Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Microsoft Windows Hijacked by the Millions, US Government Wants Zombies

  • Subject: [News] [Rival] Microsoft Windows Hijacked by the Millions, US Government Wants Zombies
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Wed, 06 May 2009 08:07:31 +0000
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/0.10.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

12 million new IP addresses have been hijacked by botnets

,----[ Quote ]
| Today the McAfee first quarter threat report revealed that cybercriminals 
| have taken control of almost 12 million new IP addresses since January, a 50 
| percent increase since 2008.  
`----

http://www.net-security.org/secworld.php?id=7442

China hardest hit as malware attacks increase

,----[ Quote ]
| China received the brunt of a rise in malware attacks around the world in 
| April, doubling its share of attacks from the previous month as the lucrative 
| online gaming market attracted hits from cybercriminals.  
`----

http://www.itwire.com/content/view/24834/1054/

US needs 'digital warfare force'

,----[ Quote ]
| The head of America's National Security Agency says that America needs to 
| build a digital warfare force for the future, according to reports. 
| 
| Lt Gen Keith Alexander, who also heads the Pentagon's new Cyber Command, 
| outlined his views in a report for the House Armed Services subcommittee.  
`----

http://news.bbc.co.uk/go/rss/-/1/hi/technology/8033440.stm


Recent:

US 'should go on cyber-offensive'

,----[ Quote ]
| A US Air Force officer has told the BBC that his country should create an
| offensive botnet to target any forces that launch a cyber-attack against it.
`----

http://news.bbc.co.uk/1/hi/technology/8026964.stm


EDF accused of spying on anti-nuclear groups

,----[ Quote ]
| EDF, France’s nuclear energy operator, paid investigators to infiltrate the
| anti-nuclear movement around Europe, according to testimony given in a French
| judicial investigation.
|
| The investigation is looking into whether the state-controlled group condoned
| illegal practices as part of a surveillance operation.
|
| The affair has exposed an underworld of computer hackers and private
| investigators who claim to have worked for some of the world’s most respected
| companies. It also raises questions over the methods employed to ensure the
| safety of nuclear operations in France and abroad.
`----

http://www.ft.com/cms/s/0/bc45ab84-2ded-11de-9eba-00144feabdc0.html?nclick_check=1


Police want new remote hard drive search powers

,----[ Quote ]
| At present, the proposed legislative changes don't appear to be related to EU
| moves to step up hacking of PCs in homes and offices by police.
`----

http://www.theregister.co.uk/2009/04/29/remote_hard_drive_forensics/


FBI used spyware to catch cable-cutting extortionist

,----[ Quote ]
| CIPAV spyware helped nab unemployed engineer angry over outsourcing
`----

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM


Congress Ponders Cybersecurity Power Grab

,----[ Quote ]
| There was a lot of attention paid last week to a new "cybersecurity" bill
| that would drastically expand the government's power over the Internet. The
| two provisions that have probably attracted the most attention are the parts
| that would allow the president to "declare a cybersecurity emergency" and
| then seize control of "any compromised Federal government or United States
| critical infrastructure information system or network." Perhaps even more
| troubling, the EFF notes a section that states that the government "shall
| have access to all relevant data concerning (critical infrastructure)
| networks without regard to any provision of law, regulation, rule, or policy
| restricting such access."
`----

http://techdirt.com/articles/20090403/1346154383.shtml


Related:

Cryptome: NSA has access to Windows Mobile smartphones

,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSA’s network surveillance.
`----

http://blogs.securiteam.com/index.php/archives/1028


Dual_EC_DRBG Added to Windows Vista

,----[ Quote ]
| Microsoft has added the random-number generator Dual_EC-DRBG to Windows
| Vista, as part of SP1. Yes, this is the same RNG that could have an NSA
| backdoor.
|
| It's not enabled by default, and my advice is to never enable it. Ever.
`----

http://www.schneier.com/blog/archives/2007/12/dual_ec_drbg_ad.html


Microsoft Cofee brews 'back door' fears

,----[ Quote ]
| The assurances came after reports claiming that Cofee could provide a 'back
| door' into Microsoft operating systems and applications.
`----

http://www.itnews.com.au/News/75780,microsoft-cofee-brews-back-door-fears.aspx


Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----

http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkoBRUMACgkQU4xAY3RXLo4HYACdG/3w9Y2vQAFrwDYNcouugxsF
jVoAn00NmTW6Jn3LZvDqNIUBRH4R70OG
=QXke
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index