Friday, December 23, 2011

Report on Ponzi Schemes

December 19, 2011

CNBC's Scott Cohn reports on more than $1.5B in losses as a result of Utah ponzi schemes.

Link ~ Utah: Welcome to Ponziland! - CNBC

Thursday, December 8, 2011

Cyber attacks could wreck world oil supply

December 08, 2011

Cyber attacks could wreck world oil supply

Doha, Hackers are bombarding the world's computer controlled energy sector, conducting industrial espionage and threatening potential global havoc through oil supply disruption.

Oil company executives warned that attacks were becoming more frequent and more carefully planned.

"If anybody gets into the area where you can control opening and closing of valves, or release valves, you can imagine what happens," said Ludolf Luehmann, an IT manager at Shell Europe's biggest company .

"It will cost lives and it will cost production, it will cost money, cause fires and cause loss of containment, environmental damage - huge, huge damage," he told the World Petroleum Congress in Doha.

Continues @ read more ..

Thursday, December 1, 2011

Cyber Security Bill Approved by House Panel

December 1, 2011

Cyber Security bill approved by House panel

A bill to let U.S. spy agencies share intelligence on cyber threats with private companies was backed by a House of Representatives intelligence panel on Thursday.

In a 17-1 vote, the Permanent Select Committee on Intelligence approved the legislation that would expand a pilot Pentagon program for sharing classified and sensitive threat information with defense contractors and their Internet service providers.

Under the measure, a longer list of companies would be eligible for access to classified data from the National Security Agency and other agencies.

The bill was amended to expand privacy protections for data that companies give the government, including, potentially, data that Internet providers give about their customers. That data could be used only for cyber or national security, according to the amendment.

Some critics have worried that this type of sharing arrangement amounts to government surveillance of private data.

The government would also be barred from searching collected data except to secure cyber networks from attack.