Information Security News

Featured News

Iran Blamed for Cyberattacks
The Wall Street Journal
Iranian hackers with government ties have mounted cyberattacks…

TD Bank Says 260K Customers Exposed in Data Breach
ABC News
TD Bank has begun notifying about 260,000 customers from Maine…

US-China cyber security disagreements could cause trade war, expert warns
IT Pro Portal
Cyber saber rattling by US lawmakers over the potential security…

Panetta Sounds Alarm on Cyber-War Threat
Time
Defense Secretary Leon Panetta issued what he said is a “clarion…

US: Hackers in Iran responsible for cyberattacks
Associated Press
U.S. authorities believe that Iranian-based hackers were…

Conficker worm still being tracked, but evidence collection slows
Computerworld
The notorious malware known as the Conficker worm still infects…

View All

Daily News

Former LulzSec member guilty in Sony Pictures hack
Computerworld
Raynaldo Rivera admitted his involvement in a cyberattack that…

New malware detected, expert says it aims to trick Venezuelans to steal online credentials
The Washington Post
A newly detected computer virus aims to steal Venezuelans’…

Pentagon's Plan X: how it could change cyberwarfare
Christian Science Monitor
The Pentagon has always been secretive about its desire and…

View All

Information Security Reports

Cyber Awareness Bulletin: October 11, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

Cyber Awareness Bulletin: October 9, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

Cyber Awareness Bulletin: October 4, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

Cyber Awareness Bulletin: October 2, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

Cyber Awareness Bulletin: September 25, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

Cyber Awareness Bulletin: September 20, 2012
The OSAC Cyber Awareness Bulletin is a compilation of open…

View All

CONSULAR AFFAIRS BULLETINS

Emergency Message for U.S. Citizens: San Salvador (El Salvador), Credit Card Cloning Alert
The U.S. Embassy in San Salvador wishes to remind U.S. citizens traveling to or residing in El Salvador that El Salvador is rated CRITICAL for crime.…

Resource Library

Links to web sites outside the U.S. Federal Government or the use of trade, firm, or corporation names within the Overseas Security Advisory Council web site are for the convenience of the user. Such use does not constitute an official endorsement or aapproval by the Overseas Security Advisory Council of any private sector web site, product, or service.
123
Records Per Page:
select
 
123
Records Per Page:
select


The NCFTA functions as a conduit between private industry and law enforcement with a core mission to identify, mitigate and neutralize cyber crime.


This advisory is a follow-up to “ICS-ALERT-12-195-01 - Tridium Niagara Directory Traversal and Weak Credential Storage Vulnerability” that was published July 13, 2012, on the ICS-CERT Web page.


This report describes a new insider threat study funded by DHS S&T in collaboration with the USSS and the CERT. Insider Threat Center, part of Carnegie Mellon University’s Software Engineering Institute. The primary goal of the current research is to produce empirically derived findings from insider and outsider computer criminal activity within the banking and finance sector to help security professionals prevent, detect, and manage malicious insider activity and risk.


The Department of Homeland Security (DHS) Control Systems Security Program manages and operates the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) to provide focused operational capabilities for defense of control system environments against emerging cyber threats.


A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and United States Secret Service.


Cyber criminals today are increasingly leveraging malware, bots and other forms of sophisticated threats to attack organizations for various reasons, including financial gain, business disruption or political agendas.


As a task force, the IPR Center uses the expertise of its member agencies to share information, develop initiatives, coordinate enforcement actions, and conduct investigations related to IP theft. Through this strategic interagency partnership, the IPR Center protects the public’s health and safety, the U.S. economy, and the nation's war fighters.


This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents.


Consider traveling with “clean” electronic devices – if you do not need the device, do not take it. Otherwise, essential devices should have all personal identifying information (PII), and sensitive files removed or “sanitized”


NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.