The Cyberwar Thread

The real danger of cyberwar is that it can be difficult to figure out who did it and that non-state actors can cause serious devastation.

Agreed. So cybersecurity is important. Yet feared by the masses. What's a mother to do?:sad:
 
US Cyber Command Fact Sheet

ss_130627-D-VO565-003b.jpg

Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, holds up a phone that allows him to operate with voice and data in the classified environment (DoD Secure Intranet) no matter where he is. Joking that the phone “would make even Batman and James Bond a bit jealous,” Dempsey used it to illustrate a point about the military's role in cyberspace and the threat that cyberattacks pose during remarks at the Brookings Institution in Washington, D.C., June 27, 2013.
 
From PC World;

Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotspot

You’ve probably read at least one story with warnings about using unsecure public Wi-Fi hotspots, so you know that eavesdroppers can capture information traveling over those networks. But nothing gets the point across as effectively as seeing the snooping in action. So I parked myself at my local coffee shop the other day to soak up the airwaves and see what I could see.

email_captured-100044052-medium.png


...This is all the information someone would need to configure their email client to use my account and start receiving my emails. They might also be able to send emails from my account.
 
UK spies: Nations are hiring cybermercenaries

LONDON (AP) -- A British intelligence report says that other nations are hiring hackers to launch attacks against their enemies, a trend it described as particularly worrying.

The report cited testimony from British eavesdropping agency GCHQ when it warned that foreign countries were hiring out "skilled cyber professionals" to attack a diverse range of targets including financial institutions and energy companies.

The lawmakers didn't go into much further detail, but there's long been concern over the proliferation of private companies that make money by developing and distributing offensive software.
 
AWS-Logo-Blue.png


Staying Ahead Of The Cyber Threat

The chairman of the Joint Chiefs of Staff said that in its mission to defend the nation, the Defense Department must stay ahead of the ongoing technological revolution and its attendant rise in “anywhere, any time” cyber threats.

“As the defense community begins to focus inward on the implications of changing resources and this thing called sequestration, I think it’s important that we force ourselves to continue to look outward, at the changing world around us,” Army Gen. Martin E. Dempsey told attendees at a Brookings Institution forum.

Intrusion attempts on critical civilian infrastructure systems have increased 17-fold over the last two years, he said. “The gap between cyber defenses deployed across critical infrastructure and offensive tools we now know exist presents a significant vulnerability for our nation,” Dempsey said.

Over the next four years, 4,000 cyber operators will join the ranks of U.S. Cyber Command, and $23 billion will be invested in cybersecurity, he sa
id.
 
meanwhile when will the USA end the charade and get back Snowden , seeing that the South Americans would actually make him talk , instead of the Russian hospitality , which also seems to include a redhead by the name of Anna ?
 
Universities Face a Rising Barrage of Cyberattacks

America’s research universities, among the most open and robust centers of information exchange in the world, are increasingly coming under cyberattack, most of it thought to be from China, with millions of hacking attempts weekly. Campuses are being forced to tighten security, constrict their culture of openness and try to determine what has been stolen.

JP-HACKING-2-articleInline.jpg


University officials concede that some of the hacking attempts have succeeded. But they have declined to reveal specifics, other than those involving the theft of personal data like Social Security numbers. They acknowledge that they often do not learn of break-ins until much later, if ever, and that even after discovering the breaches they may not be able to tell what was taken.

HACKING-articleInline-v2.jpg

Bill Mellon of the University of Wisconsin said the school has seen as many as 100,000 hacking attempts a day from China.

Other universities report a similar number of attacks and say the figure is doubling every few years. What worries them most is the growing sophistication of the assault.
 
as people know ı am supposed to keep my silly pointless rants together as far as practicable . So , with apologies to everyone , the HD space eating thing is back . ı don't know what causes it , but ı would lose 40MB almost every week in C:// . Having a really congested machine , ı do nothing there to have space for Windows . Almost 15 days or more with no problem and ı lost 4 times that amount in one day ...
 
briefings1.png


Welcome to Black Hat 2013

Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers. The Briefings take place regularly in Las Vegas, Barcelona, Amsterdam, Abu Dhabi and, occasionally, Tokyo. An event dedicated to the Federal Agencies is organized in Washington, D.C.

Black Hat was founded in 1997 by Jeff Moss, who also founded DEF CON. These are considered the premier information security conferences in the world: Black Hat 2009 was attended by 4,000 people. Black Hat started as a single annual conference in Las Vegas and is now held in multiple locations around the world.

Black Hat is known for the antics of its hacker contingent, and the disclosures brought in its talks. Conference attendees have been known to hijack wireless connections of the hotels, hack hotel TV billing systems, and even hack the automated teller machine in a hotel lobby...


Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013.
 
Indeed. Then again, consider the source. Hackers are notoriously anti-establishment. Only two hacker/hecklers was probably better than General Alexander expected.

A 30 Year-Old Hacker Just Cursed At The Most Powerful Man In Global Surveillance

Also (Imho),I would be willing to bet that for every outspoken critic of NSA or CyberCom, there's probably a dozen quitely putting in job applications.
 
