Security News

A Hacker Says Smart Grid Can Be Penetrated
2013-01-18 14:51

http://bits.blogs.nytimes.com/2013/01/17/a-hacker-says-smart-grid-can-be-penetrated/ By NICOLE PERLROTH Bits The New York Times JANUARY 17, 2013

Declaring war against hackers
2013-01-18 14:51

http://www.nst.com.my/streets/northern/declaring-war-against-hackers-1.203201? By PAUL TOH nstp.com.my 18 January 2013

Re: Developer outsources work to China so he can watch cat videos (and gets caught)
2013-01-18 14:50

Forwarded from: Reese At 01:15 AM 1/17/2013, InfoSec News wrote:

'White hat' hacker discovers names of 'anonymous' volunteers of genome study in security drill
2013-01-18 14:49

http://www.independent.co.uk/news/science/white-hat-hacker-discovers-names-of-anonymous-volunteers-of-genome-study-in-security-drill-8457739.html By STEVE CONNOR The Independent 17 JANUARY 2013

N.Korea Fingered in Cyber Attack on S.Korean Daily
2013-01-17 06:15

http://english.chosun.com/site/data/html_dir/2013/01/17/2013011700661.html chosun.com Jan. 17, 2013

Viruses infect vital control systems at TWO US power stations
2013-01-17 06:14

http://www.theregister.co.uk/2013/01/16/us_power_plant_malware/ By John Leyden The Register 16th January 2013

#US
Testing of security for information exchange planned
2013-01-17 06:14

http://www.clinical-innovation.com/topics/privacy-security/testing-security-information-exchange-planned By Editorial staff Clinical Innovation + Technology Jan 16, 2013

Cyberwar’s Gray Market
2013-01-15 06:23

http://www.slate.com/articles/technology/future_tense/2013/01/zero_day_exploits_should_the_hacker_gray_market_be_regulated.html By Ryan Gallagher Slate Jan. 14, 2013

Red October relied on Java exploit to infect PCs
2013-01-15 06:23

http://arstechnica.com/security/2013/01/massive-espionage-malware-relied-on-java-exploit-to-infect-pcs/ By Dan Goodin Ars Technica Jan 14 2013

Important SCADA systems secured using weak logins, researchers find
2013-01-15 06:22

http://news.techworld.com/security/3420347/important-scada-systems-secured-using-weak-logins-researchers-find/ By John E Dunn Techworld 14 January 2013