Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $24,202
Woo hoo!! And the first 27% is in!! Thank you all very much!! God bless.

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • You Nork Bastards Will Pay For This

    11/06/2009 10:36:59 PM PST · by myknowledge · 12 replies · 697+ views
    Strategy Page ^ | November 4, 2009
    November 4, 2009: South Korea has confirmed suspicions that Internet based attacks earlier this year came from "the norks" (North Korea). The South Korean NIS (National Intelligence Service) has completed its investigation of the route the July attacks took, and has traced the origin back to the North Korean Ministry of Post and Telecommunications facilities. While there was no apparent damage from the July attacks (which hit government sites in South Korea and the United States), similar attacks have made away with secret data. For example, the South Korean military recently reported that someone hacked into a classified network, and...
  • North Korea Fingered Again in Hacking 'Revelations'

    10/18/2009 5:41:31 PM PDT · by Cindy · 4 replies · 408+ views ^ | 18 October 2009 at 15:17 | Tim Stevens
    SNIPPET: "After the 4 July DDoS attacks, wrongly attributed to North Korea, it’s wise to treat reports of DPRK security hacks with some caution. Nevertheless, The Korea Times reports the following: Classified Info on Dangerous Chemicals Hacked Hackers stole classified information on dangerous chemicals in their raid on the South Korean army computer network in what was believed to be an attack by North Korea, Yonhap News Agency reported Saturday, quoting government officials." SNIPPET: "The Sydney Morning Herald adds more information: A North Korea cyber warfare unit hacked into a South Korean military command earlier this year and stole some...
  • NKorea looks to unconventional warfare: US general

    09/30/2009 6:05:37 PM PDT · by ErnstStavroBlofeld · 4 replies · 708+ views
    Space War ^ | 9/29/2009 | AFP
    North Korea is increasingly focused on cyber warfare, improvised explosives and missile technology as the regime fears it would be defeated in a direct confrontation with US and South Korean forces, a US commander said on Tuesday. The emphasis on unconventional methods comes amid signs North Korean leader Kim Jong-Il appears to be firmly "in charge" and in decent health, General Walter Sharp, commander of US forces in Korea, told reporters on Tuesday. "I think the North Koreans probably realized they could not win in a normal conventional all-out attack," Sharp said. Given the strength of South Korean and US...
  • Could The Feds Seize The Internet?

    09/02/2009 5:34:24 PM PDT · by Kaslin · 28 replies · 2,524+ views
    IBD Editorials ^ | September 2, 2009 | INVESTORS BUSINESS DAILY Staff
    Security: A Senate bill lets the president "declare a cybersecurity emergency" relating to "nongovernmental" computer networks and do what's needed to respond to the threat. Didn't they just collect our e-mail addresses?We wish this was just a piece of the fictional "Dr. Strangelove" that fell to the cutting-room floor, but it's not. It is a real piece of disturbingly vague legislation sponsored by Sens. Jay Rockefeller, D-W.Va., Bill Nelson, D-Fla., and Olympia Snowe, R-Maine. Senate Bill 773 would grant the administration emergency powers (where have we heard that before?) in the event of a cyberemergency that the president would have...
  • Federal agency Web sites knocked out by massive, resilient cyber attack

    07/07/2009 8:36:00 PM PDT · by STARWISE · 19 replies · 1,421+ views
    Chicago Tribune/AP ^ | 7-7-09 | Lolita Baldor
    A widespread and unusually resilient computer attack that began July 4 knocked out the Web sites of several government agencies, including some that are responsible for fighting cyber crime, The Associated Press has learned. The Treasury Department, Secret Service, Federal Trade Commission and Transportation Department Web sites were all down at varying points over the holiday weekend and into this week, according to officials inside and outside the government. Some of the sites were still experiencing problems Tuesday evening. Cyber attacks on South Korea government and private sites also may be linked, officials there said. U.S. officials refused to publicly...
  • China's 'secure' OS Kylin - a threat to U.S. offensive cyber capabilities?

