tagged w/ Hackers
"We are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs. Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability..."
https://www.infosecisland.com/blogview/18419-Feds-Seize-150-Websites-in-Massive-Holiday-Sting.html"We are aggressively targeting those who are selling counterfeit goods for their... more
Two years ago this month the Climategate scandal broke.
Now more devastating Climategate e-mails were released today. We’ve covered juicy ones in the posts listed below. More on the way. Read ‘em all. They validate EVERYTHING the skeptics have been saying. Viva les sceptiques!
■Jones says media, especially BBC, has alarmist bias
■Wigley knows why paleo-reconstructions are junk science
■Jones says 2-degree C limit ‘plucked out of thin air’
■Alarmists looked to ally with Goldman Sachs
■Climategate 2.0: Phil Jones complains about omnipresent deniers
■Ducking confrontation on ‘Great Global Warming Swindle’
■Alarmist introspection admits dishonesty on hockey stick
■Jones laments blogsites as allowing deniers to find one another/a>
■Systematic deletion of e-mails
■How Phil Jones misleads journalists
■Santer angry over not being able to silence skeptics
■Mann says true temp anomaly not known well
■Silence of the alarmists
■Wigley accuses ‘Mike’, other IPCC-ers of deception, dishonesty
■Spun science isn’t going to end well
■Department of Energy involved in hiding temperature data?
■Jones advises e-mail deletion to avoid FOIA
■Mann says Curry not helping ‘the cause’
■‘All models wrong’
■IPCC models not worth a darn
■Hulme hired to be the hand of God
■Praying for the ‘Day After Tomorrow’ to work
■Catholicism an ‘extreme’ religion?
■Mann a dead-ender
■Mann paper slammed by colleague as ‘pathetic’
■‘Hockey stick’ debunking confirmed
■Hide the dissent
■Feelings more important than truth
■Kjellén has a better name for global warming
■Jones bans dissent on extreme weather
■Medieval Warm Period tough to erase
■Mann said skeptics ‘losing’
■Climategate 2.0?Two years ago this month the Climategate scandal broke. Now more devastating... more
"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."
https://www.infosecisland.com/blogview/18324-Espionage-Protecting-American-Innovation-in-Cyberspace.html"The Chinese are aggressively hacking into our nation’s networks,... more
While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...
https://www.infosecisland.com/blogview/18321-DHS-Officials-Deny-Hack-of-Illinois-Water-Systems.htmlWhile news that there was not a systems breach at the facility is certainly welcome,... more
Most in the security industry frown upon botnet-for-hire operators that sell their stolen bandwidth for illicit purposes. Personally, while I don't like or agree with it, I understand it. They are no different than any other person selling questionable or illicit services or goods in our society...
https://www.infosecisland.com/blogview/18315-DDoS-The-Message-is-Often-Lost-in-the-Noise.htmlMost in the security industry frown upon botnet-for-hire operators that sell their... more
"Two U.S. government satellites have each experienced at least two separate instances of interference apparently consistent with cyber activities against their command and control systems... The techniques appear consistent with authoritative Chinese military writings..."
https://www.infosecisland.com/blogview/18279-Malicious-Cyber-Activities-Directed-Against-US-Satellites.html"Two U.S. government satellites have each experienced at least two separate... more
Are you using the password “password” or “123456″? If so congratulations, you are using one of the top two worst and easiest to guess passwords on the internet. Splashdata creates an annual list of the worst passwords to use on the net, and here are the top 10 for 2011...
https://www.infosecisland.com/blogview/18278-Top-Ten-Most-Easily-Guessed-Passwords.htmlAre you using the password “password” or “123456″? If so... more
Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...
https://www.infosecisland.com/blogview/18273-Getting-Smacked-in-the-Face-Over-TCP.htmlThose who see concerted nation-state cyber attacks in every compromised system are... more
Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...
https://www.infosecisland.com/blogview/18272-The-FUD-Files-Cyber-Attacks-on-Our-Water-Systems.htmlSure, the vulnerable system was online for anyone to hit up AND it was in such an... more
"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."
