Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $75,302
Woo hoo!! And now less than $12.7k to go!! Thank you all very much!!

Keyword: cyberterrorism

Brevity: Headers | « Text »
  • Committee Grills DHS Official over EINSTEIN's Failure to Prevent OPM Attack

    06/24/2015 6:35:16 PM PDT · by markomalley · 11 replies
    Nextgov ^ | 6/24/15
    Representatives on Wednesday pointedly asked a Department of Homeland Security official why the department's multibillion-dollar cyber traffic-monitoring system known as EINSTEIN failed to prevent intruders from breaching the Office of Personnel Management and extracting sensitive files on millions of federal employees. "There's been a lot of criticism...that EINSTEIN didn't work," said Rep. Dan Donovan, R-N.Y. referring to the DHS cyber program that monitors government network traffic. In the case of the OPM breach, he asked witnesses at a House Homeland Security subcommittee hearing, "did Einstein actually do what it was created to do?" It depends on what version of EINSTEIN...
  • 'Assessing The Computer Network Operation (CNO) Capabilities Of The Islamic Republic Of Iran'...

    06/24/2015 6:08:32 PM PDT · by markomalley
    MEMRI ^ | 6/24/15
    Introduction The MEMRI Cyber Jihad Lab (CJL) has received an exclusive copy of a report released May 25, 2015 by the cyber-security organization Tenshi, "Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran." The report includes an analysis of the cyber threats posed by Iran, including its use of academia as a hotbed for cultivating future hackers, as well as a review of the most prominent and active Iranian hacker groups. The following is the CJL's review of this report. "Iran's Interest In Further Developing Its Asymmetric Warfare Potential Has Never Been More Vigorous" The report...
  • BREAKING! The Islamic State (ISIS) releases video warning America and Europe

    05/11/2015 2:20:02 PM PDT · by sheikdetailfeather · 41 replies
    Shoebat ^ | 5-11-2015 | Shoebat Foundation
    By BI: “Soon you will see how we control your electronic world… Today the electronic fields witness on our victory… Soon you won’t have any control over the internet.” Love, ISIS!
  • ISIS Hackers Plan "Message to America" Attack Today (Cyber attack 2PM EST)

    05/11/2015 6:57:53 AM PDT · by maggief · 158 replies
    Vocativ ^ | May 11, 2015 | Gilad Shiloach
    A group of hackers affiliated with ISIS are threatening to carry out a cyber attack—dubbed “Message to America”—against a number of targets 2 p.m. EST today. The targets were not identified on ISIS forums and social channels but the hackers are promising something “surprising” that “will frighten America”.
  • Concord coach invites Twitter to 'burn down' RFRA-supporting pizzeria

    04/02/2015 12:49:15 PM PDT · by Clint N. Suhks · 119 replies
    The Elkhart Truth ^ | 4/1/15 | Michelle Sokol
    Jess Dooley, a Concord High School golf, softball and basketball coach, was suspended hours after responding to Religious Freedom Restoration Act news story with Tweet about arson. A Concord High School coach has been suspended after she tweeted about arson in relation to a Walkerton pizzeria whose owners told the media they agree with the Religious Freedom Restoration Act. Jess Dooley, who is the head coach of the girls golf program and also an assistant coach with the softball and girls basketball programs, took to Twitter Wednesday, April 1, to voice her opinion about the RFRA. She was adding to...
  • Obama Signs Order Creating New Cyber Sanctions Regime

    04/01/2015 6:47:01 AM PDT · by Oldeconomybuyer · 7 replies
    ABC News ^ | April 1, 2015
    President Barack Obama on Wednesday created the first sanctions program that would allow the U.S. to penalize individuals and entities overseas who engage in malicious cyberattacks and cyber spying. "Cyber threats pose one of the most serious economic and national security challenges to the United States," Obama said in a statement after signing an executive order creating the sanctions regime. The order gives the U.S. the authority to sanction individuals, though no specific penalties were announced. Obama said the sanctions would apply to those engaged in malicious cyber activity that aims to harm critical infrastructure, damage computer systems, and steal...
  • under massive DDOS attack

