Cyber Development
132 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by imaginedragon
Scoop.it!

NSA hacked into encrypted UN communications, leaked documents show

NSA hacked into encrypted UN communications, leaked documents show | Cyber Development | Scoop.it
According to Germany’s Der Spiegel, the Americans have tapped the United Nations’ internal videoconferencing system. Meanwhile, the NSA has admitted a few analysts used its systems to spy on their love interests.
imaginedragon's insight:

According to Germany’s Der Spiegel, the Americans have tapped the United Nations’ internal videoconferencing system. Meanwhile, the NSA has admitted a few analysts used its systems to spy on their love interests.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Serious cyberattack on ally could trigger U.S. retaliation under treaty

Serious cyberattack on ally could trigger U.S. retaliation under treaty | Cyber Development | Scoop.it
The United States could carry out its defense obligations under bilateral security treaties if allies including Japan suffer cyberattacks that cause physical damage, former U.S. Undersecretary of Defense for Policy ...
imaginedragon's insight:

The United States could carry out its defense obligations under bilateral security treaties if allies including Japan suffer cyberattacks that cause physical damage, former U.S. Undersecretary of Defense for Policy Michele Flournoy has suggested.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Latest NSA revelations could help pending lawsuits

Latest NSA revelations could help pending lawsuits | Cyber Development | Scoop.it
With court documents showing Constitution violated, public opinion also turning as people see something 'deeply wrong is happening with the NSA'
imaginedragon's insight:

With court documents showing Constitution violated, public opinion also turning as people see something 'deeply wrong is happening with the NSA'

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Trend Micro establishes forensics research lab in S'pore | ZDNet

Trend Micro establishes forensics research lab in S'pore | ZDNet | Cyber Development | Scoop.it
The security vendor has launched TrendLabs in the country, to provide greater support to local customers and support the regional roll out of its latest product which focuses on breach investigation and response.
imaginedragon's insight:

SINGAPORE--Trend Micro has established its malware forensic and analysis capabilities lab, TrendLabs in the country to support the regional product launch of Custom Defense Services.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Guardian lets UK spooks trash 'Snowden files' PCs to make them feel better • The Register

Guardian lets UK spooks trash 'Snowden files' PCs to make them feel better • The Register | Cyber Development | Scoop.it
imaginedragon's insight:

GCHQ spooks reportedly rocked up at The Guardian's London headquarters and oversaw the destruction of some computer hardware - because the machines may have stored copies of documents leaked by whistleblower Edward Snowden.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Britain Faces Furore Over Snowden-linked Detention | SecurityWeek.Com

British authorities faced a furore Monday after they held the partner of a journalist who worked with Edward Snowden to expose US mass surveillance programs for almost nine hours under anti-terror laws.
imaginedragon's insight:

British authorities faced a furore Monday after they held the partner of a journalist who worked with Edward Snowden to expose US mass surveillance programs for almost nine hours under anti-terror laws.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

North Korea creates cyber trolls to fight enemies

North Korea creates cyber trolls to fight enemies | Cyber Development | Scoop.it
LONDON: North Korea has reportedly created a team of 3,000 online trolls to demoralise their enemies and raise the profile of leader Kim Jong-Un. Using identities stolen from South Korea, the...
imaginedragon's insight:

LONDON: North Korea has reportedly created a team of 3,000 online trolls to demoralise their enemies and raise the profile of leader Kim Jong-Un.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Official Tibetan Website Compromised in Watering Hole Attack | SecurityWeek.Com

Official Tibetan Website Compromised in Watering Hole Attack | SecurityWeek.Com | Cyber Development | Scoop.it
Hackers compromised the official site belonging to the Dalai Lama’s government in exile, who injected code that redirected visitors to a Java exploit that drops a malicious backdoor.
imaginedragon's insight:

The website for the Central Tibetan Administration, the official site belonging to the Dalai Lama’s government in exile, was compromised by attackers who injected code that redirected Chinese speaking visitors to a Java exploit that drops a malicious backdoor.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Chinese Hackers Develop Automated Tools to Exploit Apache Struts Vulnerabilities

