Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] US Secret Services Get Burned for Running Microsoft Windows

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Computer virus strikes U.S. Marshals, FBI affected 

,----[ Quote ] 
| Law enforcement computers were struck by a mystery computer virus Thursday, 
| forcing the FBI and the U.S. Marshals to shut down part of their networks as 
| a precaution.  
`----

http://seattletimes.nwsource.com/html/politics/2009247709_apusfedscomputervirus.html

"Computer virus"...

Does that affect computers or just those running the malware called Microsoft
Windows?

http://twitter.com/glynmoody/statuses/1872177623
Conficker still infecting 50,000 PCs per day - http://bit.ly/JpG1a not true:
it's infecting 50K *Windows* machines per day

Mystery virus strikes FBI, U.S. Marshals

,----[ Quote ]
| The FBI and the U.S. Marshals Service were forced to shut down parts of their 
| computer networks after a mystery virus struck the law-enforcement agencies 
| Thursday, according to an  Associated Press report.   
`----

http://news.cnet.com/8301-1009_3-10247388-83.html

US military shows off hack-by-numbers battlefield gadget

,----[ Quote ]
| As the US military strives to boost its ability to wage cyber warfare, it's 
| looking for ways to make it easier for non-expert soldiers on the front lines 
| to wreak havoc on enemy networks.  
`----

http://www.theregister.co.uk/2009/05/22/military_cyberwar_gadget/

Editor's Note: Desperation, Scare Tactics, and Happy Memorial Day!

,----[ Quote ]
| Note the emphasis on vague scare tactics and the lack of any actual data or 
| information. This Softpedia article also spreads Kaspersky fluff, which makes 
| me sad because I like Softpedia's Linux news and reviews a lot. It references 
| this Kaspersky blog entry:   
| 
|     "At the moment we know of around 1000 cases of sites infected with 
|     Trojan-Downloader.JS.Iframe.auy. There are also several hundred servers 
|     infected with Trojan-Mailfinder.Perl.Hnc.a and 
|     Trojan-Dropper.Linux.Prl.a, which are actively spreading spam. The days 
|     of *nix systems not being targeted by malware writers are long gone."     
| 
| Uh huh. Again heavy on scare, light on details. How do these *nix boxes 
| become infected in the first place? What *nix boxes where? Unlike Windows, 
| Linux and Unix do not auto-execute any random executable that happens to 
| wander by. I did both Web searches and searches on Symantec, F-Secure, and 
| other vendors to learn more about these big scary *nix threats, and they 
| don't even include them in their threat lists. A Web search turns up the blog 
| and some Russian sites. Searching Kaspersky's own threat list does not find 
| anything mentioned in the blog, except variants on 
| Trojan-Downloader.JS.Iframe.auy:         
`----

http://www.linuxtoday.com/news_story.php3?ltsn=2009-05-22-027-35-OP-BZ-CY


Recent:

FBI used spyware to catch cable-cutting extortionist

,----[ Quote ]
| CIPAV spyware helped nab unemployed engineer angry over outsourcing
`----

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM


Congress Ponders Cybersecurity Power Grab

,----[ Quote ]
| There was a lot of attention paid last week to a new "cybersecurity" bill
| that would drastically expand the government's power over the Internet. The
| two provisions that have probably attracted the most attention are the parts
| that would allow the president to "declare a cybersecurity emergency" and
| then seize control of "any compromised Federal government or United States
| critical infrastructure information system or network." Perhaps even more
| troubling, the EFF notes a section that states that the government "shall
| have access to all relevant data concerning (critical infrastructure)
| networks without regard to any provision of law, regulation, rule, or policy
| restricting such access."
`----

http://techdirt.com/articles/20090403/1346154383.shtml


Related:

Cryptome: NSA has access to Windows Mobile smartphones

,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSA’s network surveillance.
`----

http://blogs.securiteam.com/index.php/archives/1028


Dual_EC_DRBG Added to Windows Vista

,----[ Quote ]
| Microsoft has added the random-number generator Dual_EC-DRBG to Windows
| Vista, as part of SP1. Yes, this is the same RNG that could have an NSA
| backdoor.
|
| It's not enabled by default, and my advice is to never enable it. Ever.
`----

http://www.schneier.com/blog/archives/2007/12/dual_ec_drbg_ad.html


Microsoft Cofee brews 'back door' fears

,----[ Quote ]
| The assurances came after reports claiming that Cofee could provide a 'back
| door' into Microsoft operating systems and applications.
`----

http://www.itnews.com.au/News/75780,microsoft-cofee-brews-back-door-fears.aspx


Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----

http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkoX4hQACgkQU4xAY3RXLo6dLQCgmHhvGbtFAdw7GXNG2ARb0bb2
IsIAn2BfpVEr5hd2Sm87gkXsy+ojJOF9
=FTop
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index