-
December 31, 2013
A history of major cyber attacks
A history of major cyber attacks: Experts say that concentrated cyber-attacks have the ability to cripple a nation’s ability to defend itself and destroy its economy and national wealth. Here is a list of some large recent cyber attacks: 2011 – Operation Shady RAT is an ongoing series of cyber attacks that began in mid-2006 […]
-
December 31, 2013
Russian hacker HASH took control of a BBC server
Russian hacker HASH took control of a BBC server: The Russian hacker known as “HASH” and “Rev0lver” took control of a BBC server and attempted to sell access to it to other cybercriminals. A hacker compromised a server at the BBC (British Broadcasting Corporation) and started a Christmas Day campaign to sell the access to […]
-
December 31, 2013
Why I Have Become Pessimistic About Indian IT
Why I Have Become Pessimistic About Indian I.T.: When Wall Street Journal and Forbes published articles, a few years ago, predicting the demise of Indian IT, I responded in BusinessWeek that they were dead wrong. I said that the outsourcing market had a long way to go before it peaked; rising salaries and attrition rates […]
-
December 31, 2013
Target: Customer PIN Data Is Encrypted
Target: Customer PIN Data Is Encrypted: Despite the massive theft of credit and debit card account information on Target customers, the retailer emphasizes that critical information is still encrypted. U.S. retail giant Target is still reeling from the impact of a massive data breach affecting 40 million credit and debit card accounts, though the company […]
-
December 31, 2013
Why NSA spied on inexplicably unencrypted Windows crash reports
Why NSA spied on inexplicably unencrypted Windows crash reports: The National Security Agency’s X-KEYSCORE program gives the spy agency access to a wide range of Internet traffic. Any information that isn’t encrypted is, naturally, visible to passive Internet wiretaps of the kind the NSA and other intelligence agencies use. This in turn will typically expose […]
-
December 31, 2013
High School Students vs. the NSA
High School Students vs. the NSA: Believe it or not, the NSA has more secrets than we—or maybe even Edward Snowden—suspected. In addition to knowing German Chancellor Angela Merkel’s (and potentially your) cell phone information, I found it revealing when watching last week’s 60 Minutes report that the National Security Agency’s HR department is no […]
-
December 30, 2013
The NSA Actually Intercepted Packages to Put Backdoors in Electronics
The NSA Actually Intercepted Packages to Put Backdoors in Electronics: The NSA revelations keep on coming, and if you’re feeling desensitized to the whole thing it’s time to refocus and get your game face on for 2014. Because shit continues to get real. SPIEGEL published two pieces this morning about the NSA’s Tailored Access Operations […]
-
December 30, 2013
NSA Win Leaves Security of Cell, Cloud Data Uncertain
NSA Win Leaves Security of Cell, Cloud Data Uncertain: The decision of a New York judge that the wholesale collection of cell-phone metadata by the National Security Agency is constitutional ties the score between pro- and anti-NSA forces at one victory apiece. The contradictory decisions use similar reasoning and criteria to come to opposite conclusions, […]
-
December 30, 2013
MIT Study: “Devil in the Details” of Supply Chain Risk Management
MIT Study: “Devil in the Details” of Supply Chain Risk Management: Industry analysts agree that it’s important to make risk assessment an ongoing process, allowing for frequent plan updates as political conditions, fuel prices, tariffs, currency exchange rates, labor costs, and other supply chain security threats arise. Up until now, the focus for most US […]
-
December 30, 2013
ARP Spoofing Malware Infection Project Spotted & Source Code is Disclosed to LE & Industries
ARP Spoofing Malware Infection Project Spotted & Source Code is Disclosed to LE & Industries: Self spreading malware project to infect other nodes using ARP spoofing based scanner was spotted back in several month, our intelligence reported and we keep on monitoring its progress ever since, and the moronz involved just has been released in […]