Chinese Hackers Develop Automated Tools to Exploit Apache Struts Vulnerabilities | Cyber Development | Scoop.it
A few days after Apache released a new version of the Struts application development framework to address a number of vulnerabilities, security resear...
imaginedragon's insight:

A few days after Apache released a new version of the Struts application development framework to address a number of vulnerabilities, security researchers came across automated tools designed to exploit the security holes in question.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

NSA to world+dog: We're only watching 1.6% of Internet, honest • The Register

NSA to world+dog: We're only watching 1.6% of Internet, honest • The Register | Cyber Development | Scoop.it
imaginedragon's insight:

The US's National Security Agency (NSA) has issued a document titled The National Security Agency: Missions, Authorities, Oversight and Partnerships (PDF) that explains some of its operations - and includes a claim it “... touches about 1.6 per cent... “ of daily Internet traffic and “...only 0.025 per cent is actually selected for review”

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

White House Ponders Cyber Security Incentives for Critical Infrastructure Companies | SecurityWeek.Com

White House Ponders Cyber Security Incentives for Critical Infrastructure Companies | SecurityWeek.Com | Cyber Development | Scoop.it
The Obama administration wants to offer a carrot instead of a stick to get critical infrastructure companies to adopt a framework of cybersecurity practices being developed.
imaginedragon's insight:

The federal government is planning to offer critical infrastructure companies incentives to join a voluntary program designed to improve cybersecurity.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

FBI director calls on private sector to help with cyber threat

FBI director calls on private sector to help with cyber threat | Cyber Development | Scoop.it
Calls NSA, CIA essential in finding, deterring "individuals behind keyboards."
imaginedragon's insight:

"I do believe that in the future, the cyber threat will equal or even eclipse the terrorist threat," Mueller said in his opening remarks. "And just as partnerships have enabled us to address the terrorist threat, partnerships will enable us to address the cyber threat. But the array of partners critical to defeating the cyber threat is different. In this case, the private sector is the essential partner."

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Cybersecurity incentive proposals from White House underwhelm | ZDNet

Cybersecurity incentive proposals from White House underwhelm | ZDNet | Cyber Development | Scoop.it
The security of critical infrastructure is clearly important, but don't expect much from the Federal Government's efforts to promote it.
imaginedragon's insight:

The Federal Government's long-term plan to 'do something' about the security of critical national infrastructure reached another milestone today with the floating of some trial balloon proposals for voluntary industry incentives.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

NSA analysts 'wilfully violated' surveillance systems, agency admits

NSA analysts 'wilfully violated' surveillance systems, agency admits | Cyber Development | Scoop.it
NSA acknowledges that one analyst used agency tools to track former spouse but insists it has 'zero tolerance' for abuses
imaginedragon's insight:

The National Security Agency has admitted that some of its analysts deliberately abused its surveillance systems, with one analyst disciplined for using NSA resources to track a former spouse.

The agency said Friday it had found "very rare instances of wilful violations of NSA's authorities" as officials briefed reporters that various agents had used the NSA's controversial data monitoring capabilities to spy on love interests.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Poison Ivy Trojan used in RSA SecurID attack still popular

Poison Ivy Trojan used in RSA SecurID attack still popular | Cyber Development | Scoop.it
Security vendor FireEye releases 'Calamine,' a set of tools to analyze Poison Ivy infections that can steal files and passwords
imaginedragon's insight:

Security vendor FireEye releases 'Calamine,' a set of tools to analyze Poison Ivy infections that can steal files and passwords.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

If public key cryptography were really broken | ZDNet

If public key cryptography were really broken | ZDNet | Cyber Development | Scoop.it
The solution to a mathematical problem generally considered insolvable would doom almost all trust on the Internet. Could it actually happen? We'd better hope not.
imaginedragon's insight:

The asymmetric cryptography on which so much security on the Internet is based relies on one of two mathematical assumptions to work: that it is impossible, other than through brute force, to determine the factors of large integers when those factors are two or more large primes, or (to quote Wikipedia on the subject of Elliptical Curve Cryptography) "… that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point is infeasible".

