 16

Greetings for 2013,

The first of every year is a good time to look ahead and review how we have performed against last year’s plans and how to augment them going forward.   This also includes reviewing any new requirements that we may have to add. With the all action in securing industrial automation, we probably have items to add that were not on the list last year.      

Please find Volume 16 of the Invensys Critical Infrastructure and Security Practice (CISP) newsletter attached to this email.   

As we continue our efforts to educate  on the need to address cyber security, the details that rise to the top are consistent. All successful Security Solutions are part of an overall program that addresses who will manage, maintain, and upgrade the solution for its lifetime. The latest and greatest technology can’t really just be dropped in and expected to perform; you must match it with your plans and strategy. The message is, consider what the needs are, develop a program, THEN determine the technical controls.   
                                                                                                  



Click here to open the January 2013 newsletter.

Cyber Security: Obama's executive order for improving critical infrastructure cyber security

Read President Obama's executive order on improving critical infrastructure cyber security.

http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity

Monday, February 18, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of February 11

Click the link below to view the summary of cyber security vulnerabilities for the week of February 11 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB13-049.html

Thursday, February 14, 2013

Monday, February 11, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of February 4

Click the link below to view the summary of cyber security vulnerabilities for the week of February 4 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB13-042.html

Thursday, February 7, 2013

Cyber Security: The New Yorks Times hacked

Digital evidence discovered by The New York Times and computer experts suggest that Chinese hackers repeatedly infiltrated The New York Times' network for 4 months.

http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0

Monday, February 4, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of January 28

Click the link below to view the summary of cyber security vulnerabilities for the week of January 28 as collected and reported by ICS-CERT.

http://www.us-cert.gov/cas/bulletins/SB13-035.html