Search Results for: hacking team
“Until last week, any computing futurologist would tell you that cloud computing is where it’s at. You don’t need to know where your data is being stored; it’s just on a computer, or more likely computers, Out There On The Internet. Thus Amazon, with its EC2 (“Elastic Cloud Compute”) service, or Microsoft with its Azure service, or the most familiar example, Google, with its GoogleMail and Google Docs services, which are used by thousand of companies around the world. (Disclosure: the Guardian uses Google Docs and Mail, and Amazon’s EC2 system for its API.)”
From The Guardian
The Citizen Lab and the Information Warfare Monitor are featured in the December 2010 issue of Sharp Magazine. The dynamic emergence of information warfare and cyber espionage are up for examination in this investigative piece which refers to Information Warfare Monitor reports such as “Breaching Trust” and “Shadows in the Cloud” and includes interviews with Citizen Lab researchers.
From Sharp Magazine
“A team of researchers at Georgia Tech Research Institute is investigating whether passwords are now worthless, given the supercomputer-like performance now available to hackers using standard desktop graphics cards.
“Right now we can confidently say that a seven-character password is hopelessly inadequate – and as GPU power continues to go up every year, the threat will increase.”
“In today’s world passwords are simply not enough to protect sensitive information on their own. In fact, VeriSign research of UK online adults showed that 39% disagree that ‘user name plus password’ is a strong enough security measure.
“A password is only one layer of security, which criminals have proven they are able to bypass – either through brute force as the Georgia Tech researchers have demonstrated, or, often, simply by guessing.””
“The People’s Liberation Army has unveiled its first department dedicated to tackling cyber war threats and protecting information security, Chinese media reported today.
The move comes just over a year after the United States created a cyber command.
The PLA Daily said the military announced the creation of the Information Security Base on Monday, giving few more details in its brief report.”
The Information Warfare Monitor/ (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0.FULL REPORT. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in… Read more »
Ron Deibert and Rafal Rohozinski were featured in this Sify News article on cyberwar. The article discusses the Tracking Ghostnet report published by the Citizen Lab. It features an interview from The Christian Science Monitor from which both investigators discuss the recent attacks on Google and the growing frequency of contestion in cyberspace.
From Sify News
Well-known human rights advocates in China and a Tibetan rights activist in the United States have disclosed that their Gmail accounts have been compromised. They came forward after Google’s announcement of a sustained cyber attack on activists and other illicit accessing of accounts, but stressed that the problem goes back much further. Some in China… Read more »
As Kyrgyzstan reels from a sustained cyberattack, Danny Bradbury asks whether it was a show of strength from Russia, or whether the perpetrators are closer to home. From guardian.co.uk
Could Twitter become terrorists’ newest killer app? A draft Army intelligence report, making its way through spy circles, thinks the miniature messaging software could be used as an effective tool for coordinating militant attacks. From Wired