background preloader

Internet

Facebook Twitter

Researchers say they can hack an iPhone through the charger. A team of researchers say they've found a way to hack into an iPhone or iPad in less than a minute using a "malicious charger. " Researchers say they can hack Apple mobile devices through the chargerGeorgia Tech team will present findings at Black Hat security conferenceClaim: Malicious charger "Mactans" can hack iOS in less than a minute (CNN) -- Apple devices, from Macs to iPhones, have always been able to boast of advanced safety from viruses, spam and the like. Now, apparently, not even your phone charger is safe. ATM hackers stole $45M in '21st century bank heist,' feds say. NEW YORK – A worldwide gang of criminals stole a total of $45 million in a matter of hours by hacking their way into a database of prepaid debit cards and then draining cash machines around the globe, federal prosecutors said Thursday -- and outmoded U.S. card technology may be partly to blame.

ATM hackers stole $45M in '21st century bank heist,' feds say

Seven people are under arrest in the U.S. in connection with the case, which prosecutors said involved thousands of thefts from ATMs using bogus magnetic swipe cards carrying information from Middle Eastern banks. The fraudsters moved with astounding speed to loot financial institutions around the world, working in cells including one in New York, Brooklyn U.S. China Internet, Telecommunications and Market Report. Whitepaper: China Internet Statistics.

Problem: Phishing and Malware. Your reputation, brand and customers are under constant—and continuously evolving—Internet-based attacks, including fraud, credential stealing, financial theft, data breaches and APT threats such as DOS and zero day attacks.

Problem: Phishing and Malware

Our ActiveTrust Mitigation service provides a fast, thorough, hands-on response to these threats, with both site takedowns and the managed removal of fraudulent content. We’re very experienced at driving quick resolutions. Our Security Incident Response Team (SIRT) initiates and oversees takedowns for significant Internet-based threats, such as phishing, malware distribution, malware controllers, parasites and stolen data distributors. The SIRT detects and mitigates threats around the clock, with over 150 dedicated analyst hours across every 24-hour day, including weekends and holidays—which equates to six analysts working every minute, every day of the year. Hundreds of thousands may lose Internet in July.

DNS Changer virus threat passes; no significant outages. The threat posed by DNS Changer, the headline-grabbing Internet doomsday virus, has fizzled.

DNS Changer virus threat passes; no significant outages

But tech security analysts warn that there are even more sinister viruses around. No significant outages were reported on Monday as the FBI removed a safety net erected last November to protect some 577,000 Windows PCs. Without the FBI's safety net, those PCs would have been cut off from accessing the Web, as authorities moved to dismantle the rogue servers that criminals were using to control DNS Changer-infected machines. Problem: DNS Hijacking. Stat — Egyptian Internet Outage. Egypt falls off the Internet. Coupure de l'Internet en Égypte. Première rédaction de cet article le 28 janvier 2011Dernière mise à jour le 2 février 2011.

Coupure de l'Internet en Égypte

L'Egypte coupée d'Internet. What The Trend: Week In Review. Future - Technology - The decaying web and our disappearing history. Our online history is disappearing at an astonishing rate, creating a black hole for future historians.

Future - Technology - The decaying web and our disappearing history

On January 28 2011, three days into the fierce protests that would eventually oust the Egyptian president Hosni Mubarak, a Twitter user called Farrah posted a link to a picture that supposedly showed an armed man as he ran on a “rooftop during clashes between police and protesters in Suez”. I say supposedly, because both the tweet and the picture it linked to no longer exist. Instead they have been replaced with error messages that claim the message – and its contents – “doesn’t exist”. The Twitter Underground Economy: A Blooming Business. – A study on Dealers, Abusers and fake Twitter Accounts by Jason Ding, Research Scientist Many people dream of becoming popular or famous, and Twitter provides an outlet to make this possible.

The Twitter Underground Economy: A Blooming Business

The Underground Economy of Buying Twitter Followers: Dealers, Abusers & Fake Accounts. Barracuda Labs Social Networking Analysis: Facebook User Profiles - Real People vs. Fake Profiles. Revealed: The Internet's Biggest Security Hole. Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.

Revealed: The Internet's Biggest Security Hole

The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination. The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet’s core protocols. Those protocols were largely developed in the 1970s with the assumption that every node on the then-nascent network would be trustworthy. Problem: BGP Risks. Troubleshooting When BGP Routes Are Not Advertised  [IP Routing. Control of the Internet - ScenarioThinking. Greg's Cable Map. Global Bandwidth Research Service. TeleGeography’s Global Bandwidth Research Service is the world’s most comprehensive and authoritative source of data and analysis for long-haul networks and the undersea cable market.

Global Bandwidth Research Service

Content Highlights In-depth analysis of network operators, supply, demand, costs, and wholesale prices 330 carrier network profiles 266 submarine system profiles Quarterly updates on network deployments, upgrades, acquisitions, and planned submarine cables Searchable database of carrier networks and undersea cables Supply & Demand. 拙著「インターネットのカタチ - もろさが織り成す粘り強い世界 -」の目次. ぜい弱性に揺らぐインターネット - 実は多発しているインターネット・インフラを狙う攻撃. 「インターネットはインフラか」と問われたら、多くの人は「イエス」と答えるだろう。

ぜい弱性に揺らぐインターネット - 実は多発しているインターネット・インフラを狙う攻撃

総務省の呼びかけを受けて2009年2月下旬に設立される予定のインターネット・リテラシ普及団体「安心ネットづくり」促進協議会の概要には次のように書かれている。 「インターネットは、国民の社会活動、文化活動、経済活動等あらゆる活動の基盤(社会的インフラ)として利用されるようになり、国民生活に必要不可欠な存在となってきている」──。 だが、実体を知る人は全く異なる見方をする。 日本レジストリサービス(JPRS)技術戦略室の民田雅人氏は、「昔のインターネットの信頼性は“たまに落ちるのは当たり前”というレベルだった」という。 元々インターネットはシンプルさと柔軟性を身上に設計されている。 こうした良くも悪くも“ゆるい”仕様のおかげで、インターネット上には様々なサービスが発展することになった。 DNSの新たなぜい弱性が顕在化 ここ1年を振り返っても、インターネットの足下がぐらつく事件が多発している。

技術的視点で迫るエジプトのインターネット遮断(2/2) おがわ あきみち 2011/3/11.

技術的視点で迫るエジプトのインターネット遮断(2/2)

きずな (人工衛星)