background preloader

Cyber Weapons: The New Arms Race

Cyber Weapons: The New Arms Race
In the early morning hours of May 24, an armed burglar wearing a ski mask broke into the offices of Nicira Networks, a Silicon Valley startup housed in one of the countless nondescript buildings along Highway 101. He walked past desks littered with laptops and headed straight toward the cubicle of one of the company’s top engineers. The assailant appeared to know exactly what he wanted, which was a bulky computer that stored Nicira’s source code. He grabbed the one machine and fled. The whole operation lasted five minutes, according to video captured on an employee’s webcam. Palo Alto Police Sergeant Dave Flohr describes the burglary as a run-of-the-mill Silicon Valley computer grab. Intellectual-property theft is hardly unheard of in Silicon Valley. Those familiar with the burglary refuse to talk about it on the record, citing orders handed down by the federal investigators. Cyber attacks used to be kept quiet. Stuxnet set Iran’s nuclear program back months. Christopher J. Related:  Cilvēks un tehnika

Latest Hacks Could Set The Stage For Cyberwar In March, unidentified hackers penetrated RSA, a top U.S. cybersecurity company, and stole complex security codes. At the same time, intruders broke into Google's Gmail system and stole passwords, enabling them to potentially gain access to sensitive facilities or information. hide captionIn some cases, hackers may be seeking to gain access to a company's computer network simply to have it as a base of operations during a future conflict. iStockphoto.com In some cases, hackers may be seeking to gain access to a company's computer network simply to have it as a base of operations during a future conflict. Cybersecurity experts say these recent intrusions are the most sophisticated hacking efforts ever perpetrated against private computer networks. "I think what we're seeing today are the reconnaissance activities of cyberwar," said Herbert Thompson, who teaches cybersecurity at Columbia University. 'Small, Subtle Battles' Cybercrime Versus Cyberwar

Augmented Reality: Past, Present and Future - TNW Industry You may have heard about augmented reality before. If you haven’t, you’ll be hearing a lot about it from now on, with the smartphone and tablet revolution now in full-swing. Augmented reality (AR) is a term used to describe a live view of a physical, real-world environment that is augmented by computer-generated sensory input, such as sound or graphics. AR is not to be confused with virtual reality (VR), which is an entirely digital experience that mimics real-world situations. There have been countless notable examples lately of augmented reality in action. Just last month we wrote about Blippar, the augmented reality app that brings brands to life – both the iOS and Android apps are due out soon, but here’s a video of the app in action: That’s augmented reality in a nutshell. So without any further ado, here’s a look at augmented reality: past, present and future. Augmented reality: the past As with many technologies, hitting a definitive moment when augmented reality was born isn’t easy.

Hacker Attack Disrupts Al-Qaeda Communications UPDATE: Analysis of the attack available here: The Game of Whack-A-Mole: Was Al-Shamukh Hacked? Reports are circulating that indicate unidentified hackers have caused a major disruption to online communications channels used by the terrorist organization Al-Qaeda. Flashpoint Partners' Evan Kohlmann, whose research was key to NBC news breaking the story, said the online terrorist forum was not merely compromised or defaced, but had actually been "wiped clean". “Al-Qaeda's online communications have been temporarily crippled, and it does not have a single trusted distribution channel available on the Internet," said Kohlmann. Kohlmann indicated that the attackers used “relatively sophisticated techniques” and that the network will probably take several days to return to an operational state. "Al-Qaeda the brand name just lost its broadcast channel. “Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI.

The US is not at cyberwar | Tim Stevens Last week, the Obama administration's most senior official with responsibility for the internet and cyberspace made a significant intervention in the increasingly hysterical US debate over cyberwar. Since Google announced in January that it had been the victim of a series of cyber attacks originating in China, the prospect of imminent threat from foreign states and terrorists has been repeated time and again by senior figures in the security establishment. Now, the man who is charged with shaping US policy in this field has shown that he at least will not be a vehicle for hyperbolic rhetoric and scaremongering. On Wednesday, Howard Schmidt, appointed by President Obama in December 2009 to co-ordinate the development and delivery of national cybersecurity policy, stated baldly that the US is not in the midst of a cyberwar. In a national op-ed, McConnell claimed that the US is fighting a cyberwar today, one it is losing.

What the Ultra-Personalized Internet Is Hiding from You - Technology In the spring of 2010, while the remains of the Deepwater Horizon oil rig were spewing crude oil into the Gulf of Mexico, I asked two friends to google "BP." They're pretty similar—educated, white, left-leaning women who live in the Northeast. But the results they saw were quite different. One of my friends saw investment information about BP. The other saw news. Most of us assume that when we google a term, we all see the same results—the ones that the company's famous PageRank algorithm suggests are the most authoritative based on other pages' links. With Google personalized for everyone, the query "stem cells" might produce diametrically opposed results for scientists who support stem cell research and activists who oppose it. For a time, it seemed that the Internet was going to redemocratize society. And its not just Google. All of this personalization isn't just shaping what we buy. Want to stop your browser from tracking your clicks?