    06/02/2009 11:58:03 PM PDT · by Cindy · 8 replies · 518+ views ^ | May 13, 2009, 6:23 am | Dancho Danchev
    May 13th, 2009 China's 'secure' OS Kylin - a threat to U.S offensive cyber capabilities? Posted by Dancho Danchev @ 6:23 am Categories: Browsers, Complex Attacks, Governments, Hackers, Kernel-level Exploits... Tags: China, Operating System, Operating Systems, Linux, Software... Picture a cyber warfare arms race where the participating countries have spent years of building offensive cyber warfare capabilities by exploiting the monoculture on one another’s IT infrastructure. Suddenly, one of the countries starts migrating to a hardened operating system of its own, and by integrating it on systems managing the critical infrastructure it successfully undermines the offensive cyber warfare capabilities developed...
  • Code-cracking and computers ( WWII and German Codes )

    05/31/2009 9:41:54 AM PDT · by Ernest_at_the_Beach · 39 replies · 1,375+ views
    BBC ^ | Thursday, 6 November 2008 | Mark Ward Technology correspondent, BBC News
    By the end of WWII, 11 Colossus machines were in use Bletchley Park is best known for the work done on cracking the German codes and helping to bring World War II to a close far sooner than might have happened without those code breakers. But many believe Bletchley should be celebrated not just for what it ended but also for what it started - namely the computer age. The pioneering machines at Bletchley were created to help codebreakers cope with the enormous volume of enciphered material the Allies managed to intercept. The machine that arguably had the greatest influence...
  • China Updates Government,Military Computers With New Secure Operating System

    05/14/2009 3:24:53 PM PDT · by Flavius · 22 replies · 749+ views
    nas ^ | 5/14/09 | nasdaq
    -China has installed a secure operating system known as " Kylin" on government and military computers designed to be impenetrable to U.S. military and intelligence agencies, The Washington Times reported on Tuesday. The newspaper said the existence of the secure operating system was disclosed to Congress during recent hearings that included new details on how China's government is preparing to wage cyberwarfare with the U.S.
  • The First War In Cyberspace

    05/26/2009 3:29:39 AM PDT · by Scanian · 5 replies · 652+ views
    The American Thinker ^ | May 26, 2009 | Ed Timperlake
    Cyberwar is now a fact of life in 21st Century wars. Actual and potential enemies of America already know the dimensions of Cyberwar and have moved into full combat. With a real world combat engagement in Georgia and Estonia, the Russians have shown skill. Make no mistake; in certain arenas the Russians are smart and capable, and as the invasion of Georgia shows, ruthless. They have world class scientists and engineers. It is well known they are excellent Cyber Warfighters who have now also apparently harnessed their criminal hackers to augment their worldwide reach. This melding of Russian conventional military...
  • Cyberwar, Cadets Trade the Trenches for Firewalls

    05/11/2009 7:58:02 AM PDT · by Republican Party Reptile · 5 replies · 401+ views
    New York Times ^ | May 11 2009 | COREY KILGANNON and NOAM COHEN
    WEST POINT, N.Y. — The Army forces were under attack. Communications were down, and the chain of command was broken. Pacing a makeshift bunker whose entrance was camouflaged with netting, the young man in battle fatigues barked at his comrades: “They are flooding the e-mail server. Block it. I’ll take the heat for it.” These are the war games at West Point, at least last month, when a team of cadets spent four days struggling around the clock to establish a computer network and keep it operating while hackers from the National Security Agency in Maryland tried to infiltrate it...

    05/07/2009 2:57:53 PM PDT · by Cindy · 4 replies · 262+ views
    COVERT RADIO SHOW # Covert Radio Daily Blast May 7 North Korea has hackers working round the clock on cyberwarfare. Could they have been behind recent attacks on the Alaskan Air Traffic Control system? Are we prepared for Cyber Warfare? Narco Traffickers are declaring war on our cops, and the latest in the coming war between Georgia and Russia.
  • Report: NKorea Operating Cyber Warfare Unit

    05/04/2009 9:42:12 PM PDT · by james500 · 13 replies · 626+ views
    AP ^ | 5/4/2009
    North Korea runs a cyber warfare unit that tries to hack into U.S. and South Korean military networks to gather confidential information and disrupt service, a news report said Tuesday. The North's military has expanded the unit, staffing it with about 100 personnel, mostly graduates of a Pyongyang university that teaches computer skills, Yonhap news agency reported, citing an intelligence agency it didn't identify. South Korea's Defense Ministry said it is aware that Pyongyang has been training hackers in recent years but did not provide details and had no other comment. The National Intelligence Service — South Korea's main spy...
  • China's Cybertooth Tigers

    04/17/2009 6:43:46 PM PDT · by Kaslin · 510+ views
    IBD Editorials ^ | April 17, 2009
    National Defense: America's electrical grid may have been implanted with cyber-"bombs" waiting to go off. Russia and China are preparing for a new kind of warfare. Where will you be when the lights go out?On April 1, as part of our "Inside The Stimulus" series, we said the proposed "smart grid" designed to monitor electrical use and distribution would make it easier for hackers to break in and possibly disable parts or all of it. Turns out this was no April Fool's joke. A few weeks ago the Pentagon released its 2008 report to Congress titled "Military Power of the...
  • Army, Navy, Air Force, and Cyber—Is it Time for a Cyberwarfare Branch of Military?

