Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Malware Gang Shutting Down While Enstire Nation (US) Falls Victim to Windows Malware

  • Subject: [News] [Rival] Malware Gang Shutting Down While Enstire Nation (US) Falls Victim to Windows Malware
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Sat, 08 Mar 2008 16:13:21 +0000
  • Newsgroups: comp.os.linux.advocacy
  • Organization: Freelance
  • User-agent: KNode/0.10.4
Infamous malware group calls it quits

,----[ Quote ]
| The group has been in decline since its heyday at the turn of the century. A 
| steady exodus of members over recent years accelerated early this year as it 
| emerged that GriYo, Vecna, and Z0MBiE left the collective.  
`----

http://www.theregister.co.uk/2008/03/07/29a_rip/

Pentagon attack last June stole an "amazing amount" of data

http://arstechnica.com/news.ars/post/20080306-pentagon-attack-last-june-stole-an-amazing-amount-of-data.html

Joy. Who's paying the price? Microsoft or the taxpayers?


Related:

Pentagon: Our new robot army will be controlled by malware

,----[ Quote ]
| A US defence department advisory board has warned of the danger that American 
| war robots scheduled for delivery within a decade might be riddled with 
| malicious code. The kill machines will use software largely written overseas, 
| and it is feared that sinister forces might meddle with it in production, 
| thus gaining control of the future mechanoid military.    
`----

http://www.theregister.co.uk/2007/11/06/open_source_malware_future_combat_systems_robot_hack_war/
http://tinyurl.com/yp5nmt


Vista a 'threat' to the national security of India

,----[ Quote ]
| As Mr Bombay Watcher says on his blog, Microsoft has a cosy partnership
| with the CIA, so perhaps the world should take care and caution when it
| comes time to upgrade. We're pretty certain Windows 3.1 would be a safe
| bet. He seems particularly worried about the national security of India,
| as it does, of course, have some conflicting interests with the US
| of A.
`----

http://www.theinquirer.net/default.aspx?article=34979


Defense procurement ill-suited for open source

,----[ Quote ]
| In order to fully take advantage of open-source software, Defense Department 
| agencies may need to rethink how they do procurement, said Fritz Schulz, who 
| works in the chief technology office of the Defense Information Systems 
| Agency.   
`----

http://www.gcn.com/online/vol1_no1/45376-1.html


Open-source evolves from 'nerdy' to notable

,----[ Quote ]
| Last January, Host Europe, a company that runs the Web sites for 120,000 
| businesses in Germany, Austria and Switzerland, secured an unlikely supplier 
| for the open-source software it uses to run almost all of its computer 
| servers.   
|
| [...]
|
| "I think that the adoption of open source has been much greater in some 
| of the Continental markets and in the United States," said Mark Brier, 
| an open-source technician at the National Computing Center in 
| Manchester, England, a nonprofit group that advises government 
| on computer purchases. "Here there is no large-scale adoption."
| 
| Scott Thompson, the executive director of OpenAdvantage, a 
| nonprofit group in Birmingham, England, that promotes open-source 
| software among businesses in the West Midlands region, said the 
| spread has been limited by outmoded government procurement rules 
| that favor larger, established proprietary vendors, government 
| outsourcing of technology operations to companies with relationships 
| to proprietary vendors, and the well-funded defense of proprietary 
| software makers.
`----

http://www.iht.com/articles/2007/07/03/technology/source02.php


Chinese military hacked into Pentagon

,----[ Quote ]
| The Chinese military hacked into a Pentagon computer network in June in the 
| most successful cyber attack on the US defence department, say American ­
| officials.  
`----

http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html


China Crafts Cyberweapons

,----[ Quote ]
| The Defense Department reports China is building cyberwarfare
| units and developing viruses.
`----

http://www.pcworld.com/article/id,132284-pg,1/article.html(News)


German constitutional protection authorities foresee "secret service
procurement offensive" 

