Archive for August, 2014

Job Opening: Oil and Gas Cyber Security Engineer, Senior in Houston Texas United States


Booz Allen Hamilton

Title: Oil and Gas Cyber Security Engineer, Senior Location: Texas-Houston

Key Role:

Join a team to provide high caliber Cyber domain expertise and project management leadership in Cyber security and ICS Cyber security programs for commercial oil and gas clients. Provide consulting expertise on security engagements for the oil and gas clients’ enterprise and industrial control systems environments. Lead Cyber security system implementation programs, including specification and coordination or delivery of managed security services, provide insight into industry’s relevant Cyber threats, mitigation, and remediation techniques, perform gap analysis of client security posture and regulatory requirements, create detailed Cyber security documentation, including strategies, road maps, and technical recommendations, develop appropriate and defensive strategies for network and infrastructure, and look across other industries for best practices, lessons learned, and other valuable technical indicators. This position is located in Houston, TX.

Pentagon Satellite Maker Ignoring ‘Thousands’ of Major Cyber Vulnerabilities

From: Defense One

The Commerce Department inspector general is blasting a federal climate-satellite program and its supporting contractor, Raytheon, for ignoring tens of thousands of major cyber vulnerabilities.

The weaknesses identified in a new IG memo could impair machines controlling the Joint Polar Satellite System, the nation’s next-generation fleet of polar orbiting environmental satellites. 

The ground system routes information for the National Oceanic and Atmospheric Administration and the Pentagon, as well as other U.S. and foreign government agencies. NOAA, part of Commerce, manages the information technology system. 

Read Complete Article

Plain English reboot for government cyber security outreach

From: Government News (Australia)


One of the federal government’s most influential cyber watchdogs has signalled a firm new push to get business leaders and agency heads on board with the Commonwealth’s wider information security and risk mitigation agenda by cutting down on tech vendor spin.

Speaking at the Gartner Security & Risk Management Summit in Sydney, Mike Rothery, First Assistant Secretary of the Attorney General’s Department’s National Security Resilience Policy Division, revealed that consultations and outreach to industry had identified a pressing need for tangible risk assessment tools as opposed to an ever-extending laundry list of potential threats.

How Will NATO Adapt to Cyber Threats?

From: VPN Creative

By Summer Hirst

With increasing cyber attacks on government organizations, NATO (North Atlantic Treaty Organization) needs to wake up to the possibility of cyber warfare, Boston Globe columnists James G. Stavridis and Dave Weinstein, and this would need clearly defined protocols and a standardized policy.

Fortunately, NATO has acknowledged the rising demands of cyber awareness and announced that it would include defense strategies to cyber attacks in the Washington Treaty. The Washington Treaty, or the North Atlantic Treaty, was signed in April 1949 and acts as the foundation of NATO.

Read Complete Article

Report of Russian Gang Stealing 1.2 Billion Web Identities Alerts FBI

From: The Moscow Times


The U.S. Federal Bureau of Investigation is investigating a report by a U.S. cybersecurity firm that it uncovered some 1.2 billion Internet logins and passwords amassed by a Russian crime ring, the largest known collection of such stolen data.

Hold Security of Milwaukee, Wisconsin, disclosed earlier this month that it had discovered the credentials, collected over several years from approximately 420,000 websites and other servers.

“The FBI is investigating the recently reported incident involving the potential compromise of numerous user names and passwords, and will provide additional information as the nature and scope of the incident becomes clearer,” agency spokesman Josh Campbell said Tuesday via email.

Read Complete Article

Va. patients affected by Chinese cyber attack on hospital network

From: CBS 6

by and

PETERSBURG, Va. (WTVR) –Community Health Systems, which operates 206 hospitals across the United States, announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients in its physician network. 

The cyber-attack affects doesn’t affect the patients or former patients at any CHS hospitals, a spokesperson said. The computer network that was targeted by criminals contained information belonging to some patients seen at “physician practices and clinics affiliated with CHS hospitals, like Southside Regional Medical Center (SRMC) in Petersburg.”

Read Complete Article

One Of The Best Cybersecurity Minds On Earth Uses A Pager, Not A Phone

From: Gizmodo

Dan Geer is world-renowned cyber security researcher. He’s Chief Information Security Officer at In-Q-Tel, a non-profit venture capital firm. Hid company invests in technology to support the CIA. He’s knows his shit. And he uses a pager instead of a smartphone.

The Washington Post spoke to Geer after the keynote speech at last week’s Black Hat security conference. They asked him about his use of technology:

Call to regulate cyber security

From: Gulf Daily News

 By Ahmed Al Omari

BAHRAIN needs to establish a unified body to regulate cyber security in different sectors, including telecommunication and banking, according to a report.

Consultancy firm Strategy& in co-operation with the Telecommunications Regulatory Authority (TRA) yesterday released a report titled Rethinking ICT (Information and Communications Technology) Regulation: Regulators’ essential role in capturing the full potential of the ICT sector.

The 24-page document details the current global trends in telecommunication regulation, comparing Bahrain with the UK, the UAE, Saudi Arabia, Qatar and Singapore.

China spies — sex to cyber

From: Toronto Sun

David B. Harris

Sex-and-spying award winner?

China’s nominee is surely Katrina Leung, codenamed Parlour Maid. She’d pocketed $1.7 million in FBI money to spy on China by the time Washington figured out she was moonlighting as a double agent for Beijing – while bedding two senior FBI counterintelligence officers, in the process.

Now, that’s dexterity.


Chinese citizen Su first graced our shores in 2002. The aerospace engineer owns PRC-based Lode-Tech, an aviation-technology company. Feds call him the “directing mind” of a cyberspy ring targeting U.S. defence contractors, including Boeing. Nothing has been proved, but a Canadian judge ordered Su held, pending proceedings aimed at sending him to the United States for quality time with American prosecutors.

Symantec, Kaspersky Security Products Blacklisted by Chinese Government

From: Softpedia

The Chinese government has banned the usage of security products from foreign developers Symantec and Kaspersky for national security and public interests.
At the moment, on the list of the government’s procurement agency there are five approved security software brands, all from China. These include Qihoo 360 Technology, Venustech, CAJinchen, Beijing Jiangmin, and Rising.

The announcement came from People’s Daily newpaper, which first posted the news on Twitter and then offered slightly more details on their Facebook page.

Read Complete Article