    01/16/2015 11:17:36 AM PST · by E. Pluribus Unum · 11 replies You did not receive your daily Atlas email update today because the website has been under a massive DDoS attack. Our Islamic Jew hatred ads in San Francisco have gotten huge national and international press. Further, our free speech rally this weekend countering the "Stand with the Prophet" anti-free speech "Islamophobia" summit in Garland, Texas has roiled the enemies of truth and freedom. They're out for blood.
  • The Timid Generation: Try to imagine Franklin Roosevelt or Ronald Reagan caving in to North Korea.

    12/23/2014 6:13:58 AM PST · by SeekAndFind · 14 replies
    National Review ^ | 12/23/2014 | Victor Davis Hanson
    <p>Aristotle thought courage the preeminent virtue. Without it, there could be no morality. Virtue becomes a mere abstraction, a high-sounding platitude that is easy to live by in one’s sleep.</p> <p>The present generation may be the most abjectly cowardly cohort in memory. When the Sony Corporation was victimized by North Korean–sponsored hackers upset over Sony’s new movie The Interview, it caved and withdrew the film. The Obama administration so far has offered no real support. Instead it blamed Sony for its appeasement. By joint inaction both Sony and the United States government sent the message that foreign dictators can determine what Americans see or read, as long as their targets are private citizens.</p>
  • N Korea threatens attacks on USA after being blamed for Sony hacking

    12/22/2014 8:36:24 AM PST · by SeekAndFind · 82 replies
    Fiscal Times ^ | 12/22/2014 | By Song Jung-a in Seoul
    North Korea has warned of strikes against key sites in the US in retaliation for Washington blaming Pyongyang for the recent Sony cyber attack, saying any US punishment over the incident would lead to damage “thousands of times greater”. Late on Sunday North Korea’s National Defence Commission said President Barack Obama was “recklessly” spreading rumours that Pyongyang was behind the cyber attack. Sony has pulled The Interview , a satirical film depicting the assassination of North Korean leader Kim Jong Un, after the hacking and subsequent threats of terrorist attacks against cinemas that screened it. The NDC said its 1.2m-member...
  • Good news: North Korea to share control of Sony Pictures with Al Sharpton [WATCH VIDEO]

    12/19/2014 1:05:40 PM PST · by SeekAndFind · 5 replies
    Hotair ^ | 12/19/2014 | AllahPundit
    A good match. One’s a far-left entity with poor English skills that maintains power by stoking grievances against America and the other’s North Korea.Here’s this week’s reminder that there’s no situation so terrible that Al Sharpton can’t make it worse. Hollywood ​came to the Rev. Al Thursday as embattled Sony exec Amy Pascal ​met ​privately with the ​black leader for 90 minutes ​in a bid to fix the fallout from the ​cyberhacking ​leak of embarrassing, racially charged emails.Pascal agreed to let Sharpton have a say in how Sony makes motion pictures, in an effort to combat what he called...
  • George Clooney: No one in Hollywood would sign my letter of support for Sony Pictures

    12/19/2014 10:03:47 AM PST · by SeekAndFind · 9 replies
    Hotair ^ | 12/19 | AllahPundit
    I’m glad he spoke up, not only because he’s right, not only because a little public shaming from an A-lister might get others to rethink, but because that tribute to Hollywood’s bravery that he gave a few years ago at the Oscars would have looked even more embarrassing in hindsight if he’d kept quiet about this.Nothing fancy about the logic of his petition: “We know that to give in to these criminals now will open the door for any group that would threaten freedom of expression, privacy and personal liberty. We hope these hackers are brought to justice but...
  • U.S. will respond to North Korea hack, official says

