Russia has created a military unit specializing in digital war. The information has been confirmed by Andrei Grigoryev, a spokesman for the Russian armed forces to the Russian news agency RIA Novosti. The Foundation for Advanced Military Research, similar in its purpose to America's Defense Advanced Research Projects Agency (DARPA), was set up in October last year to boost the development of advanced weaponry and help streamline the arms procurement process in Russia.
EnergySec’s 9th Annual Security Summit, being held at the Magnolia Hotel in Denver, Colorado on September 17th-19th, is the place to share with the industry and main stakeholders in the energy sector about cyber security gains.
Keeping tabs on critical infrastructure: Implementing the right tools
6 Sep 2013
The utility industry is going through tremendous changes, which are both exciting and challenging. Implementing or improving an enterprise-wide, integrated EAM, GIS and CIS solution is the first decisive step in developing greater consistency, cohesion, and a “one team” view to managing risk and addressing the prevailing silo mentality across utilities.
The report serves as a basis for the new National Defense Programme Guidelines, that steers Japan’s medium to long-term defence principles. The Japanese government will review and release new guidelines by the end of this year.
Chinese hackers that hit NYT are evolving their techniques
30 Aug 2013
FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times. Security researchers believe that Chinese hackers are involved in a large-scale cyber espionage operation that hit also US media, the malicious code used are newer versions of Aumlib and Ixeshe malware.
Cybercrime-as-a-Service, the rise of hacking services
30 Aug 2013
Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the cybercrime ecosystem. Danchev has recently profiled a newly launched underground service that could allow for cybercriminals to automate the penetration testing process against any target.
The CCI started its activities in Argentina with a presentation on Critical Infrastructure Protection and Industrial Cybersecurity that was held on august the 22nd in ICIC (Programa Nacional de Infraestructuras Críticas y Ciberseguridad). The event was organised by ISSAarba, the Buenos Aires chapter of the Information Systems Security Association and had an attendance composed by public administration and industry delegates.
SCADA environments consist of industrial control and management systems that monitor, manage and administer critical infrastructures in various fields such as transport, nuclear, electricity, gas, water… Identified as critica. This article shows 5 steps that should be taken to ensure the security of SCADA environments.