background preloader

New Project X

Facebook Twitter

Russia

Publishing options. Iran, Terrorists, North Korea Scariest Cybersecurity Threats? By Tim Starks Posted at 10:16 a.m. on Oct. 1, 2014 Carlin speaks as Attorney General Eric Holder, right, and U.S.

Iran, Terrorists, North Korea Scariest Cybersecurity Threats?

Attorney for Western District of Pennsylvania David Hickton, left, listen during a May announcement on indictments against Chinese military hackers on cyber-espionage. Cyber Norms. UN. Cyber War.

Potential Collaborators

Int'l Cooperation. Who's on First. Wikileaks. P3. Stuxnet etc. WCIT. China Cyber Security. European Cybercrime Center to Focus on Cooperation, Upgrading Technology - Corruption Currents. Troels Oerting, head of the new European Cybercrime Centre, says the initial priorities of the new agency are to better coordinate activity within the 27-member European Union, strengthen ties with U.S. law enforcement agencies, develop new technology to combat cybercrime, and better engage businesses to share information and be more aware of potential threats.

European Cybercrime Center to Focus on Cooperation, Upgrading Technology - Corruption Currents

European Pressphoto Agency. Wary of cyber security laws, UK eyes softly-softly approach.

Saudi

In Cyberattack on Saudi Firm, US Sees Iran Firing Back. Shamoon's code included a so-called kill switch, a timer set to attack at 11:08 a.m., the exact time that Aramco's computers were wiped of memory.

In Cyberattack on Saudi Firm, US Sees Iran Firing Back

Shamoon's creators even gave the erasing mechanism a name: Wiper. Computer security researchers noted that the same name, Wiper, had been given to an erasing component of Flame, a computer virus that attacked Iranian oil companies and came to light in May. Iranian oil ministry officials have claimed that the Wiper software code forced them to cut Internet connections to their oil ministry, oil rigs and the Kharg Island oil terminal, a conduit for 80 percent of Iran's oil exports.

It raised suspicions that the Aramco hacking was retaliation. The United States fired one of the first shots in the computer war and has long maintained the upper hand.

Net Neutrality

UK Security Actors. Security experts to probe Winz computer hacking. Security experts will examine how the Work and Income computer system was hacked, allowing the secret details of some of the most vulnerable New Zealanders to be exposed.

Security experts to probe Winz computer hacking

The officials meant to safeguard them cannot yet say how many people have unlocked the information. The privacy blunder also raises doubts when the Government is setting up a database on children at risk of abuse. Hacking into Winz's private files was simple.

Huawei

US issues new warning on Huawei, ZTE - Security. Cloud Policy. Network neutrality, the FCC, and the Internet of Things. Photo by Alex Wong/Getty Images.

Network neutrality, the FCC, and the Internet of Things

For two years, network neutrality, the nation’s most high-profile and contentious Internet policy conflict has taken a backseat to other debates—privacy investigations by the Federal Trade Commission, cybersecurity orders from the White House, proposed copyright legislation like SOPA and PIPA, software patents in courts, and censorship abroad.

IP

Google Public Policy Blog. The internet in pieces. Courtney Love does the math. Today I want to talk about piracy and music.

Courtney Love does the math

What is piracy? Piracy is the act of stealing an artist’s work without any intention of paying for it. I’m not talking about Napster-type software. I’m talking about major label recording contracts. Intellectual Property. #1_Privacy_and_Security_Research_Paper_Series.pdf (application/pdf Object) Blackboard Learning System. Spy malware infecting Iranian networks is engineering marvel to behold.

The Net Effect. NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” The loss of industrial information and intellectual property through cyber espionage constitutes the "greatest transfer of wealth in history," the nation's top cyber warrior Gen.

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history”

Keith Alexander said Monday. U.S. companies lose about $250 billion per year through intellectual property theft, with another $114 billion lost due to cyber crime, a number that rises to $338 billion when the costs of down time due to crime are taken into account, said Alexander, the director of the National Security Agency and commander of U.S. Cyber Command, in remarks Monday at the American Enterprise Institute. StratforLeaks: Google Ideas Director Involved in ‘Regime Change’ China calls US culprit in global ‘Internet war’ Google says computer hackers in China broke into the Gmail accounts of several hundred people, including senior government officials in the U.S. and political activists (AP Photo) BEIJING— The Chinese military accused the U.S. on Friday of launching a global “Internet war” to bring down Arab and other governments, redirecting the spotlight away from allegations of major online attacks on Western targets originating in China.

China calls US culprit in global ‘Internet war’

The accusations on Saturday by Chinese military academy scholars, and their urging of tougher policing of the Internet, followed allegations this week that computer hackers in China had compromised the personal Gmail accounts of several hundred people, including government officials, military personnel and political activists. r0g / agency for open culture and critical transformation. Juba.

r0g / agency for open culture and critical transformation

The world’s first Open Source City? (dispatch v.1 01.06.2012) Thursday June 21, 2012KOW Brunnenstr. 9, Berlin 19.00 – 21.00 South Sudan and Open Source Culture Friday June 22, 2012SUPERMARKT Brunnestr. 64, Berlin 10.00 – 18.00 Open Source and Post-Conflict Development Conference | Workshop. Obama Ordered Wave of Cyberattacks Against Iran. Report.pdf (application/pdf Object) China’s Arab Spring Cyber Lessons. The Arab Spring has offered some useful pointers for countries such as China about what works in suppressing dissent — and what is counterproductive.

China’s Arab Spring Cyber Lessons

By Richard Fontaine & Will Rogers for The Diplomat October 03, 2011. The new underbelly. 1369118X.2012.676056 (application/pdf Object) Internet Freedom and the Digital Earthquake of 2011. Thank you for inviting me. Actually, the truth is that I invited myself because I care so much about these issues.