    12/18/2014 2:22:27 PM PST · by SeekAndFind · 38 replies
    CNN ^ | 12/18/2014 | Pamela Brown, Jim Sciutto, Evan Perez, Jim Acosta and Eric Bradner,
    U.S. government officials are preparing to publicly blame North Korea for the Sony Pictures hack -- but haven't yet decided how to respond to the attack. The White House and other agencies are holding a series of high-level meetings to discuss the United States' range of options, a senior official in President Barack Obama's administration said. "We do think it's appropriate to respond," the official said. Those options could include new sanctions against North Korea, another source said. White House press secretary Josh Earnest wouldn't confirm that the Obama administration has pinned the hack on North Korea, saying it's still...
  • Sony Should Release 'The Interview' Online

    12/18/2014 7:02:22 AM PST · by SeekAndFind · 36 replies
    National Review ^ | 12/18/2014 | The Editors
    Seth Rogen and James Franco give every indication of being in life something very much like the loveable dopes they play in the movies, and that they should be central figures in a matter of international importance is unlikely indeed. But that is nonetheless where we find ourselves: Hackers working on behalf of the regime of Kim Jong-un, the third-generation dictator of North Korea, stole a trove of documents from Sony Pictures and released them to the public to punish the entertainment concern for commissioning The Interview, a Rogen-Franco comedy in which a celebrity journalist secures an interview with Kim...
  • Cyber terrorism is 'biggest threat to aircraft'

    12/28/2013 9:38:48 AM PST · by Innovative · 5 replies
    UK Telegraph ^ | Dec 27, 2013 | Nick Collins
    The threat of cyber terrorism poses a major risk to aircrafts' systems every time they enter an airport, a senior Boeing executive has said. Boeing was the focus of a cyber security scare in 2008 when an analyst claimed the firm’s flagship 787 Dreamliner passenger jet had a serious weakness in its on-board computer networks which could allow passengers to take control of the aircraft. A report by US authorities found that a network in the cabin designed to give passengers Internet access could be used to access the aircraft’s control, navigation and communication systems. Boeing claimed the problem had...
  • American Airlines grounding flights.

    04/16/2013 12:23:46 PM PDT · by gop4lyf · 53 replies
    A buddy of mine works at AA headquarters and he says that they are freaking out there over a outage in the reservation system. He says that they are grounding all flights globally. They can't figure out what's wrong and suspect it may be cyber terrorism.
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... What’s Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • Obama Unveils Online Information Sharing Strategy To Fight Cyberterrorism

    12/21/2012 12:37:37 PM PST · by aimhigh · 5 replies
    ReadWrite ^ | 12/21/2012 | Adam Popescu
    On Wednesday the President issued a 16-page game plan aimed at strengthening the process and protection of online sharing to fight cyber attacks. It's called the the National Strategy for Information Sharing and Safeguarding. The NSISS is a guideline aimed at creating a "balance between sharing information with those who need it to keep our country safe and safeguarding it from those who would do us harm," the President wrote. "Sharing and safeguarding are often seen as mutually exclusive, in reality they are mutually reinforcing. This Strategy, therefore, emphasizes how strengthening the protection of classified and sensitive information can help...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Saudi hacker dies of asthma attack [Karma upon a cyber jihadist]

    04/25/2012 2:56:57 AM PDT · by Milagros · 15 replies
    al-Arabiya ^ | 22 April 2012
    Saudi hacker dies of asthma attack A Saudi hacker known just as "Cyber Terrorist" died in Riyadh after suffering an apparent acute asthma attack caused by the dust storm that hit the Saudi capital last week, UAE’s al- Bayan newspaper reported on Saturday. The 28-year-old hacker was known for penetrating the most well protected sites including Microsoft, Kaspersky, Milworm, besides the server of another hacker known as the king of hackers Kevin Mitnick. In addition to numerous Jewish sites, banks and major companies, he was also able to hack into the site of the Danish cartoonists who drew caricatures...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were charged—including the suspected ring leader, who directed the entire operation from a Manhattan apartment complex—after it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • onymous hackers threaten "crusade" [JIHAD] against Israeli websites

