Myth of Firewall
This article by Global Voices’ Caucasus editor was originally published on 9 March 2011 by Transitions Online and is used by permission.
The HBGary Federal breach conducted by the rogue movement Anonymous, and the subsequent release of tens-of-thousands of company emails, revealed multiple instances of ethically questionable proposals for covert operations. HBGary Federal, Palantir Technologies and Berico Technologies were involved in developing WikiLeaks counter-operations strategies for Bank of America and proposed disinformation campaigns, cyber attacks against network systems, and strong-arming journalists.
A group of House Democrats is calling on Republican leaders to investigate a prominent Washington law firm and three federal technology contractors, who have been shown in hacked e-mails discussing a "disinformation campaign " against foes of the U.S.
NEW YORK (Reuters) - Morgan Stanley experienced a "very sensitive" break-in to its network by the same China-based hackers who attacked Google Inc's computers more than a year ago, Bloomberg reported, citing leaked emails from an Internet security company. The emails from the Sacramento, California-based computer security firm HBGary Inc said that Morgan Stanley -- the first financial institution identified in the series of attacks -- considered details of the intrusion a closely guarded secret, the report said. Bloomberg quoted Phil Wallisch, a senior security engineer at HBGary, as saying that he read an internal Morgan Stanley report detailing the so-called Aurora attacks.
February 16, 2011, 9:39 AM — Benjamin Spock de Vries would like the world to know he is not a cyber terrorist.
The tendency to relate past events to what is possible in the present becomes more difficult as the scope of the geopolitical environment changes.
16 February 2011 Last updated at 18:33 GMT
Session Start: Mon Feb 07 03:17:59 2011
It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year. When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating.
by Israel G. Lugo, Don Parker In http://www.securityfocus.com/infocus/1839 ">part one of this article series we looked at how a personal firewall actually works and where it taps into the network stack to do its filtering. In part two we look at how easily the firewall's operation can be circumvented by inserting a malicious Trojan into the network stack itself. Fooling the firewall: LSP Trojan over port 80
by Israel G. Lugo, Don Parker The concept of a firewall still brings to mind the picture of an impenetrable brick wall, the unsurpassable magic protector of all that is good. The bold statements made by today's security vendors only emphasize this, with claims of complete and automatic security, with a wall able to block all perils dead in their tracks using logic that perhaps didn't exist two years ago. But what if in reality the wall of the firewall is made of straw?