Search Results for: hacking team

Is the idea of a safe, global Internet in jeopardy?

What kind of threats does the global Internet face today? CTV News engages Professor Ron Deibert, Director of The Canada Centre for Global Security Studies and The Citizen Lab on the highly profitable and political world of cyber crime and and cyberwar.

From CTV News

The move to cloud computing is unstoppable – but WikiLeaks gives us pause

“Until last week, any computing futurologist would tell you that cloud computing is where it’s at. You don’t need to know where your data is being stored; it’s just on a computer, or more likely computers, Out There On The Internet. Thus Amazon, with its EC2 (“Elastic Cloud Compute”) service, or Microsoft with its Azure service, or the most familiar example, Google, with its GoogleMail and Google Docs services, which are used by thousand of companies around the world. (Disclosure: the Guardian uses Google Docs and Mail, and Amazon’s EC2 system for its API.)”

From The Guardian

The Next Battlefield

The Citizen Lab and the Information Warfare Monitor are featured in the December 2010 issue of Sharp Magazine. The dynamic emergence of information warfare and cyber espionage are up for examination in this investigative piece which refers to Information Warfare Monitor reports such as “Breaching Trust” and “Shadows in the Cloud” and includes interviews with Citizen Lab researchers.

From Sharp Magazine

Graphics card supercomputers render passwords pointless

“A team of researchers at Georgia Tech Research Institute is investigating whether passwords are now worthless, given the supercomputer-like performance now available to hackers using standard desktop graphics cards.

“Right now we can confidently say that a seven-character password is hopelessly inadequate – and as GPU power continues to go up every year, the threat will increase.”

“In today’s world passwords are simply not enough to protect sensitive information on their own. In fact, VeriSign research of UK online adults showed that 39% disagree that ‘user name plus password’ is a strong enough security measure.

“A password is only one layer of security, which criminals have proven they are able to bypass – either through brute force as the Georgia Tech researchers have demonstrated, or, often, simply by guessing.””

From ComputerWeekly.com

Chinese army to target cyber war threat

“The People’s Liberation Army has unveiled its first department dedicated to tackling cyber war threats and protecting information security, Chinese media reported today.

The move comes just over a year after the United States created a cyber command.

The PLA Daily said the military announced the creation of the Information Security Base on Monday, giving few more details in its brief report.”

From

New IWM Report: Shadows in the Cloud

The Information Warfare Monitor/ (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0.FULL REPORT. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in… Read more »

Cyberwar and the ‘destruction of rules’

Ron Deibert and Rafal Rohozinski were featured in this Sify News article on cyberwar. The article discusses the Tracking Ghostnet report published by the Citizen Lab. It features an interview from The Christian Science Monitor from which both investigators discuss the recent attacks on Google and the growing frequency of contestion in cyberspace.

From Sify News

The fog of cyberwar

As Kyrgyzstan reels from a sustained cyberattack, Danny Bradbury asks whether it was a show of strength from Russia, or whether the perpetrators are closer to home. From guardian.co.uk

Spy Fears: Twitter Terrorists, Cell Phone Jihadists

Could Twitter become terrorists’ newest killer app? A draft Army intelligence report, making its way through spy circles, thinks the miniature messaging software could be used as an effective tool for coordinating militant attacks. From Wired