“Military “cyber weaponry” will become commonplace this century, but it will be unlikely to deter attacks by “hacktivists” and criminal gangs, and could easily be used for state-sponsored cyber attacks instead, the Organisation for Economic Co-operation and Development warns.
The British authors of the study, which is released today, also caution that “lurid language” and lobbying by technology firms distort the government’s plans to protect Britain against cyber attacks.
In response to other hacking attacks from groups inside China and Russia, military preparations have begun to gather pace, the study says. But it also warns: “It is not too difficult for nation states to set up covert cyber attack units. Any agency that researches, for defensive purposes, the nature of cyber attacks has all the knowledge needed to originate attacks, and disguise the fact they are doing so”.”
From The Guardian
Posts tagged “Activism”
“The furor surrounding Wikileaks has raised questions about the true limits of free speech in what is perhaps the most unregulated medium in the world. “Free speech online is under fire, but it has always been under fire to some degree,” said Syracuse University’s Milton Mueller. “What’s new is that governments are developing new institutional mechanisms to control Internet expression.”
In the wake of Cablegate, the massive release of sensitive documents released online by WikiLeaks and the subsequent DDoS (distributed denial of service) attacks by pro- and anti-WikiLeaks factions on each others’ websites, a fact long-known to only a few cognoscenti became public — free speech online is very much endangered.”
“Ireland’s main opposition party’s website has been hacked into by a group which has recently come to prominence for attacks on companies related to the WikiLeaks controversy.
Up to 2,000 people’s personal details were compromised in the attack by the hackers, known as Anonymous, Fine Gael said. The American internet firm ElectionMall, which reported the cyber attack to US authorities, has informed the party that the FBI is now involved in the investigation.”
From The Guardian
Source: Humanitarian Practice Network
Since the publication of the first edition of Good Practice Review 8 on Operational Security Management in Violent Environments a decade ago, the global security environment has changed significantly. New conflict contexts have created new sources of threat to international humanitarian action.
“A team of researchers at Georgia Tech Research Institute is investigating whether passwords are now worthless, given the supercomputer-like performance now available to hackers using standard desktop graphics cards.
“Right now we can confidently say that a seven-character password is hopelessly inadequate – and as GPU power continues to go up every year, the threat will increase.”
“In today’s world passwords are simply not enough to protect sensitive information on their own. In fact, VeriSign research of UK online adults showed that 39% disagree that ‘user name plus password’ is a strong enough security measure.
“A password is only one layer of security, which criminals have proven they are able to bypass – either through brute force as the Georgia Tech researchers have demonstrated, or, often, simply by guessing.””
“DUBAI: India features among the countries where malware spam, or anything that comes with a virus or Trojan attachment urging you to visit an infected website, is the most popular, a new report has said.
According to the McAfee Threats Report, which was simultaneously released here, Colombia, South Korea, Russia and Vietnam are the other countries in this category.
Argentina had the most variety in spam, with 16 different topic areas, ranging from drugs to lonely women to diplomas. Italy came in with the least variety, with just six types of spam, it said.
The report uncovered that malware has reached its highest levels, making the first six months of 2010 the most active half-year ever for total malware production.”
From The Economic Times
Websites were shut down, public servants received threatening phone calls and pornography was plastered across Kevin Rudd’s home page in a major cyber protest against government plans to filter the internet. The government’s Cyber Security Operations Centre discovered the attack was coming on February 5 but was unable to stop the parliament house website going… Read more »
Kenyan citizen journalists and activists are increasingly turning to popular Web 2.0 tools and applications such as wikis, blogs, Facebook, Flickr, Twitter and mashups to organize and share news and information about the post election crisis, chronicle violence, share crisis photos and raise funds to help the needy. From Global Voices Online
What makes someone want to hack into computer networks, and just how much damage could they do to your company? Is there really any such thing as a totally hacker-proof network? Robert Schifreen investigates. From National Computing Centre
New research into the cryptic computer code that spawned a recent global outbreak of the latest Sober worm variant indicates that the most prolific e-mail worm ever launched may be little more than a staging ground for an attempt to revive the Nazi party in Germany From WashingtonPost.com