Blog posts with "computer security"
New Leak: Bank of America Spies on Political Opponents
In a report that surfaced today, members of the Anonymous collective report to have obtained information regarding surveillance efforts by Bank of America against activists. Sources report that activists of the Occupy Wall Street movement, the Anonymous collective, and other private citizens were targeted by efforts of Bank of America and at least one other IT contractor by the name of TEKSystems. One of the most interesting details of this story is that no servers were hacked to obtain this ...
Read More...Newly Discovered Virus Steals Your Money Without You Knowing
A new and devious spin on an old con was recently uncovered by Israeli security firm Trusteer, makers of the Rapport financial anti-malware package. The con involves using a Trojan horse (such as SpyEye, Zeus, or Carberp) to take control of the victim’s computer in order to discover financial information and login credentials. This basic maneuver has been used for years by hackers to steal money from victims’ accounts, but this new tactic substantially delays the discovery of the fraud, ...
Read More...The Law and Politics of Military Hacking
"Preemptive counterattack" is taking on a whole new meaning. Though the US military has long maintained a policy of securing its networks and reserving a right to attack those who attack its networks, the issues of going on the offensive is now being discussed. This is not a new issue, but it has come to light recently due to increasing attacks on US networks and changes in the legal and political spheres. Critics are already pointing to the fact that these types of attacks often cause uni...
Read More...The Life of Russian Hacking Networks
In an interesting New York Times article, the author examines the basic functions of Russian cyber criminal networks and why they often go unpunished. Here are a few quotes: Law enforcement groups in Russia have been reluctant to pursue these talented authors of Internet fraud, for reasons, security experts say, of incompetence, corruption or national pride. Underscoring the nationalistic tone of much of Russian computer crime, one site [hacker site that exchanged credit card numbers to ai...
Read More...Net Neutrality in Jeopardy, DC Appellate Court Rules against FCC, Issue Far from Settled
In an order published this morning, available by clicking on the title of this post or the link posted at the end, the D.C. Federal Circuit Court of Appeals held that the Federal Communications Commission (FCC) lacked the power to mandate Comcast's network management practices, including the FCC's prohibition against Comcast's throttling of BitTorent traffic. The thirty-six page opinion was authored by Judge David S. Tatel who was joined by Judge A. Raymond Randolph and Chief Judge David B...
Read More...Education and the Future of US Cybersecurity
In a great article by Ben Bain at GCN, he stresses the need for an improved educational system to better prepare students for future cyber-security threats. Here is the article: "Strengthening education in science, technology, engineering and math is crucial to U.S. cybersecurity efforts, a senior Homeland Security Department official said today. Richard Marshall, director of global cybersecurity management in the Homeland Security Department’s National Cybersecurity Division, said improvi...
Read More...Good Morning Hong Kong: No Censorship of Google for Chinese Users
The day after Google removed from China to Hong Kong, we already have confirmation that Hong Kong will not assist China in censoring Google's search results, even though the results will be available to Chinese users. Here is a synopsis from BusinessWeek: "Hong Kong says it won’t help China censor Google Inc., after the search engine provider said it would route mainland users through its site in the city. Hong Kong respects freedom of information and its free flow, a spokesman for th...
Read More...The Great Google Compromise
Well Google is leaving China, sort of. Here's the story from Mercury News: "Google Inc. will shift its search engine for China off the mainland but won't shut it down altogether, and it will maintain other operations in the country. It's an attempt to balance its stance against censorship with its desire to profit from an explosively growing Internet market. On Monday afternoon, visitors to Google.cn were being redirected to Google's Chinese-language service based in Hong Kong. The page said...
Read More...Busting Butterflies: Mariposa Backdoor Cell Phone Exploit
In an interesting development to the Mariposa Botnet take-down I reported earlier on, a large batch of cell-phones were apparently shipped by Vodafone containing the trojan powering the Mariposa Botnet. Here is the story from the Register: "Vodafone Spain has accepted that 3,000 customers were potentially exposed to malware after Mariposa botnet agents strayed onto the HTC Magic smartphone. The admission to Spanish media on Thursday follows a meeting between the mobile phone giant's Iberian...
Read More...Google Leaving China, Date Set
They may have been 99.9% certain they were going to pull out of China before, but now a date has been set for Google to leave China, at least according to one insider. This escalation has been in the works for the past few months (see my stories here, here, and here). The insider claims April 10th will be the day. Read this excerpt from CNET: "Google is expected to announce on Monday that it will withdraw from China on April 10, according to a report in a Beijing-based newspaper that cited ...
Read More...- August 2015 (1)
- July 2015 (2)
- June 2015 (2)
- May 2015 (1)
- December 2014 (1)
- November 2014 (1)
- October 2014 (3)
- May 2014 (2)
- April 2014 (2)
- March 2014 (3)
- February 2014 (3)
- January 2014 (3)
- December 2013 (3)
- November 2013 (3)
- October 2013 (1)
- September 2013 (1)
- August 2013 (3)
- June 2013 (2)
- May 2013 (2)
- April 2013 (3)
- February 2013 (1)
- January 2013 (4)
- November 2012 (1)
- October 2012 (1)
- September 2012 (3)
- July 2012 (3)
- June 2012 (1)
- May 2012 (1)
- April 2012 (2)
- March 2012 (1)
- February 2012 (1)
- January 2012 (2)
- December 2011 (1)
- November 2011 (1)
- July 2011 (2)
- September 2010 (2)
- August 2010 (5)
- April 2010 (1)
- March 2010 (17)
- February 2010 (9)
- January 2010 (2)
- December 2009 (1)
- November 2009 (1)
- October 2009 (7)
- September 2009 (4)
- August 2009 (17)
- July 2009 (2)