Infamous malware group calls it quits
,----[ Quote ]
| The group has been in decline since its heyday at the turn of the century. A
| steady exodus of members over recent years accelerated early this year as it
| emerged that GriYo, Vecna, and Z0MBiE left the collective.
`----
http://www.theregister.co.uk/2008/03/07/29a_rip/
Pentagon attack last June stole an "amazing amount" of data
http://arstechnica.com/news.ars/post/20080306-pentagon-attack-last-june-stole-an-amazing-amount-of-data.html
Joy. Who's paying the price? Microsoft or the taxpayers?
Related:
Pentagon: Our new robot army will be controlled by malware
,----[ Quote ]
| A US defence department advisory board has warned of the danger that American
| war robots scheduled for delivery within a decade might be riddled with
| malicious code. The kill machines will use software largely written overseas,
| and it is feared that sinister forces might meddle with it in production,
| thus gaining control of the future mechanoid military.
`----
http://www.theregister.co.uk/2007/11/06/open_source_malware_future_combat_systems_robot_hack_war/
http://tinyurl.com/yp5nmt
Vista a 'threat' to the national security of India
,----[ Quote ]
| As Mr Bombay Watcher says on his blog, Microsoft has a cosy partnership
| with the CIA, so perhaps the world should take care and caution when it
| comes time to upgrade. We're pretty certain Windows 3.1 would be a safe
| bet. He seems particularly worried about the national security of India,
| as it does, of course, have some conflicting interests with the US
| of A.
`----
http://www.theinquirer.net/default.aspx?article=34979
Defense procurement ill-suited for open source
,----[ Quote ]
| In order to fully take advantage of open-source software, Defense Department
| agencies may need to rethink how they do procurement, said Fritz Schulz, who
| works in the chief technology office of the Defense Information Systems
| Agency.
`----
http://www.gcn.com/online/vol1_no1/45376-1.html
Open-source evolves from 'nerdy' to notable
,----[ Quote ]
| Last January, Host Europe, a company that runs the Web sites for 120,000
| businesses in Germany, Austria and Switzerland, secured an unlikely supplier
| for the open-source software it uses to run almost all of its computer
| servers.
|
| [...]
|
| "I think that the adoption of open source has been much greater in some
| of the Continental markets and in the United States," said Mark Brier,
| an open-source technician at the National Computing Center in
| Manchester, England, a nonprofit group that advises government
| on computer purchases. "Here there is no large-scale adoption."
|
| Scott Thompson, the executive director of OpenAdvantage, a
| nonprofit group in Birmingham, England, that promotes open-source
| software among businesses in the West Midlands region, said the
| spread has been limited by outmoded government procurement rules
| that favor larger, established proprietary vendors, government
| outsourcing of technology operations to companies with relationships
| to proprietary vendors, and the well-funded defense of proprietary
| software makers.
`----
http://www.iht.com/articles/2007/07/03/technology/source02.php
Chinese military hacked into Pentagon
,----[ Quote ]
| The Chinese military hacked into a Pentagon computer network in June in the
| most successful cyber attack on the US defence department, say American
| officials.
`----
http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html
China Crafts Cyberweapons
,----[ Quote ]
| The Defense Department reports China is building cyberwarfare
| units and developing viruses.
`----
http://www.pcworld.com/article/id,132284-pg,1/article.html(News)
German constitutional protection authorities foresee "secret service
procurement offensive"
,----[ Quote ]
| ...if Chinese attackers really had penetrated government computers, this
| would pose a risk even if no confidential data was involved. "It is possible
| to find out many things in this way - appointments, responsibilities, who is
| working on what - this is the first step in carrying out classical
| espionage," said Möller.
`----
http://www.heise.de/english/newsticker/news/95236/from/rss09
Politicians want to be informed on Chinese Trojan attacks
,----[ Quote ]
| Ruprecht Polenz (CDU), chairman of the Committee on Foreign Affairs,
| said: "If there is clear evidence that the Chinese state is responsible for
| these attacks, we cannot let the matter rest." According to a Spiegel report,
| the Federal Office for the Protection of the Constitution assumes that
| experts of the Chinese army have conducted the online espionage attacks
| against the Federal Chancellery, the ministry of economics, the ministry of
| research and also the ministry of foreign affairs.
`----
http://www.heise.de/english/newsticker/news/94983/from/rss09
Estonia suspects Kremlin in Web attacks
,----[ Quote ]
| He said more than 1 million computers worldwide have been used in
| recent weeks to attack Estonian government and business Web sites
| since a dispute arose with Moscow over Estonia's moving of a
| Soviet-era war memorial from downtown Tallinn.
`----
http://www.cnn.com/2007/TECH/internet/05/17/estonia.cyber.attacks.ap/index.html?eref=rss_tech
U.S. cyber counterattack: Bomb 'em one way or the other
,----[ Quote ]
| If the United States found itself under a major cyberattack aimed
| at undermining the natio's critical information infrastructure,
| the Department of Defense is prepared, based on the authority of
| the president, to launch a cyber counterattack or an actual
| bombing of an attack source.
`----
http://www.networkworld.com/news/2007/020807-rsa-cyber-attacks.html
US plans for cyber attack revealed
http://www.theinquirer.net/default.aspx?article=37563
Homeland Security sees cyberthreats on the rise
,----[ Quote ]
| To test the nation's response to a cyberattack, the Department
| of Homeland Security plans to hold another major exercise,
| called Cyberstorm II, in March 2008, Garcia said. A first
| such exercise happened early last year.
`----
http://news.com.com/2100-7355_3-6157809.html?part=rss&tag=2547-1_3-0-20&subj=news
http://tinyurl.com/2dpbmv
Zombie botnets attack global DNS servers
,----[ Quote ]
| Hackers launched a sustained attack last night against key root servers
| which form the backbone of the internet.
|
| Security firm Sophos said that botnets of zombie PCs bombarded the
| internet's domain name system (DNS) servers with traffic.
|
| "These zombie computers could have brought the web to its knees,"
| said Graham Cluley, senior technology consultant at Sophos.
`----
http://www.vnunet.com/vnunet/news/2174383/zombie-botnets-attack-global
Perspective: Microsoft security--no more second chances?
,----[ Excerpt ]
| CNET News.com's Charles Cooper says the software maker is running out
| of excuses for a history of poor security.
`----
,----[ Quote ]
| As if Homeland Security Secretary Michael Chertoff didn't have enough on
| his plate.
|
| Not only has he had to deal with Katrina and Osama. Now he's also got to
| whip Steve Ballmer and the crew at Microsoft into shape. If past is
| prologue, that last task may be the most daunting of all.
`----
http://news.com.com/2010-1002_3-6104512.html?part=rss&tag=6104512&subj=news
Botnet 'pandemic' threatens to strangle the net
,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^
| 600 million PCs on the internet are under the control of hackers,
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
| the BBC reports. "Despite all that, the net is still working,
| which is pretty amazing. It's pretty resilient," he said.
`----
http://www.theregister.co.uk/2007/01/26/botnet_threat/
EveryDNS, OpenDNS Under Botnet DDoS Attack
,----[ Quote ]
| The last time the Web mob (spammers and phishers using botnets)
| decided to go after a security service, Blue Security was forced
| to fold and collateral damage extended to several businesses,
| including Six Apart.
`----
http://securitywatch.eweek.com/exploits_and_attacks/everydns_opendns_under_botnet_ddos_attack.html
|
|