Sorry, but the TDL botnet is not 'indestructible' | Malware The sophistication of the TDL rootkit and the global expanse of its botnet have many observers worried about the antimalware industry's ability to respond. Clearly, the TDL malware family is designed to be difficult to detect and remove. Several respected security researchers have gone so far as to say that the TDL botnet, composed of millions of TDL-infected PCs, is "practically indestructible." As a 24-year veteran of the malware wars, I can safely tell you that no threat has appeared that the antimalware industry and OS vendors did not successfully respond to. It may take months or years to kill off something, but eventually the good guys get it right. With each ratcheting iteration of new malware offense, you had analysts and doomsayers predicting this or that particular malware program would be difficult to impossible to defend against. Even today's malware masterpiece, Stuxnet -- as perfect as it is for its intended military job -- could be neutralized if it became superpopular.

Franz-Stefan Gady: From the Middle Ages to the Cyber Age: Non-State Actors In a new study by the EastWest Institute (EWI) entitled "Working towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace," one of the recommendations addresses the issue of non-state actors in cyberspace. The report states, "Russia, the U.S., and other interested parties should assess how best to accommodate Convention principles with the new reality that cyber warriors may be non-state actors." This assessment on non-state actors indeed has not just surfaced in relation to cyberspace. The increasing importance of non-state actors is evident in all spheres of international relations. Many books and studies have been written on the erosion of the current state paradigm, the Westphalia System, such as Martin van Creveld's book The State: Its Rise and Decline in which he argues that the decline of the Westphalia system may have started as early as 1945. The legal frameworks based on the Westphalia system, however, appear inadequate.

The 7 Best YouTube Channels To Watch For Photoshop Video Tutorials The “best” part of the above title is pretty much relative, because it’s just the way I look at Photoshop and the video tutorials I am going to link to here. Before that, here’s a question. How do you prefer to learn graphic designing and Photoshop? Is it through text and screenshot based tutorials or through video lessons which seems more direct and natural? If this article is about the best YouTube channels on Photoshop, then we have loads of other resources for you too. That said and done lets head towards YouTube and some Photoshop study. Adobe Photoshop Channel Let’s start with Adobe’s own official Photoshop channel on YouTube. IceflowStudios Photoshop Video Training It is definitely one of the more across the board Photoshop CS5 tutorial channels on YouTube. Photoshopmama’s OPD OPD stands for Obsessive Photoshop Disorder and you should have it too if you are a keen Photoshop learner. TutorVid Gavin Hoey Photo Videos Pixel For Life Creative Sweet TV That’s not the end of it all of course.

Security researchers discover 'indestructible' botnet 30 June 2011Last updated at 11:34 Cracking the TDL-4 botnet is going to be hard, say security experts. More than four million PCs have been enrolled in a botnet security experts say is almost "indestructible". The botnet, known as TDL, targets Windows PCs and is difficult to detect and shut down. Code that hijacks a PC hides in places security software rarely looks and the botnet is controlled using custom-made encryption. Security researchers said recent botnet shutdowns had made TDL's controllers harden it against investigation. The 4.5 million PCs have become victims over the last three months following the appearance of the fourth version of the TDL virus. The changes introduced in TDL-4 made it the "most sophisticated threat today," wrote Kaspersky Labs security researchers Sergey Golovanov and Igor Soumenkov in a detailed analysis of the virus. A botnet is a network of computers that have been infected by a virus that allows a hi-tech criminal to use them remotely.

Aki Peritz: Declaring War on Cyber Metaphors Top men tell us that dark forces -- China, Russia, criminal elements, spies, terrorists, and hackers -- are burrowing deep into America's digital infrastructure, looking to exploit weaknesses, wreck security and cause mayhem. Last month, CIA Director Leon Panetta testified to Congress that "the potential for the next Pearl Harbor could very well be a cyber-attack," adding to a list of terrifying analogies used to describe the cyber peril, "Cyber 9/11" and "Cyber Armageddon" among them. And the future looks bleak. As former Director of National Intelligence (DNI) Michael McConnell wrote a year ago, "The United States is fighting a cyber-war today, and we are losing. It's that simple." These are smart individuals with weighty responsibilities, but with respect to the threat from cyberspace, they are also crummy rhetoricians. Abusing analogies in the service of advocacy understates the impact of real life-or-death situations.

Gilbert Simondon et la libération par les techniques Sur la technique, Gilbert Simondon Qu’est-ce qu’un objet technique? Il est de saine méthode, lorsqu’on entreprend de définir un mot, de ne pas introduire dans la définition le terme à définir, ni de renvoyer, du moins pas immédiatement, à un contexte particulier d’actions ou à un réseau de circonstances. publicité En l’occurrence, ce serait bien mal définir une horloge que de dire: une horloge n’est rien d’autre que ce qui se trouve suspendue dans ma cuisine et que vous verrez si vous voulez bien venir y jeter un œil. 1. au mécanisme des engrenages, au dispositif des aiguilles2. à la finalité de cet objet. Or, touchant le premier, il n’est pas du tout sûr que ce soit un bon choix que s’appuyer sur la nature du mécanisme en jeu (ici: un mécanisme par engrenages) pour définir un objet technique: il n’y a aucun engrenage dans une horloge atomique à hydrogène, et pourtant il s’agit bien d’une horloge, et même d’une horloge autrement plus précise qu’une horloge mécanique. De quoi s’agit-il?

Chinese Military Slips Up And Broadcasts Cyberwar Campaign Against U.S. Targets

Related: