Volume 1, Edition 14 CyberPro November 20, 2008 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Senior Analyst newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any ------------------------------ misuse or unauthorized use of the newsletter and its contents will result CyberPro Research in removal from the distribution list and/or possible administrative, civil, Analyst and/or criminal action. Kathryn Stephens The views, opinions, and/or findings and recommendations contained in this summary are those of the authors and should not be construed as an official position, policy, or decision of the United States Government, CyberPro Archive U.S. Department of Defense, or National Security Cyberspace Institute. To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Larry McKee , ph. (757) 871-3578, regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume 1, Edition 14 CyberPro November 20, 2008 Keeping Cyberspace Professionals Informed TABLE OF CONTENTS Table of Contents .................................................................................................................. 2 Cyberspace – Big Picture ........................................................................................................ 4 Cyber defense, not cyberattacks, top priority ........................................................................................... 4 The Dark Art of Cyberwar ......................................................................................................................... 4 Cyberspace Invaders ................................................................................................................................ 5 Industry group calls for cybersecurity partnership .................................................................................... 5 Are agencies buying counterfeit technology? ........................................................................................... 5 ISP cut off from Internet after security concerns ...................................................................................... 5 ICANN to terminate notorious registrar’s credentials after all .................................................................. 6 Major data breaches predicted as firms cut IT spending .......................................................................... 6 Traditional security isn't enough for SOA ................................................................................................. 6 An IT-based economic recovery plan ....................................................................................................... 6 Response to Marcus Ranum HITB Cyberwar Talk................................................................................... 7 Cyberspace – President-Elect Obama ..................................................................................... 7 Danger Room Debrief: Time to Reboot Cyber Security, Mr. President-Elect .......................................... 7 Coviello: Better times ahead for government IT security .......................................................................... 7 Obama’s CTO: It’s Not About The Money ................................................................................................ 8 Can We Secure Government Networks? Yes, We Can, Theoretically ..................................................... 8 Obama Urged to Take Immediate Cyber-security Steps .......................................................................... 8 Report: Obama, McCain campaign computers were hacked by 'foreign entity' ....................................... 8 Cyber attacks on McCain and Obama teams ‘came from China’ ............................................................. 9 Cyberspace – Department of Defense (DoD) .......................................................................... 9 DoD draws lessons from cyber attacks against Georgia .......................................................................... 9 Space CO foresees smooth move to cyberspace .................................................................................. 10 After banning YouTube, military launches TroopTube ........................................................................... 10 Cyberspace – Department of Homeland Security (DHS) ........................................................ 10 Security Predictions: Two Views on the Department of Homeland Security .......................................... 10 DHS seeks input on revised infrastructure protection plan .................................................................... 11 IG: Sensitive information at airport at risk ............................................................................................... 11 Cyberspace Research ........................................................................................................... 11 ScanSafe Reveals Top 5 Industries Most At Risk Of Web-Based Malware .......................................... 11 Cybersecurity is focus of new University of Texas start-up incubator .................................................... 12 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 2 Volume 1, Edition 14 CyberPro November 20, 2008 Keeping Cyberspace Professionals Informed Researchers Find Flaws In Microsoft VoIP Apps ................................................................................... 12 Study: Critical infrastructure often under cyberattack ............................................................................. 13 Cracking Open Internet Hardware .......................................................................................................... 13 Cyberspace Hacks, Tactics, and Defense ............................................................................... 13 Hacker Army Infiltrating U.S. .................................................................................................................. 13 Chinese hack into White House network ................................................................................................ 13 EXCLUSIVE: Cyber-Hackers Break Into IMF Computer System ........................................................... 14 Three British hospitals hit with malware attack ....................................................................................... 14 CSI: Hacking Bluetooth 2.1 Passwords .................................................................................................. 14 New 'Stealth' Technology Secures Data On Shared Networks .............................................................. 15 Swedish router gives McColo botnets hope ........................................................................................... 15 Spam drop could boost Trojan attacks ................................................................................................... 15 Russian spy in Nato could have passed on missile defence and cyber-war secrets ............................. 15 Host of Internet Spam Groups Is Cut Off ................................................................................................ 16 The patch paradox .................................................................................................................................. 16 Relentless Web Attack Hard To Kill ........................................................................................................ 16 Don't Blame TCP/IP ................................................................................................................................ 16 FBI probes data theft blackmail scheme ................................................................................................ 17 Hackers make crack in Android defences .............................................................................................. 17 Once thought safe, WPA Wi-Fi encryption is cracked ............................................................................ 17 Hackers leverage Obama win for massive malware campaign .............................................................. 17 Cyberspace - Legal ............................................................................................................... 18 Fines likely for data breaches ................................................................................................................. 18 Keystroke spies put on notice by US court ............................................................................................. 18 Legal Risk of Cyber Outage .................................................................................................................... 18 US Navy hacker avoids Romanian jail ................................................................................................... 18 Pakistan
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages21 Page
-
File Size-