You definitely cannot say the Department of Homeland Security (DHS) is hesitant about cashing in on disasters. On Wednesday, DHS Secretary Janet Napolitano cited the damage wrought by Sandy as a warning of what could happen if the United States doesn\u2019t get its cybersecurity act together.\n\n\t"One of the possible areas of attack, of course, is attacks on our nation's control systems\u2014the control systems that operate our utilities, our water plants, our pipelines, our financial institutions,"\u00a0Napolitano said. "If you think that a critical systems attack that takes down a utility even for a few hours is not serious, just look at what is happening now that Mother Nature has taken out those utilities."\n\tI\u2019m all in favor of cybersecurity (uh, duh) but let\u2019s put this in perspective. When it was at hurricane strength Sandy released\u00a05.2 x 1019\u00a0Joules\/day or\u00a06.0 x 1014\u00a0Watts of energy. That is about 200 times the electric generating capacity OF THE WORLD.\n\tThere\u2019s no doubt that a cyber attack on U.S. critical infrastructure could cause a lot of problems. However, cyber attacks should not be compared to a hurricane that hit the most populous part of the United States.\n\tNapolitano also said: "The urgency and the immediacy of the cyber problem; the cyber attacks that we are undergoing and continuing to undergo cannot be overestimated."\n\tActually, they can, and Napolitano proved it.\nDHS Warns of \u2018Hacktivist\u2019 Threat Against Industrial Control Systems\n\n\t\t(KrebsOnSecurity) The\u00a0U.S.\u00a0Department of Homeland Security\u00a0is warning that a witches brew of recent events make it increasingly likely that politically or ideologically motivated hackers may launch digital attacks against industrial control systems. The alert was issued the same day that security researchers published information about an undocumented software backdoor in industrial control systems sold by hundreds of different manufacturers and widely used in power plants, military environments and nautical ships.\n\nCritical Flaw Found in Software Used by Many Industrial Control Systems\n\n\t\t(NetworkWorld) CoDeSys, a piece of software running on industrial control systems from over 200 vendors, contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for authentication, according to a report from security consultancy Digital Bond.\n\nData Security Breach Expands to 657,000 S.C. Businesses\n\n\t\t(Charlotte Observer) As many as 657,000 S.C. businesses had their tax information stolen in the massive security breach at the state Department of Revenue that also claimed the records of up to 3.6 million people, Gov. Nikki Haley said Wednesday. Since Friday, when they announced the hacking publicly, state officials had said that they did not think business records were exposed. But Mandiant, a consultant hired by the S.C. Department of Revenue, found Tuesday night that business tax records had been compromised, too\n\nIrked by Cyberspying, Georgia outs Russia-Based Hacker - With Photos\n\n\t\t(Computerworld) In an unprecedented move, the country of Georgia - irritated by persistent cyber-spying attacks - has published\u00a0two photos\u00a0of a Russia-based hacker who, the Georgians allege, waged a persistent, months-long campaign that stole confidential information from Georgian government ministries, parliament, banks and NGOs. The photos are contained in a report that alleges the intrusions originated from Russia, which launched a five-day military campaign in August 2008 against Georgia that was\u00a0preceded by a wave of cyber attacks.\n\nNew FBI Initiative Will Identify And Trace Hackers\n\n\t\t(ThinkProgress) On Friday, the FBI\u00a0announced\u00a0a new initiative to track down and identify hackers. The program is an attempt to respond to hacking that had led to \u201cmalicious software in two million computers\u201d in early 2011. The FBI describes the program as a way to \u201cuncover and investigate web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackers\u2019 digital signatures from mountains of malicious code.\u201d Besides its relevance to individual computer users, hacking and the need for cybersecurity is becoming increasingly relevant to national security.\n\nMalware Hijacks Your Email, Sends Death Threats\n\n\t\t(ZDNet) Three people were recently arrested in Japan in relation to death threats being posted online and sent through email. However, once a particular malware infection was found on each suspect's computer, all three were released without charge. Automatically sending threats from your PC, this particularly bloody-minded piece of malware has been blamed for a number of serious threats.\u00a0According to\u00a0Symantec's analysis, these include a government-posted website message stating the user would commit mass murder, threats to blow up famous shrines, an email sent to an airline threatening to bomb aircraft and warnings to a kindergarten that hosted a child from a royal family. Analysis of the malware has found that a sabotaged computer can be controlled through a remote location - a common component of such infections. Through this control, the creator is able to make threats on behalf of the infected user's PC.