(A special thanks to my friend Lt. Col. Mark Coffin, Deputy Director for the Network Warfare Center and Team Lead for Full Spectrum Penetration Testing for the U.S. Army, for providing Infosec Island with a copy this important report...)"While the development and integration of cyber technologies have created many... more
Governments, businesses, military, all rely on communications. Moreover, information collected and collated from intercepted diplomatic, military, commercial and financial communications offers potential competitors an advantage on the negotiation table or battlefield...
https://www.infosecisland.com/blogview/18237-Chinese-Intelligence-and-Cyber-Reconnaissance-Infrastructure.htmlGovernments, businesses, military, all rely on communications. Moreover, information... more
"No damage was done to any of the machinery; I don't really like mindless vandalism. It's stupid and silly. On the other hand, so is connecting interfaces to your SCADA machinery to the internet... This required almost no skill and could be reproduced by a two year old..."
https://www.infosecisland.com/blogview/18244-South-Houstons-Water-Supply-Network-Hacked.html"No damage was done to any of the machinery; I don't really like mindless... more
Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...
https://www.infosecisland.com/blogview/18238-US-Water-System-Hacked-A-Community-Wide-Issue.htmlInformation is still coming out on this event and the DHS has stated that they and FBI... more
"The House Cyber Security Task Force Report highlights the need to create a menu of economic incentives for the private sector to enhance its cyber security, rather than creating a large and unspecified regulatory apparatus at the Department of Homeland Security," Clinton said...
https://www.infosecisland.com/documentview/18242-Internet-Security-Alliance-Endorses-Cyber-Security-Legislation.html"The House Cyber Security Task Force Report highlights the need to create a menu... more
It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?
https://www.infosecisland.com/blogview/18232-Neuromancing-The-Cyberwars.htmlIt’s pretty damned hard to determine who did what and where on the net. Digital... more
“Why go to all this trouble to deploy a simple key-logger? Given that there are additional drivers waiting to be discovered, we can liken Duqu to a sophisticated rocket launcher – we have yet to see the real ammunition appear..."
https://www.infosecisland.com/blogview/18229-Duqu-May-Actually-Be-An-Advanced-Cyber-Weapon.html“Why go to all this trouble to deploy a simple key-logger? Given that there are... more
Despite federal prosecutors recent success against the infrastructure of DNS Changer and the prosecution of seven, it appears that the malware itself still survives. With its ability to infect and change systems’ DNS so that users were then redirected to websites of the scammers choosing...
https://www.infosecisland.com/blogview/18204-Warning-DNS-Changer-Lives.htmlDespite federal prosecutors recent success against the infrastructure of DNS Changer... more
“Authentication is the front line defense... This program, supported by the White House, will help stem the tide of malicious and deceptive email. This is a great example of the public and private sector working together to increase end-to-end trust of our nation’s critical infrastructure..."
https://www.infosecisland.com/blogview/18228-Federal-Agencies-Tap-Online-Trust-Alliance-for-Training.html“Authentication is the front line defense... This program, supported by the... more
The threat of lost or stolen devices and the possibility of their personal information being used for fraudulent means a significant concern. In the United States 113 mobile phones are lost every minute and more than half of smartphone users do not use any password protection...
https://www.infosecisland.com/blogview/17612-Consumers-Need-to-Rethink-IT-Security-and-Safety.htmlThe threat of lost or stolen devices and the possibility of their personal information... more
The "IRS did not, in GAO’s opinion, maintain effective internal control over financial reporting... These issues increase the risk of unauthorized individuals accessing, altering, or abusing proprietary IRS programs and electronic data and taxpayer information,” the report contends...
https://www.infosecisland.com/blogview/18220-GAO-Report-IRS-Security-Controls-Continue-to-Languish.htmlThe "IRS did not, in GAO’s opinion, maintain effective internal control... more