    Anonymous hackers threaten "crusade" against Israeli websites10 Feb 2012 The world-wide internet hacker network ‘Anonymous’ has released a video threatening a cyber war against Israel.. urging hackers from across the Arab and Muslim world to target the websites of the Jewish state.
  • Cyber Terror Islamic Jihad - Saudi hacks, posts Israelis' credit cards - he & Hitler hailed by Arabs

    01/04/2012 5:32:52 PM PST · by Milagros · 2 replies
    News Roundup
    Saudis laud credit card hacking scheme Ynetnews - Jan 4 - 2012 Scheme widely reported in Saudi-Arabia as web surfers welcome damage caused to Israelis. ‘Jews are the most despicable, Hitler was right,’ one talkbacker says Roi Kais Published: 01.03.12, 19:56 / Israel News [...] “If I were a hacker I would wish for 800000 credit cards to be leaked, not just 400000,” one ... The responses were mostly hostile towards Jews and Israel. ...,7340,L-4170888,00.htmlSaudis Claim Credit For Hack Of Israelis’ Credit Cards Tuesday, January 3, 2012 Adam Dickter Assistant Managing Editor A group of Saudi hackers calling themselves Group...
  • Hacker Group Anonymous Vows To Destroy Facebook On November 5

    08/10/2011 12:16:59 AM PDT · by tlb · 140 replies · 1+ views
    Village Voice Blog copied onto Business Insider ^ | August 9, 2011 | By Rosie Gray on Village Voice
    Anonymous, which has been responsible for cyber-attacks on the Pentagon, News Corp, and others, has vowed to destroy Facebook on November 5th (which should ring a bell). Citing privacy concerns and the difficulty involved in deleting a Facebook account, Anonymous hopes to "kill Facebook." The full text of the announcement, made on YouTube and reported by Village Voice, is below: Operation Facebook DATE: November 5, 2011 Attention citizens of the world, We wish to get your attention, hoping you heed the warnings as follows: Your medium of communication you all so dearly adore will be destroyed. If you are a...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting "goodnight all" at 0700 BST, or 0200 New York time – implies he is...
  • Probe Seeks N.Korean Hand in Bank Server Breakdown

    04/26/2011 7:21:17 PM PDT · by TigerLikesRooster · 4 replies
    Chosun Ilbo ^ | 04/27/11
    Probe Seeks N.Korean Hand in Bank Server Breakdown The Seoul Central District Prosecutors' Office has discovered suspicious Internet protocol addresses of Chinese origin on a laptop owned by an employee of IBM Korea, the National Agricultural Cooperative Federation's network maintenance subcontractor, it said Tuesday. Prosecutors are probing a massive breakdown in the bank's computer system last week. The laptop is believed to have been the main source of the breakdown on April 12. The NACF is also known as Nonghyup. Prosecutors said they found that of hundreds of domestic and foreign IP addresses connected to the laptop, on which pre-set...
  • Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks

    12/09/2010 2:37:11 PM PST · by fightinJAG · 44 replies
    Computerworld ^ | Dec . 9, 2010 | Gregg Keizer
    Volunteers download attack tool, organizers recruit hacker botnets, say researchers Computerworld - The retaliatory attacks by pro-WikiLeaks activists are growing in strength as hackers add botnets and thousands of people download an open-source attack tool, security researchers said today. In recent days, distributed denial-of-service (DDoS) attacks have been launched against several sites, including those belonging to Amazon, MasterCard, PayPal and the Swiss payment transaction firm PostFinance, after each terminated WikiLeaks accounts or pulled the plug on services. As of Thursday, WikiLeaks had posted the full text of more than 1,200 leaked U.S. State Department cables from its trove of over...
  • WikiLeaks releases nearly impossible to stop

