Weekend Reading
ID thieves offer free translation
As cyber crime goes mainstream, a working knowledge of English is no longer a required skill for identity thieves trafficking in stolen credit card numbers and other personal data. Just ask Matthew Miller, a pharmacist from Pennsylvania, who recently learned miscreants had translated some of his personal details into French before blasting them out to a discussion group frequented by online con artists.
Take a look HERE.
==================================================================
Hackers to cause traffic chaos
Starting in 2009, police may be able to stop vehicles in their tracks with a simple phone call. The technology would come as part of something that most of us are already familiar with: General Motors' OnStar system. GM and OnStar demoed a prototype today of the new feature, called Stolen Vehicle Slowdown, which will be targeted at... well, stolen vehicles on the road.
Take a look HERE.
==================================================================
Goverment web sites invaded by smut and spyware
A slew of government organisations and corporations are unwittingly helping hackers promote porn sites. Targets as diverse as the Marin County Transportation Authority website in California and the Bank of Ghana have been unwittingly playing host to code that redirects surfers to smut as a result of insecure systems.
Take a look HERE.
==================================================================
Audio forensics experts reveal (some) secrets
Typically, audio forensic examiners are asked to authenticate recordings presented as evidence in criminal and civil court cases, such as undercover surveillance tapes made by the police, recordings presented by feuding parties in a divorce, or tapes from corporations seeking to prove employee wrongdoing or industrial espionage.
Some audio forensic examiners go to extraordinary lengths to validate recordings.
Take a look HERE.
==================================================================
Building Honeypots for Industrial Networks
Objectives : The short-term goal of the project is to determine the feasibility of building a software-based framework to simulate a variety of industrial networks such as SCADA, DCS, and PLC architectures. We plan to document the requirements and release proof of concept code (in the form of honeyd scripts) so that a single Linux host can simulate multiple industrial devices and complex network topologies.
Take a look HERE.
==================================================================
Of hackers and ego
The world of computer security can often be a strange and compelling one. Many outsiders, or those with little knowledge of computers, just don’t understand the whole uproar over various issues, such as whether Microsoft Vista is more secure then Linux or Mac. It’s all moot as far as the general population is concerned. But, for those of us who work in the industry, it is just more grist for the mill.
Take a look HERE.
==================================================================
More localized malware
Relative to the country’s size, it’s rather surprising that South Australia (SA) is ranked 26th in the world with regard to the amount of command-and-control servers it hosts. This fact is surely concerning, for it shows that SA is either extensively used by overseas attackers, or there has been an obvious increase in local bot masters.
[I did not realise that I lived in a crime capital] Take a look HERE.
==================================================================
Security: whacking hackers
In a single case this summer, an attack by hackers disabled a reported 1,500 Pentagon computers. And the siege is continuing. The Defense Department detects 3 million unauthorized "scans"—or attempts by would-be intruders to access official networks—on its computers every day, according to a Pentagon spokesman. Now the Bush administration, worried particularly about computer attacks from China, is aiming to beef up American defenses. According to officials in the cybersecurity industry, who like several sources quoted in this article did not want to be named discussing confidential programs, the White House is quietly preparing a major "cyberdefense" initiative to be announced later this year.
Read the article HERE.
==================================================================
What it's Like to Switch to Ubuntu
When Dell first announced that it would offer Ubuntu--a free open-source, Linux-based operating system--on select notebooks, millions of tech-heads unleashed victory cries. Linux, the longtime OS of choice for the hardcore techie, was poised to go mainstream. Finally, a larger worldwide audience would experience Linux and the "it just works" nature of Ubuntu, but we at LAPTOP had to ask: Is Ubuntu ready for the world?
Read the article HERE.
==================================================================
Internet gets first full census for 25 years
An electronic census of the internet's 2.8 billion addresses has been completed by US researchers. It is the first attempt to contact every web address since 1982 – the results could help tackle the problem of the supply of unique internet addresses running out.
Take a look HERE.
