(Reuters) – Thousands of staff across dozens of London’s financial firms will be put through a “war game” scenario on Tuesday to test how well they can handle a major cyber attack.
In one of the largest exercises of its kind in the world, the test dubbed “Waking Shark II” will bombard firms with a series of announcements and scenarios, such as a major attack on computer systems hitting stock exchanges and unfolding on social media. Continue reading
Terror group is capable of hitting any house in Israel, according to home front defense minister
“According to an IDF worst-case scenario, Israel could find itself under attack from thousands of rockets that could last three weeks,” he said at a conference at Bar-Ilan University, according to Israel Radio. “The Hezbollah organization has over 200,000 missiles capable of hitting any house in Israel.” Continue reading
Another interesting factor in attacks on the U.S. critical infrastructure is the exploiting of SCADAS. It’s been evidenced quite a few times that these have been compromised.
Here is one such example: UPDATE 3: U.S. probes cyber attack on water system
More than 10,000 people in Arkansas were dumped into a blackout Sunday following an attack on that state’s electric grid, the FBI said today, the third such attack in recent weeks. In August, a major transmission line in the region, around Cabot, Ark., was deliberately cut.
The FBI said that two power poles had been intentionally cut in Lonoke County on Sunday, resulting in the outage.
The FBI said it would pay a $25,000 reward for information about the attacks.
And for good reason. The FBI suspects these attacks are linked with a third incident in September. Continue reading
Only days after the authorities gave UK-based banks a time limit to come up with cyberattack defence plans, details have emerged of a major stress test of current financial systems set for next month.
Dubbed ‘Operation Waking Shark 2′, according to The Daily Telegraph the test day will simulate a “severe” attack on payment providers, banks and markets to sniff out weaknesses in defence strategies, communications, and procedures. Continue reading
Outgoing Homeland Security Secretary Janet Napolitano warned her successor on Tuesday to move quickly to prepare for an inevitable large-scale cyberattack against the United States.
Napolitano, delivering her farewell address at the National Press Club, said her successor should move fast to strengthen the nation’s cyber defenses. Continue reading
While the possibility of anti-satellite weapons, jamming and cyber-attacks aimed at the U.S. military’s fleets of communication satellites is making them vulnerable to adversaries, declining defense budgets constitute an equal threat to the space architecture the services rely upon, according to a report released July 24.
Like the Maginot Line that gave the French a false sense of security prior to the German Blitzkrieg in World War II, the U.S. military has assumed since the end of the Cold War that no one would dare launch an physical attack on its satellites because that would violate international norms. Just as the Germans did away with such niceties and invaded France through a neighboring country, an adversary could go after one of the military’s biggest Achilles’ heels, its space-based communication system, said Todd Harrison, senior fellow for defense budget studies at the Center for Strategic and Budgetary Assessments, and author of a new report, “The Future of Milsatcom.” Continue reading
A senior Israeli official revealed on Saturday that Syria has attempted two weeks ago to launch a cyber attack against Haifa’s water system, in retaliation to the alleged Israeli attack in Damascus a month ago.
Yitzhak Ben-Yisrael, chairman of the National Council for Research and Development, said that Israeli critical infrastructures such as electricity, water and the stock exchange undergo hundreds of cyber attacks every minute. Continue reading
Chinese hackers “bombard” the Pentagon’s computer systems “by the millions each and every day” searching for a point of entry into the sensitive U.S. computing systems, according to officials speaking at an event on cybersecurity on Tuesday.
Former Attorney General Michael Mukasey and other high-level former U.S. officials warned during a discussion at The American Center for Democracy (ACD) that the U.S. government is woefully underprepared to combat and repel even the most benign type of cyber attack. Continue reading
North Korea has fallen victim to a massive cyber attack since Wednesday morning, a senior South Korean government official said. He added Seoul is trying to find out who is behind it.
“Internet resources of the country have come under a powerful hacker attack from abroad,” Russia’s ITAR-TASS news agency, which has a branch in Pyongyang, reported on Wednesday night. The country’s websites apparently all went offline until late Thursday afternoon. Continue reading
Chinese hackers have hit nearly every Washington institution, according to unnamed intelligence officials.
“The dark secret is there is no such thing as a secure unclassified network,” one said in a Newser report. “Law firms, think tanks, newspapers. If there’s something of interest, you should assume you’ve been penetrated.” Continue reading
The U.S. Department of Energy has confirmed that its computer systems were hacked into last month. According to The New York Times, the federal agency sent around an internal e-mail on Friday telling its employees about the cyberattack.
“The Department of Energy has just confirmed a recent cyber incident that occurred in mid-January which targeted the Headquarters’ network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information,” the e-mail said. Continue reading
WASHINGTON — A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.
That decision is among several reached in recent months as the administration moves, in the next few weeks, to approve the nation’s first rules for how the military can defend, or retaliate, against a major cyberattack. New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war. Continue reading