    12/08/2010 8:14:23 AM PST · by SmithL · 32 replies · 1+ views
    San Francisco Chronicle ^ | 12/8/10 | Andrew Ross
    Sen. Dianne Feinstein wants to prosecute Julian Assange for espionage. The founder of WikiLeaks "intentionally harmed the U.S. government," says Feinstein, who chairs the Senate Intelligence Committee. By releasing 250,000 State Department cables, he also violated the 1917 Espionage Act by transmitting "information which the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation," Feinstein, D-Calif., charged in a Wall Street Journal opinion piece Tuesday. To John Perry Barlow, co-founder of San Francisco's Electronic Frontier Foundation, "The first serious infowar is now engaged. The field of...
  • MasterCard site partially frozen by hackers in WikiLeaks 'revenge'

    12/08/2010 5:44:40 AM PST · by maggief · 29 replies · 1+ views
    Guardian ^ | December 8, 2010 | Esther Addley
    The website of MasterCard, the international credit card, has been hacked and partially paralysed by hackers, in apparent revenge for the payment network's decision to cease taking donations to WikiLeaks. A group of online activists calling themselves Anonymous appear to have orchestrated a DDOS ("distributed denial of service") attack on the site, bringing its service at to a halt for many users. "Operation: Payback" is the latest salvo in the increasingly febrile technological war over WikiLeaks. MasterCard announced on Monday that it would no longer process donations to the whistleblowing site, claiming it was engaged in illegal activity.
  • A laundry list of power industry incidents to learn from (cyber terror attacks)

    09/25/2010 12:53:32 PM PDT · by SmartInsight · 3 replies
    Network Work ^ | Sept. 22, 2010 | M. E. Kabay
    In this seventh article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry. Cyberterror Impact, Defense Under Scrutiny The DHS Daily Open Source Infrastructure Report for Aug. 4, 2004 included the following item summarizing work by Jon Swartz of USA TODAY: A coordinated cyberattack against the U.S. could topple parts of the Internet, silence communications and commerce, and paralyze federal agencies and businesses, government officials and security...
  • Warning over malicious computer worm (infects sw controlling valves in pipelines, powerplants)

    09/24/2010 6:35:14 AM PDT · by SmartInsight · 44 replies
    Financial Timesw ^ | Sept. 24, 2010 | Joseph Menn , Mary Watkins
    A piece of highly sophisticated malicious software that has infected an unknown number of power plants, pipelines and factories over the past year is the first program designed to cause serious damage in the physical world, security experts are warning. The Stuxnet computer worm spreads through previously unknown holes in Microsoft’s Windows operating system and then looks for a type of software made by Siemens and used to control industrial components, including valves and brakes. “It is not speculation that this is the first directed cyber weapon”, or one aimed at a specific real-world process, said Joe Weiss, a US...
  • Siemens: Stuxnet worm hit industrial systems

    09/16/2010 11:11:46 AM PDT · by cartan · 21 replies
    COMPUTERWORLD ^ | 2010-09-14 | Robert McMillan
    A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens. Called Stuxnet, the worm was discovered in July when researchers at VirusBlokAda found it on computers in Iran. It is one of the most sophisticated and unusual pieces of malicious software ever created—the worm leveraged a previously unknown Windows vulnerability (now patched) that allowed it to spread from computer to computer, typically via USB sticks. The worm, designed to attack Siemens industrial control systems, has not spread widely. However, it has affected a number of Siemens plants, according to company...
  • Welcome to the cybertrenches

    04/03/2010 3:27:35 AM PDT · by Scanian · 7 replies · 343+ views
    NY Post ^ | April 3, 2010 | ARTHUR HERMAN
    Google's woes in China are a warning shot in the new Cold War of our time -- the fight for dominance of cyberspace. It's a conflict the United States can't afford to lose. Start by realizing that Google's decision to leave China was about far more than censorship. For the past year, Chinese government hackers have been trying push their way into Google's operating system. In recent attacks, they may have abused Google to access computers of some 200 US companies. That is, hacking Google gives China access not just to personal data about Chinese dissidents but any number of...
  • Domestic Cyber Terrorist Sought in Poughkeepsie (Accessed STD Registry)