Your TV might be watching you

The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information.

But the glitches speak to a larger problem of gadgets that connect to the Internet but have virtually no security to speak of.

Security cameras, lights, heating control systems and even door locks and windows are now increasingly coming with features that allow users to control them remotely. Without proper security controls, there's little to stop hackers from invading users' privacy, stealing personal information or spying on people.

The research was conducted on different models of 2012 Samsung Smart TVs and was presented this week at the Black Hat cybersecurity conference in Las Vegas.
 
Is Twitter seen as misogynists' 'golden ticket?'

But there has been a real sense of unhinged mania in the frenetic activity of Twitter "trolling" in the past week, which has shown no sign of abating. Caitlin Moran claims that on a bad day she can get up to 50 tweets an hour that are violent or abusive. While no one wants to be on the receiving end of these messages, anyone who writes "Rape threats? Don't flatter yourself. Call the cops. We'll rape them too. YOU B*TCH! YO P**SY STANK!" or ridiculous and faintly surreal bomb threats, is certainly not winning at life.

Twitter has been caught on the back foot. First in tolerating it under the fig leaf of freedom of speech (since when has threatening someone with rape or violence been expressing an opinion?), and then by treating the matter with a diffidence only possible in the Rayndian environment of Silicon Valley. That it's taken them so long to respond is indicative of their inability to grasp the seriousness of the situation.

But the problem for Twitter is that these people are in danger of turning the platform into the equivalent of a manky, crime ridden shopping center -- full of sketchy types, obscene graffiti and broken street furniture -- and who wants to have a conversation there? The platform technologists have a responsibility to provide a solution, and to start acting like the publishers that they patently are. They have responded, as any company getting bad PR must, but whether this will actually change the atmosphere on Twitter -- as well as misogyny there are serious issues with anti-Semitism and racism too -- remains to be seen.

The so-called "trolls" themselves evidently think they are being in some way edgy or humorous...
 
Hacking your car?

Can Your Car Be Hacked? (yes, if you have a newer model).

Researchers reveal methods behind car hack at Defcon

Their test cars were a 2010 Ford Escape and a 2010 Toyota Prius.

Some of the things they were able to achieve by hooking a laptop to the ECU communications network and injecting rogue signals into it included disabling the breaks while the car was in motion, jerking the steering wheel, accelerating, killing the engine, yanking the seat belt, displaying bogus speedometer and fuel gauge readings, turning on and off the car's lights, and blasting the horn.

The researchers also found a way to achieve persistent attacks by modifying the ECU firmware to send rogue signals even when they were no longer physically connected to the control units.


And concerning Michael Hastings' death...
 
Hacking your car?

Can Your Car Be Hacked? (yes, if you have a newer model).

Researchers reveal methods behind car hack at Defcon

Their test cars were a 2010 Ford Escape and a 2010 Toyota Prius.

Some of the things they were able to achieve by hooking a laptop to the ECU communications network and injecting rogue signals into it included disabling the breaks while the car was in motion, jerking the steering wheel, accelerating, killing the engine, yanking the seat belt, displaying bogus speedometer and fuel gauge readings, turning on and off the car's lights, and blasting the horn.

The researchers also found a way to achieve persistent attacks by modifying the ECU firmware to send rogue signals even when they were no longer physically connected to the control units.


And concerning Michael Hastings' death...

live-free-or-die-hard.jpg


The future has never been brighter
 
Expect more Web hacking if U.S. strikes Syria

WASHINGTON — The Syrian hacker group that has taken credit for causing outages on the websites of the New York Times and other news organizations probably will increase its activity if the U.S. launches military strikes on the Middle Eastern nation, a cybersecurity expert said Wednesday.

The Syrian Electronic Army wants to keep people from reading what it views as negative information about the regime of President Bashar Assad, which it supports, said Adam Meyers, vice president of intelligence for CrowdStrike, an Internet security firm in Irvine.

The group does so by launching hacking attacks on news and social media sites.
 
Hacking your car?

Can Your Car Be Hacked? (yes, if you have a newer model).

Researchers reveal methods behind car hack at Defcon

Their test cars were a 2010 Ford Escape and a 2010 Toyota Prius.

Some of the things they were able to achieve by hooking a laptop to the ECU communications network and injecting rogue signals into it included disabling the breaks while the car was in motion, jerking the steering wheel, accelerating, killing the engine, yanking the seat belt, displaying bogus speedometer and fuel gauge readings, turning on and off the car's lights, and blasting the horn.

The researchers also found a way to achieve persistent attacks by modifying the ECU firmware to send rogue signals even when they were no longer physically connected to the control units.


And concerning Michael Hastings' death...

Now this is just scary. I remember being very skeptical of the idea of hacking cars back when Kaitzilla first posted the thread about it, I guess I owe him an apology for that.

Fear of this, even if it is a rare occurrence, could hinder the development and sale of self-driving/parking vehicles, not to mention the idea of a centrally-controlled grid.
 
Back
Top Bottom