Archive for the 'Infrastructure' Category
Several Pentagon Contractors Recruiting for Offensive Cyberwarfare Jobs
June 16th, 2012Via: Forbes: Over the past few months, Hypponen has been periodically visiting the “careers” section of defense contractors’ websites and online job listings, particularly those targeted at candidates with secret clearances, and searching for words like “exploit,” “offensive,” and “vulnerability.” And the positions he’s been seeing show a new recruiting focus–or newly explicit focus–among the […]
Flame and Stuxnet Share Common Origin
June 12th, 2012Via: Threat Post: Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin. Researchers from Kaspersky Lab say that a critical module that the Flame worm used to spread is identical to a […]
Cryptanalist Discovers New MD5 Attack Variant in Flame
June 7th, 2012Via: CWI: Using our forensic tool, we have indeed verified that a chosen-prefix collision attack against MD5 has been used for Flame. More interestingly, the results have shown that not our published chosen-prefix collision attack was used, but an entirely new and unknown variant. Therefore it is not unreasonable to assume that the particular chosen-prefix […]
Japan: Millions of Tons of Radioactive Rubble
June 5th, 2012Via: The Atlantic: Disposing the more than 20 million tons of rubble caused by the March 11 earthquake and tsunami is proving to be a difficult problem for Japan, not least because much of the rubble has been irradiated by the Fukushima nuclear disaster. The government’s plan — to destroy 4 million tons of potentially […]
Microsoft Update and The Nightmare Scenario
June 5th, 2012Via: F Secure: About 900 million Windows computers get their updates from Microsoft Update. In addition to the DNS root servers, this update system has always been considered one of the weak points of the net. Antivirus people have nightmares about a variant of malware spoofing the update mechanism and replicating via it. Turns out, […]
Flame ‘Could only have been written by a large team of highly skilled software engineers’
June 2nd, 2012Via: Ars Technica: At least 20 modules available for the malware bring a menu of highly advanced spying capabilities to the unknown people who control it. One plugin turns on the internal microphone of infected machines so Skype conversations can be secretly monitored in real time. A separate module scans nearby Bluetooth-enabled devices for names […]
U.S. and Israel Created Stuxnet, Lost Control of It
June 1st, 2012Via: Ars Technica: In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as […]
Tepco Admits Fukushima Disaster Released 2.5 Times More Radiation Than Indicated by Initial Government Lies
May 29th, 2012Imagine my shock. But if they’re admitting this, what is the real number? Via: Reuters: The radiation released in the first days of the Fukushima nuclear disaster was almost 2-1/2 times the amount first estimated by Japanese safety regulators, the operator of the crippled plant said in a report released on Thursday. Tokyo Electric Power […]
Naoto Kan, Japan’s Former Leader, Condemns Nuclear Power
May 29th, 2012Via: New York Times: In an unusually stark warning, Japan’s prime minister during last year’s nuclear crisis told a parliamentary inquiry on Monday that the country should discard nuclear power as too dangerous, saying the Fukushima accident had pushed Japan to the brink of “national collapse.” … He said he feared additional meltdowns could “release […]
Made in China: Backdoor Found in Chip Used by U.S. Military
May 29th, 2012Via: Information Age: A microchip used by the US military and manufactured in China contains a secret “backdoor” that means it can be shut off or reprogrammed without the user knowing, according to researchers at Cambridge University’s Computing Laboratory. The unnamed chip, which the researchers claim is widely used in military and industrial applications, is […]