    03/14/2010 9:15:56 PM PDT · by nickcarraway · 8 replies · 606+ views
    WKTV ^ | Mar 12, 2010
    STD Carriers Disease Control and Prevention Services said they are looking for a cyber terrorist known as Mike Bascaino in the Poughkeepsie area. Basciano is believed to have accessed the computer systems of the International Sexually Transmitted Disease (STD) Carrier Registry over 100 times for the purpose of engaging in unauthorized disruptive activities to inflict harm on a group of individuals by means of harassment and defamation of character with a reckless disregard for the STD Carriers Early Warning Alert System for Venereal Disease Control. The offense took place on a Genital Herpes report created by a registered member in...
  • Did S. Koreans attack Japanese internet message board 2ch over figure skating?

    03/04/2010 7:02:16 AM PST · by Wiz · 10 replies · 685+ views
    Examiner ^ | 2010 March 2 | Joshua Williams
    South Korean internet users, bothered by Japanese internet bashing of Korean gold medal figure skating star Yu-Na Kim, may be behind a massive denial of service (DoS) attack that has disabled one of Japan’s most popular message boards known as 2channel, Japanese and Korean media outlets reported on March 2nd (JST). On February 28th, the Japanese-language version of a South Korean news site,, reported that a Korea internet site was trying to gather internet users for a joint attack aimed at taking down the parts of the 2channel ( message boards known to be filled with ultra-nationalist Japanese rhetoric...
  • UN joins forces with computer giants to tackle Internet terrorism

    02/22/2010 4:07:53 PM PST · by Cindy · 18 replies · 565+ views ^ | February 22, 2010 | n/a "Welcome to the United Nations: It's Your World" # Note: The following text is a quote: UN joins forces with computer giants to tackle Internet terrorism 22 February 2010 – The United Nations and computer giants, including Microsoft and Google, are joining forces to identify ways to combat terrorists’ use of the Internet to recruit members, organize criminal acts and raise money. The UN Working Group on Countering the Use of the Internet for Terrorist Purposes is holding talks with CISCO, Symantec and others in the United States city of Seattle to examine the technical issues involved in...
  • U.S. Secret Service Joins TSCP for Global Collaboration in the Fight against Cyber Crime

    09/24/2009 12:56:28 AM PDT · by underthestreetlite · 231+ views
    TSCP PR - YN ^ | 22 September 2009 | TSCP PR
    The rise of cyber attacks - and the call for global collaboration on solutions that reduce the threat - has led the United States Secret Service to become the sixth government agency to join Transglobal Secure Collaboration Program (TSCP). The move reflects a growing awareness of the need for a united effort and common solutions to defend against the advanced persistent threat of cyber attacks against nations and commercial organizations alike. High-profile attacks, such as GhostNet and the U.S. electrical grid infiltration, create the imperative for government agencies and private industry to work together on viable and robust solutions that...
  • MI5 hiring Asian teenagers to fight cyber terror

    09/21/2009 7:03:25 PM PDT · by Cindy · 5 replies · 544+ views
    HINDUSTAN ^ | Last Updated: 02:44 IST(21/9/2009) | n/a
    “MI5 hiring Asian teenagers to fight cyber terror” London, September 21, 2009 First Published: 00:09 IST(21/9/2009) Last Updated: 02:44 IST(21/9/2009) SNIPPET: “MI5 head Jonathan Evans has told his staff that the recruits were essential to combat cyber terrorism which has been traced to China, Russia and Pakistan — the hackers have also intercepted messages from terrorists in Belmarsh maximum security prison, the newspaper said. In a report to Lord West, the Security Minister, Evans has revealed that during the summer over 1,000 hits were made on computers in Whitehall. Other targets have been air traffic control, power stations and the...
  • PCs Used in Korean DDoS Attacks May Self Destruct

