background preloader

Cyber Weapons: The New Arms Race

Cyber Weapons: The New Arms Race
In the early morning hours of May 24, an armed burglar wearing a ski mask broke into the offices of Nicira Networks, a Silicon Valley startup housed in one of the countless nondescript buildings along Highway 101. He walked past desks littered with laptops and headed straight toward the cubicle of one of the company’s top engineers. The assailant appeared to know exactly what he wanted, which was a bulky computer that stored Nicira’s source code. He grabbed the one machine and fled. The whole operation lasted five minutes, according to video captured on an employee’s webcam. Palo Alto Police Sergeant Dave Flohr describes the burglary as a run-of-the-mill Silicon Valley computer grab. Intellectual-property theft is hardly unheard of in Silicon Valley. Those familiar with the burglary refuse to talk about it on the record, citing orders handed down by the federal investigators. Cyber attacks used to be kept quiet. Stuxnet set Iran’s nuclear program back months. Christopher J.

http://www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html

Related:  Cilvēks un tehnika

Augmented Reality: Past, Present and Future - TNW Industry You may have heard about augmented reality before. If you haven’t, you’ll be hearing a lot about it from now on, with the smartphone and tablet revolution now in full-swing. Augmented reality (AR) is a term used to describe a live view of a physical, real-world environment that is augmented by computer-generated sensory input, such as sound or graphics. A typical AR environment has digital information transposed onto a real-world view.

Latest Hacks Could Set The Stage For Cyberwar In March, unidentified hackers penetrated RSA, a top U.S. cybersecurity company, and stole complex security codes. At the same time, intruders broke into Google's Gmail system and stole passwords, enabling them to potentially gain access to sensitive facilities or information. hide captionIn some cases, hackers may be seeking to gain access to a company's computer network simply to have it as a base of operations during a future conflict.

Behind the CIA's Secret Somalia Operations To Our Faithful Current.com Users: Current's run has ended after eight exciting years on air and online. The Current TV staff has appreciated your interest, support, participation and unflagging loyalty over the years. Your contributions helped make Current.com a vibrant place for discussing thousands of interesting stories, and your continued viewership motivated us to keep innovating and find new ways to reflect the voice of the people. Hacker Attack Disrupts Al-Qaeda Communications UPDATE: Analysis of the attack available here: The Game of Whack-A-Mole: Was Al-Shamukh Hacked? Reports are circulating that indicate unidentified hackers have caused a major disruption to online communications channels used by the terrorist organization Al-Qaeda. Flashpoint Partners' Evan Kohlmann, whose research was key to NBC news breaking the story, said the online terrorist forum was not merely compromised or defaced, but had actually been "wiped clean". “Al-Qaeda's online communications have been temporarily crippled, and it does not have a single trusted distribution channel available on the Internet," said Kohlmann. Kohlmann indicated that the attackers used “relatively sophisticated techniques” and that the network will probably take several days to return to an operational state. "Al-Qaeda the brand name just lost its broadcast channel.

What the Ultra-Personalized Internet Is Hiding from You - Technology In the spring of 2010, while the remains of the Deepwater Horizon oil rig were spewing crude oil into the Gulf of Mexico, I asked two friends to google "BP." They're pretty similar—educated, white, left-leaning women who live in the Northeast. But the results they saw were quite different. One of my friends saw investment information about BP. The other saw news. For one, the first page of results contained links about the oil spill; for the other, there was nothing about it except for a promotional ad from BP. The US is not at cyberwar Last week, the Obama administration's most senior official with responsibility for the internet and cyberspace made a significant intervention in the increasingly hysterical US debate over cyberwar. Since Google announced in January that it had been the victim of a series of cyber attacks originating in China, the prospect of imminent threat from foreign states and terrorists has been repeated time and again by senior figures in the security establishment. Now, the man who is charged with shaping US policy in this field has shown that he at least will not be a vehicle for hyperbolic rhetoric and scaremongering. On Wednesday, Howard Schmidt, appointed by President Obama in December 2009 to co-ordinate the development and delivery of national cybersecurity policy, stated baldly that the US is not in the midst of a cyberwar. In a national op-ed, McConnell claimed that the US is fighting a cyberwar today, one it is losing.

Pentagon Set To Track Social Media Doubt the power of social media? The Pentagon doesn’t. A new project from the Defense Advanced Research Projects Agency focuses on social media tracking. It’s possible you haven’t heard of The Defense Advanced Research Projects Agency (DARPA). They are a secretive agency within the United States Department of Defense whose “mission is to maintain the technological superiority of the U.S. military and prevent technological surprise from harming our national security by sponsoring revolutionary, high-payoff research bridging the gap between fundamental discoveries and their military use.”

Sorry, but the TDL botnet is not 'indestructible' The sophistication of the TDL rootkit and the global expanse of its botnet have many observers worried about the antimalware industry's ability to respond. Clearly, the TDL malware family is designed to be difficult to detect and remove. Several respected security researchers have gone so far as to say that the TDL botnet, composed of millions of TDL-infected PCs, is "practically indestructible." As a 24-year veteran of the malware wars, I can safely tell you that no threat has appeared that the antimalware industry and OS vendors did not successfully respond to. It may take months or years to kill off something, but eventually the good guys get it right. With each ratcheting iteration of new malware offense, you had analysts and doomsayers predicting this or that particular malware program would be difficult to impossible to defend against.

The big list of free Kindle tools There are quite a few programs and web services that can be really useful to Kindle owners. This post compiles 17 of these that every Kindle user should know about, ranging from eBook conversion programs to services that can broadcast your favorite websites to your Kindle. Note that many of the tools listed here aren’t strictly Kindle specific, but can be very useful to anyone who has a Kindle or any other eBook reading device, such as PDF cropping tools and eBook conversion apps, etc. Areas covered include ‘eBook Reading Tools’, ‘General eBook Conversion’ , ‘PDF to Kindle Conversion’, ‘Organizing files on your Kindle’, and ‘Sending web content to your Kindle’. eBook Reading Tools:

Franz-Stefan Gady: From the Middle Ages to the Cyber Age: Non-State Actors In a new study by the EastWest Institute (EWI) entitled "Working towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace," one of the recommendations addresses the issue of non-state actors in cyberspace. The report states, "Russia, the U.S., and other interested parties should assess how best to accommodate Convention principles with the new reality that cyber warriors may be non-state actors." This assessment on non-state actors indeed has not just surfaced in relation to cyberspace. The increasing importance of non-state actors is evident in all spheres of international relations. Many books and studies have been written on the erosion of the current state paradigm, the Westphalia System, such as Martin van Creveld's book The State: Its Rise and Decline in which he argues that the decline of the Westphalia system may have started as early as 1945. His verdict is:

If an Agent Knocks: Federal Investigators and Your Rights by the Feature Picture by Maddy Miller People opposing U.S. policies in Central America, giving sanctuary to refugees from Guatemala and El Salvador, struggling for Black liberation, and against nuclear weapons, are today more than ever likely to receive visits from FBI agents or other federal investigators. Increasingly, agents are also visiting the familist, friends, and employers of these activists. This pamphlet is designed to answer the most frequent questions asked by people and groups experiencing government scrutiny, and to help them develop practical responses. Security researchers discover 'indestructible' botnet 30 June 2011Last updated at 11:34 Cracking the TDL-4 botnet is going to be hard, say security experts. More than four million PCs have been enrolled in a botnet security experts say is almost "indestructible". The botnet, known as TDL, targets Windows PCs and is difficult to detect and shut down.

Related: