Google Throws Down the Gauntlet to China - Maybe
A flood of news reports have come out concerning the looming battle between Google and China over intrusions into the accounts of human rights activists ala Ghostnet.To add to the confusion are almost...
View ArticleAttempted Cyberattack on Law Firm that Sued China
The U.S. law firm Gipson Hoffman & Pancione has received email with malicious code they belive originated from China. Gipson Hoffman & Pancione is the firm representing Solid Oak Software Inc.,...
View ArticleIndian National Security Advisor Believes Cyber Attacks Originated from China
MK Narayanan, India's National Security Adviser, has reported that his office was subjected to attempted cyber attacks from malicious code contained in PDF files sent in emails. The attacks occurred on...
View ArticleAttack on London Based Jewish Website
The London based Jewish Chronicle's website was defaced with anti-Semitic and pro-Palestinian messages:"In a message posted in English and Turkish, a group calling itself the "Palestinian Mujaheeds"...
View ArticleAnalyzing the Google Attacks - Plenty of Room for Mistakes
SecureWorks has posted an analysis of the malicious code alleged to have been used to attack Google and other companies, collectively referred to as "Operation Aurora". SecureWorks' posting is one of...
View ArticleWide Ranging Espionage by China in Britian
The Sunday Times reports on a leaked MI5 memo warning UK companies of extensive espionage by China including both traditional means and cyber attacks.The targets are described as:"UK defence, energy,...
View ArticleUS Faces "Significant" Threat from Cyber Espionage
John Brennan, Deputy National Security Adviser for Homeland Security and Counterterrorism, stated during a television interview that the United States faced a "serious and significant" threat from...
View ArticleHacktivists Attack Australian Government Systems
A hacktivist group call "Anonymous" is claiming responsibility for Distributed Denial-of-Service attacks against government systems in Australia. The attacks are a protest against proposed filtering of...
View ArticleIn a Cyberwar, US Would Lose
The U.S. Senate heard testimony from "industry experts" warning of catastrophic consequences from cyber war attacks - including pronouncements that the "government faces the prospect of losing in an...
View ArticlePolitical Motivation Behind Google Ruling in Italy?
The New York Times suggests the recent Italian court ruling that Google executives are criminally responsible for offensive Internet content may have a broader political motivation and that the ruling...
View ArticleGermany Suspends Communication Data Retention Law
Citing security and transparency concerns, the German Federal Constitution Court has suspended the law requiring communication providers and ISPs to retain traffic information for six months for use by...
View ArticleNATO Facing Increased Cyber Threats
NATO's Secretary-General commented at a NATO seminar in Finland that the alliance needs to increase defenses against cyber threats. While not releasing any details it appears NATO is concerned about a...
View ArticlePolitical Cyber Crimes Growing
The increasing nature of politically motivated computer crime is the subject of a recent article discussing how companies focus on profit motivated cyber crime while ignoring other threats. The author...
View ArticleLaw Firms Increasingly the Victims of Espionage
Law firms are one of the latest targets of alleged cyber espionage from China and others interested in obtaining information on clients or litigation that involve their interests:"Law firms are...
View ArticleReport: Internet Controls Violate Human Rights
The U.S. Department of State's 2009 Human Rights Report highlights Internet censorship as a major human rights concern. The report's introduction included cyber monitoring and controls resulting in...
View ArticleIncreasing Use of the Internet by Terrorist Groups
The LA Times reports on the extensive and effective use of the Internet by traditional terrorist organizations:"From charismatic clerics who spout hate online, to thousands of extremist websites, chat...
View ArticleU.K. Internet Cafes Asked to Monitor Web Usage for Terrorism
After several terrorism related convictions in the U.K. where suspects were believed to have used Internet cafes, police are seeking cooperation for the cafe owners:"The new initiative involves getting...
View ArticleFine Line between Criminal Activity and National Security
NPR ran a lengthy report on cyber war centered around last month's congressional testimony by the Director of National Intelligence Dennis Blair citing cyber attacks as a top threat to U.S....
View ArticleNorth Korea Develops Its Own Operating System Aimed at User Monitoring
South Korea's Science and Technology Policy Institute has released information concerning a homegrown operating system developed by North Korea called Red Star. It appears to be based on Linux and...
View ArticleRecommended Reading: Shadows in the Cloud
In a followup to the "Tracking GhostNet" report, a new analysis of attacks against Tibetan and Indian cyber targets has been released titled "Shadows in the Cloud: Investigating Cyber Espionage 2.0". I...
View ArticleIncreased Espionage against US Defense Contractors
The Counterintelligence Directorate of the U.S. Defense Security Office recently released a report on espionage against the U.S. defense industry. The study identified four broad methods of information...
View ArticleApplying International Law to Cyber Space
How well can existing international law map to cyber space? A recent article in The Legal Intelligencer looks at the legal concept of a "duty to assist" and how it might apply in...
View ArticleNorth Korea Not Believed to Be Responible for 2009 Attacks
A series of attacks targeting U.S. government and South Korean web sites during early July of 2009 were initially blamed on North Korea:"In the days after the fast-moving, widespread attack, analysis...
View ArticleRecommended: Internet Use in Ukraine's Orange Revolution
Researchers Volodymyr Lysenko and Kevin Desouza have published an analysis of the effect and use of technology in Ukraine's Orange Revolution. The report provides an extensive review of the development...
View ArticleCyber Terrorism
I was recently requested to write an opinion piece for the Czech Republic's Prague Post on cyber terrorism:"The risk is real for a malicious and intentional disruption of basic infrastructure but,...
View Article
More Pages to Explore .....