From: Homeland Security News Wire
To: Scott Jenkins,
Subject: Cybersecurity: Internet of things risks | EMP threat | U.K. cyber apprenticeships
Date: Tue Mar 18 17:35:50 MDT 2014
Body:
Homeland Security News Wire Home  | About us  |  Subscribe  |  Advertise  |  Contact
Cybersecurity Report
Tuesday, 18 March 2014
Internet of things makes us even more vulnerable to hacking

The hackers who broke into the Target financial systems via an HVAC system gave us a demonstration of how much more vulnerable we have all become as a result of the advances of the Internet of things. A phishing attack using malware at an HVAC subcontractor allowed hackers to gain network credentials to reach Target’s financial systems. There are two concerns with Internet-of-things security. The first is the ability to hack in and control aspects of our lives -- open the front door, turn the heat up at the house, or disable the security system.  The second is the vulnerability and theft of the data collected as part of the Internet of things movement to make our lives easier and more interesting.

Russia conducted cyberattacks against Ukraine

Russia has been conducting cyberwarfare operations against Ukraine as part of its campaign in Crimea, Vice Adm. Michael Rogers, the nominee to head Cybercom and the National Security Agency, told Congress last week. Adm. Rogers acknowledged that Russia’s military possesses sophisticated cyberwarfare capabilities and could inflict considerable damage on Ukraine’s critical infrastructure, such as telecommunications and government networks.

Cybersecurity specialist withdraws conference presentation for fear of helping terrorists

Eric Filiol, who heads up the Operational Cryptography and Computer Virology lab in Laval, France, was scheduled to present a talk, titled “Hacking 9/11: The next is likely to be even bigger with an ounce of cyber,” CanSecWest Vancouver 2014. He has withdrawn his presentation, saying he fears sharing the results of research that shows how open data can be mined by terrorists could result in attacks against the United States or other countries.

Hacking of Navy's network the result of poorly worded contract with HP

The hacking of the U.S. Navy's network in September was blamed on Iran, but it now emerges that it was made possible because of a poorly formulated contract with Hewlett Packard. The contract the Navy signed with HP did not mention that HP was supposed to provide specific security to a set of Navy databases. Also, since the security databases were not maintained regularly, the hackers could attack the systems easily and move deeper into the Navy Marine Corps Intranet network.

view counter
The risks of EMP, GMD attacks on infrastructure

The effects of an electromagnetic pulse (EMP) attack in the form of high-altitude nuclear weapons and geomagnetic disturbances (GMD) from coronal mass ejections have been studies by government and private organizations. The similar consequences of both can be devastating. As much as 90 percent of the U.S. population may not survive a “grid-down” environment lasting a year or more -- and the National Academy of Sciences projected a 4 to 10 year recovery period for a “severe” event affecting a large regional expanse.

U.K. government creates cybersecurity apprenticeships

The U.K. government has decided to take the training of new cybersecurity specialists out of the hands of universities and engineering departments with new apprenticeships. A global skills shortage means the government is now looking to apprenticeships and Massive Open Online Course (MOOC) for training rather than boosting the number of software engineers being trained in universities. The government is also adding the topic to teaching of 11-year-olds to “inspire” people to choose it as a career.

Homeland Security, Criminal Justice, Law & Public Policy - Master of Science Legal Studies 100% online - CALU Global Online
view counter
Cyber competition winner wants to do good

19-year old Will Shackleton has won the 2014 U.K. Cyber Security Challenge – a competition hosted by intelligence and security organization GCHQ, aiming to find skilled cyber defenders who would be able to join the growing ranks of cyber specialists being recruited by the U.K. defense and intelligence services. Shackleton said that now that he has won the competition, he would like to be able to "do some good in the world."

Also noted

Kenya’s cyber security strategy enters homestretch | Averting a national blackout: Cybersecurity and the critical energy infrastructure | 6 greatest cybersecurity myths and why you should avoid them | Why Russia won't launch a full-scale cyberattack in Ukraine | Are Russia and Ukraine on the verge of an all-out cyberwar? | HGS develops cyber innovative engineering course for DoD, DHS | Cyber operations become part of the red-flag game plan | Israeli cyber warriors high in demand | Israeli techie says it takes a cyber hacker to catch a cyber hacker | Geopolitical tensions invade cyberspace | Eugene Kaspersky: Russia Ukraine cyber attacks probably not state sponsored | U.S. monitors For cCyber operations in Crimea standoff | The new security perimeter: Human sensors | New film shows what cyber terrorists have in store for us next

view counter
Legion of the Rearguard - Dissident Irish Republicanism from ISBS
view counter
view counter
Homeland Security, Criminal Justice, Law & Public Policy - Master of Science Legal Studies 100% online - CALU Global Online
view counter
Progress and Modernity in Arab Societies
view counter
State, Political Community and Foreign Relations in Modern and Contemporary Syria
view counter
BIOMETRICS | BORDERS | Business | Cybersecurity | Detection | Disasters | Government | Immigration
Infrastructure | Public health | Public Safety | Sci-Tech | SECTOR REPORTS | Surveillance | Transportation
Homeland Security News Wire Home | About us | Subscribe | Advertise | Contact

Forward email

This email was sent to sjenkins@utahsenate.org by hsnewswire@newswirepubs.com |  

Homeland Security News Wire | 200 Old Country Road | Suite 200 | Mineola | NY | 11501