,----[ Quote ]
| ...if Chinese attackers really had penetrated government computers, this 
| would pose a risk even if no confidential data was involved. "It is possible 
| to find out many things in this way - appointments, responsibilities, who is 
| working  on what - this is the first step in carrying out classical 
| espionage," said  Möller.     
`----

http://www.heise.de/english/newsticker/news/95236/from/rss09


Politicians want to be informed on Chinese Trojan attacks

,----[ Quote ]
| Ruprecht Polenz (CDU), chairman of the Committee on Foreign Affairs, 
| said: "If there is clear evidence that the Chinese state is responsible for 
| these attacks, we cannot let the matter rest." According to a Spiegel report, 
| the Federal Office for the Protection of the Constitution assumes that 
| experts of the Chinese army have conducted the online espionage attacks 
| against the Federal Chancellery, the ministry of economics, the ministry of 
| research and also the ministry of foreign affairs.      
`----

http://www.heise.de/english/newsticker/news/94983/from/rss09


Estonia suspects Kremlin in Web attacks

,----[ Quote ]
| He said more than 1 million computers worldwide have been used in
| recent weeks to attack Estonian government and business Web sites
| since a dispute arose with Moscow over Estonia's moving of a
| Soviet-era war memorial from downtown Tallinn.
`----

http://www.cnn.com/2007/TECH/internet/05/17/estonia.cyber.attacks.ap/index.html?eref=rss_tech


U.S. cyber counterattack: Bomb 'em one way or the other

,----[ Quote ]
| If the United States found itself under a major cyberattack aimed
| at undermining the natio's critical information infrastructure,
| the Department of Defense is prepared, based on the authority of
| the president, to launch a cyber counterattack or an actual 
| bombing of an attack source.
`----

http://www.networkworld.com/news/2007/020807-rsa-cyber-attacks.html


US plans for cyber attack revealed

http://www.theinquirer.net/default.aspx?article=37563


Homeland Security sees cyberthreats on the rise

,----[ Quote ]
| To test the nation's response to a cyberattack, the Department
| of Homeland Security plans to hold another major exercise,
| called Cyberstorm II, in March 2008, Garcia said. A first
| such exercise happened early last year.
`----

http://news.com.com/2100-7355_3-6157809.html?part=rss&tag=2547-1_3-0-20&subj=news
http://tinyurl.com/2dpbmv


Zombie botnets attack global DNS servers

,----[ Quote ]
| Hackers launched a sustained attack last night against key root servers
| which form the backbone of the internet.
| 
| Security firm Sophos said that botnets of zombie PCs bombarded the
| internet's domain name system (DNS) servers with traffic.
| 
| "These zombie computers could have brought the web to its knees,"
| said Graham Cluley, senior technology consultant at Sophos.
`----

http://www.vnunet.com/vnunet/news/2174383/zombie-botnets-attack-global


Perspective:  Microsoft security--no more second chances?

,----[ Excerpt ]
| CNET News.com's Charles Cooper says the software maker is running out
| of excuses for a history of poor security.
`----

,----[ Quote ]
| As if Homeland Security Secretary Michael Chertoff didn't have enough on
| his plate.
|
| Not only has he had to deal with Katrina and Osama. Now he's also got to
| whip Steve Ballmer and the crew at Microsoft into shape. If past is
| prologue, that last task may be the most daunting of all.
`---- 

http://news.com.com/2010-1002_3-6104512.html?part=rss&tag=6104512&subj=news


Botnet 'pandemic' threatens to strangle the net

,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
|                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^
| 600 million PCs on the internet are under the control of hackers,
|                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
| the BBC reports. "Despite all that, the net is still working,
| which is pretty amazing. It's pretty resilient," he said.
`----

http://www.theregister.co.uk/2007/01/26/botnet_threat/


EveryDNS, OpenDNS Under Botnet DDoS Attack

,----[ Quote ]
| The last time the Web mob (spammers and phishers using botnets)
| decided to go after a security service, Blue Security was forced
| to fold and collateral damage extended to several businesses,
| including Six Apart.
`----

http://securitywatch.eweek.com/exploits_and_attacks/everydns_opendns_under_botnet_ddos_attack.html

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index