Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says

Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says


Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says

Posted:

InfoSec News: Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says: http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=227900305
By Tim Wilson DarkReading Oct 19, 2010
Incidence of theft of information and electronic data at global companies has overtaken physical theft for the first time, according to a study released yesterday. [...]

Government Ready For Cybersecurity Deadline, Officials Say

Posted:

InfoSec News: Government Ready For Cybersecurity Deadline, Officials Say: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=227900157
By J. Nicholas Hoover InformationWeek October 18, 2010
When the federal government flips the switch to replace the government's arduous paper-based cybersecurity compliance process with a web-based [...]

SCADA security just got more serious

Posted:

InfoSec News: SCADA security just got more serious: http://www.controlenguk.com/article.aspx?ArticleID=37383
Control Engineering UK 19 October 2010
There are reports that a new, more powerful, Stuxnet virus could be unleashed very soon as code is posted on the internet for anyone to copy. Manufacturing, infrastrucure and engineering industries are, therefore being urged to take even tighter preventative measures to protect themselves and not to delay doing this.
David Robinson, UK and Ireland country manager, Norman Data Defense said: ‘It was just a matter of time before the Stuxnet code was published on the web for anyone, with even the most basic knowledge of coding, to alter and potentially wreak havoc on the industry. Now is the time to review IT security, no matter how small the risk. This is big news.’
The news has been flooded with the recent security breach of a major automation company reportedly caused by the Stuxnet virus being carried on a USB memory stick. “This new type of virus has a boot file built-in and now that the code is in the hands of any malware writer it could mutate very quickly,” said Robinson.
However, it is not just memory sticks that can spread this virus. Anyone with a laptop or a device that connects remotely to a wireless network inside a company’s firewall, is putting that company at risk. It will just be a matter of time before Stuxnet, or its successors, are evolved attacking any control systems or any other system that the user connects an infected laptop or portable device to.
[...]

Lynn: Cyberspace is the New Domain of Warfare

Posted:

InfoSec News: Lynn: Cyberspace is the New Domain of Warfare: http://www.defense.gov/news/newsarticle.aspx?id=6131
By Cheryl Pellerin American Forces Press Service Oct. 18, 2010
With the creation of the U.S. Cyber Command in May and last week’s cybersecurity agreement between the departments of Defense and Homeland [...]

Hacker hits Kaspersky website

Posted:

InfoSec News: Hacker hits Kaspersky website: http://www.computerworld.com/s/article/9191921/Hacker_hits_Kaspersky_website
By Robert McMillan IDG News Service October 19, 2010
Scammers who try to trick victims into downloading fake antivirus software can strike almost anywhere. On Sunday they hit the website of [...]

Hotel room security check

Posted:

InfoSec News: Hotel room security check: http://bobarno.com/thiefhunters/2010/08/hotel-room-security-check/
By Bambi Vincent Aug 18 2010
Bob and I sleep more nights in hotels than in our own home and, to date, we have never been ripped off in a hotel room. True, we use a certain amount of care, but our laptops are usually left out and sometimes valuables are more hidden than locked. We stay in hotels ranked from six stars to no stars, depending on our sponsors and our intentions. In each hotel room, we make a quick and automatic assessment of risks and adjust our behavior to correspond. We have never walked out of a hotel* because of safety issues; we simply adopt the necessary precautions.
We evaluate several pivotal points:
The room key: we prefer electronic card keys. Old-fashioned metal keys can be copied, and where might copies be floating around? Electronic locks are usually recoded after each guest. Most electronic locks save records of whose keys have recently gained entry. Authorized keys are registered to their users. So if a guest reports a problem, security can tap into records stored in the lock’s mechanism and see the last ten or so entries, be they housekeeping, an engineer, a minibar man, or the guest himself.
Electronic key cards should not be marked with a room number. They’re usually given in a folder which identifies the room. Leave the folder in the room when you go out and carry just the un-numbered magnetic card. If you lose the key, the safety of your room won’t be compromised.
Some hotels still use metal keys attached to a big fat ornament and expect guests to leave keys at the front desk when going out. I’m not fond of this method for several reasons. First, I prefer privacy and anonymity rather than announcing my comings and goings. In some hotels, anyone can look at the hooks or pigeonholes behind the desk and know if a room is occupied or empty. Second, I don’t care for the delay entailed in asking for the key on returning. I could just take the thing with me, but its design discourages that. So third, I don’t want to haul around a chunk of brass the size of a doorknocker. And finally, these keys are usually well identified with the name of the hotel and room number. Losing it would expose one to substantial risk. When possible, Bob and I remove the key from its chunk and just carry it, re-attaching it before check-out. At other times, we go traditional and turn in the key as the hotel suggests.
[...]

N.Korean Hackers 'Snooping Around G20 Summit Venue'

Posted:

InfoSec News: N.Korean Hackers 'Snooping Around G20 Summit Venue': http://english.chosun.com/site/data/html_dir/2010/10/20/2010102000897.html
Oct. 20, 2010
Evidence points to North Korean hackers attempting to gather information about water supply and drainage systems, pathways of toxic materials, and traffic control near the venue of the G20 Summit in Seoul, according to the Cyber Terror Response Center of the National Police Agency.
"We detected suspicious moves surrounding the G20 Summit recently and tracked down the hackers to a server in North Korea," a government official said Tuesday.
The government is trying to find out whether this was part of an attempt to obstruct the hosting of the G20 Summit in Seoul.

0 comments:

Post a Comment