Newsround

News.  Some True

Cyber attack on Israel planned for Wednesday to mark 9/11. A few days ago, a YouTube video was distributed calling on Muslim hackers worldwide to attack Israel on Wednesday, September 11. Just over five months ago, on Holocaust Day, “Globes” reported on a cyber attack against Israel by Muslim hacker groups sponsored by underground organization, Anonymous. The attack included hacking into Israeli websites and crashing them, hacking into Facebook accounts of Israeli citizens, and other activity aimed at damaging Israel’s Internet space.  The hackers declared that the cyber attack’s general objective was to wipe Israel off the Internet map, which means that the attack was unquestionably a failure. But from the hackers’ perspective, they were able to deal Israel a painful blow, and they are now ready for a new round. A few days ago, a YouTube video was distributed calling on Muslim hackers worldwide to attack Israel on Wednesday, September 11.
Cyber Attacks More Threat to Supply Chain Than Weather. While recent natural catastrophes have highlighted the risks weather poses to a company’s supply chain, technology failure and cyber attacks represent an even greater threat that many companies overlook, a new report said. In its “Tomorrow Never Knows: Emerging Risks” report, the Guy Carpenter said, “Few aspects of our personal or commercial lives are now technology free. And yet, most individuals and businesses only realize the extent of this dependency when they are negatively affected by a technology-driven or technology-dependent event.” This reality extends to a company’s supply chain, Guy Carpenter said. “Due to technological innovation and advances, many parts of a company’s or industry’s supply chain may have become interconnected and automated. Technology is indeed a critical enabler of a supply chain’s operations,” states the report. As such, the consultancy said, a single disruption such as a cyber attack “has the potential to put an entire company’s supply chain at risk.” The report outlines results from the “Business Continuity Institute’s 2012 Supply Chain Resilience Survey,” which show that unplanned outage of IT/telecoms was the most significant cause of supply-chain disruption last year, outpacing adverse weather, which placed second.
Ultra Electronics, 3eTI Prevents Cyber-Attacks with New Defense-in-Depth Security Device for Industrial Control Systems. EtherGuard L3 integrates enhanced layers of Information Assurance (IA) and cyber security controls for truly intelligent, more secure protection of real-time systems. Ultra Electronics, 3eTI, a leading provider of military-grade, cyber-secure network solutions for critical information systems, infrastructure and industrial automation, announces the next major release of its EtherGuard® L3, a government-grade, Layer 3 encryption device. This release focuses on preventing sophisticated ICS cyber-attacks by providing defense-in-depth (DID) cyber security for machine-to-machine (M2M) and embedded systems connectivity. EtherGuard L3 is designed to prevent malware such as Stuxnet or “insider” attacks from targeting defense and industrial environments, as well as countering the inadequate security which commonly exposes networks and critical edge devices to exploitation.
The EtherGuard L3 provides multi-layer protection including encryption, authentication, access control, denial-of-service, deep-packet-inspection (DPI), intrusion detection and prevention, central network management, and key management for industrial control and real-time systems. Together these capabilities allow an EtherGuard L3 to efficiently provide both safety and security defenses against multiple types of attack. EtherGuard L3’s protection, which is available as a device or integrated OEM module, enhances situational awareness for critical applications and empowers network managers to achieve the ever-elusive balance between security and operations.
 
Sykipot malware used to gather intel on U.S. civil aviation sector. Trend Micro researchers spotted the Sykipot malware being used in a new campaign targeting the U.S. civil aviation sector.
Fraudsters abuse Google Calendar for Android to send out scam messages. Researchers at Webroot found that scammers are registering thousands of fake Google accounts and using the Google Calendar app for Android to send out spam calendar invites.
 
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s