    07/10/2009 10:03:01 AM PDT · by TigerLikesRooster · 17 replies · 1,497+ views
    WP ^ | 07/10/09 | Brian Krebs
    PCs Used in Korean DDoS Attacks May Self Destruct There are signs that the concerted cyber attacks targeting U.S. and Korean government and commercial Web sites this past week are beginning to wane. Yet, even if the assaults were to be completely blocked tomorrow, the attackers could still have one last, inglorious weapon in their arsenal: New evidence suggests that the malicious code responsible for spreading this attack includes instructions to overwrite the infected PC's hard drive. Update: This is already happening. Please be sure to read the updates at the end of this post. Original post: According to Joe...
  • The Future of Cyber-Security

    07/10/2009 8:38:27 AM PDT · by Jbny · 8 replies · 320+ views
    Commentary Magazine ^ | 07/10/09 | Max Boot
    Are the latest cyber-attacks directed against South Korea and the United States — presumably from North Korea — a major threat, or not? The Wall Street Journal touted them as “among the broadest and longest-lasting assaults perpetrated on government and commercial Web sites in both countries.” The New York Times was more dismissive:
  • North Korea, China, and Russia Attack United States

    07/08/2009 8:18:15 AM PDT · by Starman417 · 16 replies · 1,123+ views
    Flopping Aces ^ | 07-08-09 | Scott Malensek
    A few days ago, I read this article "Spies 'infiltrate US power grid' ", and I thought, "Wow, that's hardly a surprise," but I blew it off. I disregarded it-not because Michael Jackson's funeral was on TV, or because I was preparing/partying/recovering from 3 days of straight BBQ party for the Fourth of July. No, I blew it off because we all suspected this kind of thing was always happening, always possible, and it's like the threat of nuclear war: awful, not something one wants to think about, and we kind of already know the consequences. Today, multiple papers are...
  • re: Cyber attacks against America

    07/08/2009 7:41:05 AM PDT · by HD1200 · 25 replies · 733+ views
    Do we retaliate for cyber attacks with cyber attacks? If not - WHY NOT?
  • Government Web sites attacked; N. Korea suspected

    07/08/2009 7:25:35 AM PDT · by DJ MacWoW · 12 replies · 563+ views
    AP ^ | Jul 8, 9:47 AM (ET) | By LOLITA C. BALDOR
    WASHINGTON (AP) - A widespread computer attack that began July 4 knocked out the Web sites of the Treasury Department, the Secret Service and other U.S. agencies, and South Korean government sites also came under assault.
  • N. Korea suspected to be behind cyber attack: source

    07/08/2009 2:56:47 AM PDT · by TigerLikesRooster · 8 replies · 536+ views
    Yonhap News ^ | 07/08/09
    N. Korea suspected to be behind cyber attack: source SEOUL, July (Yonhap) -- North Korea appears to have orchestrated the recent cyber attack that disrupted dozens of South Korean Web sites, including that of the presidential office, parliamentary sources said Wednesday, citing informal reports by the top spy agency. The National Intelligence Service (NIS) suspects North Korea or its sympathizers may have been behind the Internet attack against major South Korean Web sites of government agencies, banks and Internet portals, which was first detected Tuesday evening, according to the sources who spoke on condition of anonymity. The spy agency briefed...
  • Federal Web Sites Hit Hard By Cyber Attacks

    07/07/2009 7:30:10 PM PDT · by John W · 98 replies · 5,351+ views
    MSNBC ^ | Juy 7, 2009 | Lolita C. Baldor
    WASHINGTON - A widespread and unusually resilient computer attack that began July 4 knocked out the Web sites of several government agencies, including some that are responsible for fighting cyber crime, The Associated Press has learned. The Treasury Department, Secret Service, Federal Trade Commission and Transportation Department Web sites were all down at varying points over the holiday weekend and into this week, according to officials inside and outside the government. Some of the sites were still experiencing problems Tuesday evening.
  • Go to jail, get a laptop - Gitmo teaches computer literacy