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Intel bakes super-snooper to stop industrial espionage • The Register

Intel bakes super-snooper to stop industrial espionage • The Register | Cyber Development | Scoop.it
imaginedragon's insight:

Intel has created a Hadoop-based rig that analyses just about every network event in the company – four to six billion of them on business days - in close to real time so it can spot threats including industrial espionage.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Russian Military Creating Cyber Warfare Branch

Russian Military Creating Cyber Warfare Branch | Cyber Development | Scoop.it
A separate branch dedicated to cyber warfare is being created in the Russian Armed Forces as the Internet could become a new “theater of war” in the near future, a senior Russian military R&D official said.
imaginedragon's insight:

A separate branch dedicated to cyber warfare is being created in the Russian Armed Forces as the Internet could become a new “theater of war” in the near future, a senior Russian military R&D official said.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Canada lacks tough defence against cyber threats

Canada lacks tough defence against cyber threats | Cyber Development | Scoop.it
Canada must aggressively deploy its spies and other intelligence capabilities against accelerating cyber threats to the country's vital digital infrastructure, says a leading expert.
imaginedragon's insight:

Canada must aggressively deploy its spies and other intelligence capabilities against accelerating cyber threats to the country's vital digital infrastructure, says a leading expert.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

DHS Awards $6 Billion Cybersecurity Contract to 17 Firms | SecurityWeek.Com

DHS Awards $6 Billion Cybersecurity Contract to 17 Firms | SecurityWeek.Com | Cyber Development | Scoop.it
imaginedragon's insight:

The General Services Administration (GSA) this week announced a contract award that will allow government agencies to partner with the Department of Homeland Security (DHS) to deploy Continuous Diagnostics and Mitigation (CDM) technology that will enhance the security and resilience of their networks.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Frutas RAT Used in Targeted Attacks Against High-Profile Companies in Asia and Europe

Frutas RAT Used in Targeted Attacks Against High-Profile Companies in Asia and Europe | Cyber Development | Scoop.it
Security researchers have come across a cybercriminal campaign targeted at high-profile organizations from Asia and Europe, particularly companies in ...
imaginedragon's insight:

Security researchers have come across a cybercriminal campaign targeted at high-profile organizations from Asia and Europe, particularly companies in the mining, telecoms, finance and government sectors.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Anonymous Italy Leaks Government Emails in Protest Against Sicily MUOS

Anonymous Italy Leaks Government Emails in Protest Against Sicily MUOS | Cyber Development | Scoop.it
Many Italians oppose the construction of a US Navy Mobile User Objective System (MUOS) station in Niscemi, Sicily. Even Anonymous hackers have joined ...
imaginedragon's insight:

Hacktivists of Anonymous Italy have leaked several emails sent to Italian government officials regarding the US Navy Mobile User Objective System (MUOS) project.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

Android bug batters Bitcoin wallets • The Register

Android bug batters Bitcoin wallets • The Register | Cyber Development | Scoop.it
imaginedragon's insight:

Users of Android Bitcoin apps have woken to the unpleasant news that an old pseudo random number generation bug has been exploited to steal balances from users' wallets.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

U.S. officials say NSA leaks may hamper cyber policy debate

U.S. officials say NSA leaks may hamper cyber policy debate | Cyber Development | Scoop.it
NEW YORK (Reuters) - Weeks of revelations about secret U.S.
imaginedragon's insight:

Weeks of revelations about secret U.S. surveillance programs could stymie progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber attacks, cyber security experts say.

more...
No comment yet.
Scooped by imaginedragon
Scoop.it!

U.K. Banks Allowing Online-Crime ‘Black Hole,’ Panel Says

U.K. Banks Allowing Online-Crime ‘Black Hole,’ Panel Says | Cyber Development | Scoop.it
U.K. banks and other financial institutions should be forced to report all online crime, such as card cloning, to law-enforcement agencies to tackle a “black hole” of low-level fraud, a panel of lawmakers said.
imaginedragon's insight:

U.K. banks and other financial institutions should be forced to report all online crime, such as card cloning, to law-enforcement agencies to tackle a “black hole” of low-level fraud, a panel of lawmakers said.

more...
No comment yet.