Obama Authorizes Sanctions Against Hackers

obama-authorizes-sanctions-against-hackers-300X225.jpg

President Barack Obama has signed an executive order authorizing the US government to impose sanctions on people, organizations and governments that partake in "malicious cyber-enabled activities" that harm the country.

"The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that support our troops," Obama said in a statement.
The sanctions would target activities that significantly harm critical infrastructure, disrupt computer networks, expose personal information and trade secrets, and entities that profit from information stolen in cyberattacks. The administration will focus on threats from outside the US and Obama made the point that "many of these attacks originate from outside our borders."
The sanctions Obama announced will help prevent and respond to cyberattacks when channels such as working with law enforcement and the private sector or cooperating with nations don't offer a resolution. In some cases, foreign laws are too weak or governments "either unwilling or unable to crack down on those responsible," the statement said.
The new powers allow the government to block a person or organization's access to US financial institutions and any property they have in the country. Suspected hackers are also barred from either giving or receiving funds and transferring assets.
Preventing cybercriminals from transferring funds deposited in a U.S. bank can limit "their ability to both commit these malicious acts and to profit from them," the statement said.
In his remarks, Obama mentioned recent cyberattacks against the US, including the December data breach at Sony Pictures that was linked to North Korea. Other industries that have been targeted by cyberattacks of late include retail, banking and health care.

Computerworld:  http://bit.ly/1FOxGVT

« Malware Remodeled
Why Use Bitcoin? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.