31 Jan 12. Hun Technology Inc., are moving forward to the next phase in the development of their truly Secure Information Management software platform; Centurion2 (C2). A fundamentally new proactive approach to eliminate exposure of the nation’s digitized intellectual assets to prevent future cyber attacks. According to the FBI, Cyber attacks are the third greatest threat to US security. Clearly, current defensive techniques are proven to be ineffective in spite of the billions invested in the development of protective measures and encryption technologies. The government is fighting the symptoms instead of the cause; consequently, successful interceptions of cyber attacks can be temporary at best. (Source: Yahoo!/BUSINESS WIRE)
24 Jan 12. Raytheon Company’s WebShield™ product has been approved by the Unified Cross Domain Management Office (UCDMO) for inclusion on the version 4.1 baseline list. The UCDMO baseline is a validated products list of cross domain technologies and solutions available to agencies in the Department of Defense and intelligence community. WebShield provides agencies with secure HTTP traffic monitoring for multi-level network access and data retrieval, which promotes more complete information browsing and discovery across networks of varying sensitivity levels. The solution enables secure Web search and browse down from high-side networks to lower-level networks.
“No other organization has been dedicated to developing cross domain solutions as long as Raytheon Trusted Computer Solutions (RTCS), nor can they match our past performance in solving government information sharing requirements,” said Ed Hammersla, chief operating officer of RTCS. “The addition of WebShield to the UCDMO baseline list further extends the number of RTCS accredited solutions that are readily available to government agencies.”
26 Jan 12. Up until now Iran’s name has been bandied around in the midst of the escalating cyber attacks between Israeli and Arab hackers, with no real involvement. Several Iranian websites were recently targeted and taken down by Israeli hackers. The IDF Team, which claimed responsibility for bringing down the websites of the Saudi Arabian and UAE stock exchange, have now gone after several Iranian websites. The Jerusalem Post reported that the website of Press TV, Iran’s English language governmental mouthpiece, was defaced, and at the time of writing, has become completely inaccessible. It certainly hasn’t been a good week for Press TV, with the television branch of the media outlet losing its UK license. Press TV’s website, along with several other governmental Iranian sites, were hacked, and their content replaced with an image of the Israeli flag. In addition to hacking the Iranian website servers, the IDF Team also launched successful DDOS attacks on the sites. The hack comes in response to yesterdays attacks on the websites of the Sheba Medical Center and Assouta Hospital, while a group going by the name Anonymous
Palestine claimed responsibility for hacking Israeli daily Haaretz’s Hebrew site. The attacks have continued to escalate, and show no sign of slowing down, beginning with the January 3rd attack by Saudi Arabian based hacker, 0xOmar, in which he published the personal information of thousands of Israeli credit card holders. (Source: Google)
24 Jan 12. Cyber security firms have discovered a computer virus that uses servicemembers’ network security cards to hack into government networks. How does it work? servicemembers receive an email with an official-looking PDF file connected to the virus that allows it to record keystrokes, said Jaime Blasco, lab manager for Alien Vault, a California-based cyber security firm. The virus then collects a service member’s personal identification number associated with a Common Access Card when he logs into a government computer. “The hackers can get in pretty easily with this virus and do whatever they want on a government computer while a sold