Blog posts with "cyber terrorism"
The Law and Politics of Military Hacking
"Preemptive counterattack" is taking on a whole new meaning. Though the US military has long maintained a policy of securing its networks and reserving a right to attack those who attack its networks, the issues of going on the offensive is now being discussed. This is not a new issue, but it has come to light recently due to increasing attacks on US networks and changes in the legal and political spheres. Critics are already pointing to the fact that these types of attacks often cause uni...
Read More...The Life of Russian Hacking Networks
In an interesting New York Times article, the author examines the basic functions of Russian cyber criminal networks and why they often go unpunished. Here are a few quotes: Law enforcement groups in Russia have been reluctant to pursue these talented authors of Internet fraud, for reasons, security experts say, of incompetence, corruption or national pride. Underscoring the nationalistic tone of much of Russian computer crime, one site [hacker site that exchanged credit card numbers to ai...
Read More...Education and the Future of US Cybersecurity
In a great article by Ben Bain at GCN, he stresses the need for an improved educational system to better prepare students for future cyber-security threats. Here is the article: "Strengthening education in science, technology, engineering and math is crucial to U.S. cybersecurity efforts, a senior Homeland Security Department official said today. Richard Marshall, director of global cybersecurity management in the Homeland Security Department’s National Cybersecurity Division, said improvi...
Read More...Good Morning Hong Kong: No Censorship of Google for Chinese Users
The day after Google removed from China to Hong Kong, we already have confirmation that Hong Kong will not assist China in censoring Google's search results, even though the results will be available to Chinese users. Here is a synopsis from BusinessWeek: "Hong Kong says it won’t help China censor Google Inc., after the search engine provider said it would route mainland users through its site in the city. Hong Kong respects freedom of information and its free flow, a spokesman for th...
Read More...The Great Google Compromise
Well Google is leaving China, sort of. Here's the story from Mercury News: "Google Inc. will shift its search engine for China off the mainland but won't shut it down altogether, and it will maintain other operations in the country. It's an attempt to balance its stance against censorship with its desire to profit from an explosively growing Internet market. On Monday afternoon, visitors to Google.cn were being redirected to Google's Chinese-language service based in Hong Kong. The page said...
Read More...Busting Butterflies: Mariposa Backdoor Cell Phone Exploit
In an interesting development to the Mariposa Botnet take-down I reported earlier on, a large batch of cell-phones were apparently shipped by Vodafone containing the trojan powering the Mariposa Botnet. Here is the story from the Register: "Vodafone Spain has accepted that 3,000 customers were potentially exposed to malware after Mariposa botnet agents strayed onto the HTC Magic smartphone. The admission to Spanish media on Thursday follows a meeting between the mobile phone giant's Iberian...
Read More...Google Leaving China, Date Set
They may have been 99.9% certain they were going to pull out of China before, but now a date has been set for Google to leave China, at least according to one insider. This escalation has been in the works for the past few months (see my stories here, here, and here). The insider claims April 10th will be the day. Read this excerpt from CNET: "Google is expected to announce on Monday that it will withdraw from China on April 10, according to a report in a Beijing-based newspaper that cited ...
Read More...Anti-Virus Programs don't Protect against Recent Chinese Attacks on Google
According to recent research, anti-virus programs are not giving us full protection against hackers, such as the Chinese hackers who targeted Google recently. Take a look at this story from Prweb.com: "NSS Labs, Inc., the leading independent security testing organization, today announced the results of its evaluation of seven popular consumer endpoint security products in protecting the vulnerability exploited in the recent 'Operation Aurora' attack conducted against Google and at least 3...
Read More...More Botnet Takedowns, this Time Zeus
Just was sent this article from cnet.com, hard to say if this was Microsoft's work or not, but appears to be counter-hacker hackers. Here is a quote: "The world's largest botnet, Zeus, has had its traffic disrupted by repeated disconnections of a Kazakhstani ISP, but a series of reconnections has revived its banking Trojan activity, according to security researchers. The botnet mainly pushes out the Zeus banking Trojan, an information-stealing keylogger that relays sensitive data back to its...
Read More...Google '99.9%' Certain to Pull Out of China
More news on the Google / China feud, here are some excerpts from ft.com: "Google has drawn up detailed plans for the closure of its Chinese search engine and is now '99.9 per cent' certain to go ahead as talks over censorship with the Chinese authorities have reached an apparent impasse, according to a person familiar with the company’s thinking. In a hardening of positions on both sides, the Chinese government also on Friday threw down a direct public challenge to the US search company, ...
Read More...- August 2015 (1)
- July 2015 (2)
- June 2015 (2)
- May 2015 (1)
- December 2014 (1)
- November 2014 (1)
- October 2014 (3)
- May 2014 (2)
- April 2014 (2)
- March 2014 (3)
- February 2014 (3)
- January 2014 (3)
- December 2013 (3)
- November 2013 (3)
- October 2013 (1)
- September 2013 (1)
- August 2013 (3)
- June 2013 (2)
- May 2013 (2)
- April 2013 (3)
- February 2013 (1)
- January 2013 (4)
- November 2012 (1)
- October 2012 (1)
- September 2012 (3)
- July 2012 (3)
- June 2012 (1)
- May 2012 (1)
- April 2012 (2)
- March 2012 (1)
- February 2012 (1)
- January 2012 (2)
- December 2011 (1)
- November 2011 (1)
- July 2011 (2)
- September 2010 (2)
- August 2010 (5)
- April 2010 (1)
- March 2010 (17)
- February 2010 (9)
- January 2010 (2)
- December 2009 (1)
- November 2009 (1)
- October 2009 (7)
- September 2009 (4)
- August 2009 (17)
- July 2009 (2)