Home > Cybersecurity News > Cyber Legislation Introduced Amidst Attacks

Cyber Legislation Introduced Amidst Attacks

Tuesday, December 14, 2010 | 4:07 PM Leave a comment Go to comments

The numbers are out, according to eWeek, who recently published its list of the top 10 security stories of 2010.  Not surprising: The Google-China hacking incident, the malicious computer worm Stuxnet and the wrath of WikiLeaks all top the list of cyber blunders we’ve seen over the past year.

Regarding the latter of the list-toppers, WikiLeaks continues to make news headlines this week, as its hacktivist supporters rage on, threatening to take down the websites of any anti-WikiLeaks affiliates who take action to condemn the controversial site and its founder Julian Assange.

According to the Associated Press, the British government fears that its websites are at risk of Wiki-backed attacks, as Assange, who is wanted in Sweden on allegations of rape, was scheduled to appear in British court today for his extradition hearing.

Meanwhile, Reuters reported that, after arresting a 19-year-old Dutchman on Saturday in connection with the WikiLeaks cyber attacks, authorities released the young man on Sunday, per his confession to the crime.

According to the report, the 19-year-old, who admitted to helping attack the websites of MasterCard and Visa, was the second person to be arrested in the Netherlands for the string of cyber attacks.  Late last week, a 16-year-old boy was also arrested for contributing to the ploy.

And in a separate ploy carried out on Sunday, Gawker, the online media mogul and blogging network, suffered a hack attack that brought down the company’s websites and jeopardized the Internet passwords and email addresses of hundreds of thousands of its 1.3 million users.

According to PC Magazine, the FBI said it is investigating the incident, which apparently was the work of a group that calls itself “Gnosis.”  The Magazine went on to note that Gnosis said that it “went after Gawker because of their outright arrogance.”

The “arrogance” the hackers are referring to, according to Forbes, may be due in-part to Gawker’s previous warning of its security holes, which were pointed out as early as July of this year.

The solution to all of the latest cyber slams?

According to Senator Benjamin Cardin (D-Md.), Chairman of the Senate Judiciary Terrorism and Homeland Security Subcommittee, the answer might lie within a new piece of legislation he rolled out on Thursday.

Deemed “The Internet and Cybersecurity Safety Standards Act,” a press release from Sen. Cardin’s camp said the bill would “require the US government and the private sector to work together to develop minimum Internet and cybersecurity safety standards for users of computers and other devices that connect to the Internet.”

“Just as automobiles cannot be sold or operated on public highways without meeting certain minimum safety standards, we also need minimum Internet and cybersecurity safety standards for our information superhighway,” Sen. Cardin was quoted as saying in the press release.

Additional news headlines on WikiLeaks:

Cybersecurity must balance ‘need to know’ and ‘need to share’ (Defense.gov)

Sen. Gillibrand urges harder stance on cyber attacks (CBS News)

Attacking websites is surprisingly easy social protest (NPR)

Governing cybersecurity from the White House (GovInfoSecurity)

WikiLeaks, cyber war threaten our way of life (US News & World Report)

This week in credit card news: WikiLeaks, cybersecurity, prepaid cards (Forbes)

Additional cybersecurity news making headlines:

F.B.I. memos reveal cost of a hacking attack (New York Times)

Lawmakers push Obama to shore up State Dept.’s cybersecurity efforts (ExecutiveGov)

McDonald’s customers’ data exposed in a Big Mac hack attack (IT Pro)

US government, businesses poorly prepared for cyber attacks, experts say (TMC Net)

NASA tasked with new cybersecurity reporting (Federal News Radio)

Clarke: Regulation needed to defend critical infrastructure against threat of cyberwar (FierceGovIT)

Stuxnet’s Finnish-Chinese connection (Forbes)

Stuxnet’s persistent legacy: Cybersecurity is blended security (SC Magazine)

Analysis: Cyber attack protection not worth the cost for most (Reuters)

Is Internet backbone vulnerable to cyber attack? (ScienceDaily)

Study: 94% of UK firms believe they can handle cyber attacks (The New New Internet)

Using KeePass’ password database to protect your online identity (The Atlantic)

Financial services sector signs cybersecurity research agreement with NIST, DHS (NIST.gov)

Bulgaria to rely on NATO cyber defense teams (China Daily)

Retailer Genesco falls victim to cyber attack (Bloomberg)

Advertisements
  1. Wednesday, February 6, 2013 | 6:55 AM at 6:55 AM

    This particular blog post, “Cyber Legislation Introduced Amidst Attacks Cybersecurity News” was amazing.
    I am making out a copy to clearly show my personal buddies.

    Thanks for your effort-Alberta

  2. Friday, September 19, 2014 | 1:53 AM at 1:53 AM

    This will bring the user to a Disk Utility Application. So, if you are considering a hotspot with a contract,
    DON’T. Across Cina, this advice technology is more every-day.

  3. Sunday, September 28, 2014 | 11:28 PM at 11:28 PM

    By keeping it much alike to earlier ones, Microsoft has totally renovated key factors.
    Make sure to uncheck the Mc – Affe Security suite option when installing Adobe Products.
    A corrupted reference with the registry will lead to the failure of Windows to read them which in turn will generate the error.

  4. Thursday, October 2, 2014 | 5:51 PM at 5:51 PM

    Here is a step by step guide to help you remove wrong Windows
    entries from Windows 7 boot manager. Out of 10 user reviews from
    a trusted online store, 9 were highly positive and gave the
    L755-S5349 four to five stars. Then you can logon your computer with the new
    password.

  5. Wednesday, June 3, 2015 | 7:21 AM at 7:21 AM

    It may do the activation automatically over the internet, or it may prompt the user with
    an option to call and enter in a long string of
    numbers. Copy and paste from Windows 7 to XP Mode in VMware is activated
    by default. Open the Help and Support from the Start
    menu and click Options and Settings.

  1. Wednesday, September 24, 2014 | 6:20 AM at 6:20 AM

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: