Obama Authorizes Sanctions Against Hackers

obama-authorizes-sanctions-against-hackers-300X225.jpg

President Barack Obama has signed an executive order authorizing the US government to impose sanctions on people, organizations and governments that partake in "malicious cyber-enabled activities" that harm the country.

"The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that support our troops," Obama said in a statement.
The sanctions would target activities that significantly harm critical infrastructure, disrupt computer networks, expose personal information and trade secrets, and entities that profit from information stolen in cyberattacks. The administration will focus on threats from outside the US and Obama made the point that "many of these attacks originate from outside our borders."
The sanctions Obama announced will help prevent and respond to cyberattacks when channels such as working with law enforcement and the private sector or cooperating with nations don't offer a resolution. In some cases, foreign laws are too weak or governments "either unwilling or unable to crack down on those responsible," the statement said.
The new powers allow the government to block a person or organization's access to US financial institutions and any property they have in the country. Suspected hackers are also barred from either giving or receiving funds and transferring assets.
Preventing cybercriminals from transferring funds deposited in a U.S. bank can limit "their ability to both commit these malicious acts and to profit from them," the statement said.
In his remarks, Obama mentioned recent cyberattacks against the US, including the December data breach at Sony Pictures that was linked to North Korea. Other industries that have been targeted by cyberattacks of late include retail, banking and health care.

Computerworld:  http://bit.ly/1FOxGVT

« Malware Remodeled
Why Use Bitcoin? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Secure Forensics

Secure Forensics

Secure Forensics can assist in any situation that requires digital forensics or an investigation ranging from complex criminal matters to fraud and file tampering to cyber crime.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.