    06/03/2009 10:53:25 AM PDT · by freespirited · 5 replies · 267+ views ^ | 06/02/09 | Darleen Hartley
    An action by the US government is causing a flurry of not so complimentary comments across the internet. A group of 17 Uighur detainees who are on the road to release are being given laptops to train them for life outside Guantanamo. Army Lt. Col. Miguel Mendez oversees detainee classes, as well as the multilingual library and, now, the new virtual computer lab. “We’re getting them computer classes to prepare for their return.” Nury Turkel is a Uighur rights activist in Washington, D.C. He felt the computer training would “give hope to the men that their freedom is nearing” after...
  • Liberal Hackers at it Again

    03/12/2009 4:00:38 AM PDT · by drellberg · 67 replies · 2,496+ views
    Powerline ^ | March 11, 2009 | John Hinderaker
    ""Wikileaks" explained in an earlier email that it was making public the information on Coleman's donors, including their credit card numbers, because of the "Coleman campaign's effort to impugn the election processes in the State of Minnesota." As a result of Wikileak's mass email of a spread sheet containing credit card information for thousands of Coleman donors, the Coleman campaign sent an email to its supporters today suggesting that they cancel their credit cards."
  • Christian ministry suffers web attack

    12/30/2008 9:02:25 AM PST · by GonzoII · 11 replies · 658+ views
    One News Now ^ | 12/30/2008 | Allie Martin
    The chairman of the Christian Film & Television Commission says homosexual activists have launched a criminal attack on his ministry. Recently, Dr. Ted Baehr says he learned about the distribution of a number of emails and blog posts that were supposedly from him or his organization. However, the emails were links to pornography, including homosexual content.
  • Blog of Leo Donofrio, down? The blog service that hosts it, down? (Page Load Error)

    11/21/2008 9:30:36 PM PST · by unspun · 23 replies · 3,259+ views
    NaturalBornCitizen ^ | 11/21/2008 | unspun
    I am trying to take a look at tonight. It is not coming up. As you may recall, was hit by a denial of service attack on, was it Election Day? Also, after FR began publicizing the one-page article, Investigating Obama: Career Path Toward a Neo-Marxist Presidency, the site that stored the printable versions was attacked. Does anyone know what is going on with Donofrio's blog and its Web services, now?
  • An Election Day Dirty Trick to Watch For: Distributed Denial-Of-Service Attacks

    11/04/2008 3:01:00 PM PST · by Brown Deer · 6 replies · 1,231+ views
    e.politics ^ | November 7th, 2006 | cpd
    I’m leaving blow-by-blow coverage of election results to the approximately one million sites that will be looking at them in detail all through the night, but in the true spirit of election day, here’s a really nasty trick to consider. As an article by Scott Berinato in this month’s Wired magazine describes, distributed denial-of-service attacks can shut down the web servers of companies and organizations within minutes, even if they’ve taken measures to protect themselves. How do they work? Hackers penetrate inadequately protected computers (yours?) and install software (a “bot”) that hides in the background until it’s triggered by a...
  • Exclusive: Are Cyber Terrorists Pulling the Last Straw Out of the World’s Economy?

    10/17/2008 7:43:18 AM PDT · by captjanaway · 1 replies · 472+ views
    Family Security Matters ^ | October 17, 2008 | Mark and Renee Taylor
    With uncharacteristic speed, Congress passed, and President Bush signed, the now infamous “bail out bill” on October 3rd. Following urgent, yet unsuccessful, pleas to the American people to back the bill, it flew through House and Senate before many Americans had time to distinguish who was at fault, Freddie Mac or Fannie Mae. It was a national economic crisis – created by banks making bad loans, inflated values and enormous bonuses for CEOs. Or was that the full story? It was only days before the economic crises went from a national issue to a “global” one.