As cyber crime goes mainstream, a working knowledge of English is no longer a required skill for identity thieves trafficking in stolen credit card numbers and other personal data. Just ask Matthew Miller, a pharmacist from Pennsylvania, who recently learned miscreants had translated some of his personal details into French before blasting them out to a discussion group frequented by online con artists.
Take a look HERE.
==================================================================
Hackers to cause traffic chaos
Starting in 2009, police may be able to stop vehicles in their tracks with a simple phone call. The technology would come as part of something that most of us are already familiar with: General Motors' OnStar system. GM and OnStar demoed a prototype today of the new feature, called Stolen Vehicle Slowdown, which will be targeted at... well, stolen vehicles on the road.
Take a look HERE.
==================================================================
Goverment web sites invaded by smut and spyware
A slew of government organisations and corporations are unwittingly helping hackers promote porn sites. Targets as diverse as the Marin County Transportation Authority website in California and the Bank of Ghana have been unwittingly playing host to code that redirects surfers to smut as a result of insecure systems.
Take a look HERE.
==================================================================
Audio forensics experts reveal (some) secrets
Typically, audio forensic examiners are asked to authenticate recordings presented as evidence in criminal and civil court cases, such as undercover surveillance tapes made by the police, recordings presented by feuding parties in a divorce, or tapes from corporations seeking to prove employee wrongdoing or industrial espionage.
Some audio forensic examiners go to extraordinary lengths to validate recordings.
Take a look HERE.
==================================================================
Building Honeypots for Industrial Networks
Objectives : The short-term goal of the project is to determine the feasibility of building a software-based framework to simulate a variety of industrial networks such as SCADA, DCS, and PLC architectures. We plan to document the requirements and release proof of concept code (in the form of honeyd scripts) so that a single Linux host can simulate multiple industrial devices and complex network topologies.
Take a look HERE.
==================================================================
Of hackers and ego
The world of computer security can often be a strange and compelling one. Many outsiders, or those with little knowledge of computers, just don’t understand the whole uproar over various issues, such as whether Microsoft Vista is more secure then Linux or Mac. It’s all moot as far as the general population is concerned. But, for those of us who work in the industry, it is just more grist for the mill.
Take a look HERE.
==================================================================
More localized malware
Relative to the country’s size, it’s rather surprising that South Australia (SA) is ranked 26th in the world with regard to the amount of command-and-control servers it hosts. This fact is surely concerning, for it shows that SA is either extensively used by overseas attackers, or there has been an obvious increase in local bot masters.
[I did not realise that I lived in a crime capital] Take a look HERE.
==================================================================
Security: whacking hackers
In a single case this summer, an attack by hackers disabled a reported 1,500 Pentagon computers. And the siege is continuing. The Defense Department detects 3 million unauthorized "scans"—or attempts by would-be intruders to access official networks—on its computers every day, according to a Pentagon spokesman. Now the Bush administration, worried particularly about computer attacks from China, is aiming to beef up American defenses. According to officials in the cybersecurity industry, who like several sources quoted in this article did not want to be named discussing confidential programs, the White House is quietly preparing a major "cyberdefense" initiative to be announced later this year.
Read the article HERE.
==================================================================
What it's Like to Switch to Ubuntu
When Dell first announced that it would offer Ubuntu--a free open-source, Linux-based operating system--on select notebooks, millions of tech-heads unleashed victory cries. Linux, the longtime OS of choice for the hardcore techie, was poised to go mainstream. Finally, a larger worldwide audience would experience Linux and the "it just works" nature of Ubuntu, but we at LAPTOP had to ask: Is Ubuntu ready for the world?
Read the article HERE.
==================================================================
Internet gets first full census for 25 years
An electronic census of the internet's 2.8 billion addresses has been completed by US researchers. It is the first attempt to contact every web address since 1982 – the results could help tackle the problem of the supply of unique internet addresses running out.
Take a look HERE.
0 Comments:
Post a Comment
<< Home