    03/13/2009 12:58:37 PM PDT · by rabscuttle385 · 22 replies · 1,506+ views
    The Army, Navy, and Air Force all maintain cyberwarfare components, but these organizations exist as ill-fitting appendages that attempt to operate in inhospitable cultures where technical expertise is not recognized, cultivated, or completely understood. The services have developed effective systems to build traditional leadership and management skills. BY LTC GREGORY CONTI & COL JOHN "BUCK" SURDU Disclaimer The views expressed in this article are those of the authors and do not reflect the official policy or position of the US Military Academy, the Department of the Army, or the US Government. At critical points in history, technological advances have driven...
  • Cyberwarfare, Version 2.009

    02/19/2009 3:53:50 AM PST · by Cindy · 9 replies · 399+ views
    (WASHINGTON TIMES) via FRONTPAGE ^ | Thursday, February 19, 2009 | By Arnaud de Borchgrave
    Cyberwarfare is waged on a massive scale the world over. Ostensibly friendly nations zap each other's electronic nerve cells frequently, and with reckless abandon. On a single day in 2008, the Pentagon was hit by would-be intruders 6 million times in 24-hour period. Before Sept. 11, 2001, the highest annual figure for cyber attacks against the Pentagon was 250,000.
  • Israel Internet PR Cyber Warriors

    02/13/2009 10:31:17 AM PST · by IsraelBeach · 3 replies · 360+ views ^ | February 13, 2009 | Lucy Tobin
    Israel's Cyber WarriorsBy Lucy Tobin The Jewish Chronicle London --- February 12, 2009 ... When Joel Leyden speaks about Israel, 90,000 people listen. His name may not be familiar, but if you have ever used Google to look up anything on the Middle East, then you have probably had your search results influenced by him. And if you are one of the 150 million users of the social networking website Facebook, then it is likely that you have read something written by him. You might even be one of the almost 100,000 members of his group called “I Support the...
  • Anticipating Threats Key to Success, Northcom Commander Says

    01/29/2009 5:08:32 PM PST · by Cindy · 4 replies · 398+ views
    AMERICAN FORCES PRESS SERVICE ^ | January 29, 2009 | By John J. Kruzel
    Note: The following text is a quote: Anticipating Threats Key to Success, Northcom Commander Says By John J. Kruzel American Forces Press Service WASHINGTON, Jan. 29, 2009 – Anticipating threats is the key to readiness, the chief of the combatant command responsible for the military role in homeland defense said. Air Force Gen. Victor E. Renuart Jr., commander of U.S. Northern Command and North American Aerospace Defense Command, said that when he took over the reins two years ago, he modified the Northcom mission statement to reflect this notion. “I added the word ‘anticipate’ in there, and that really...
  • Army Colonel Gets Spyware From N.Korea

    09/02/2008 5:14:19 PM PDT · by TigerLikesRooster · 6 replies · 303+ views
    Chosun Ilbo ^ | 09/02/08
    Army Colonel Gets Spyware From N.Korea Amid lingering controversy over the arrest of a North Korean Mata Hari, a malicious North Korean e-mail has been sent to a colonel at a field army command. Military authorities have reportedly provided the entire army with updated anti-hacking software. A military intelligence source on Monday said the e-mail was sent early last month to the colonel via China. The source added that the e-mail was programmed to automatically steal stored files if the recipient opened it. But whether military secrets were actually stolen by way of this e-mail was not known. Military authorities...
  • The Kremlin’s Virtual Army (Russian cyberwarfare)

    08/14/2008 2:31:15 PM PDT · by Dawnsblood · 1 replies · 130+ views
    Foreign Policy ^ | 8/08 | Evgeny Morozov
    It started as a fairly predictable digital conflict, mimicking the one in the real world and displaying no shortage of “conventional” cyberwarfare: Web pages were attacked, comments were erased, and photos were vandalized. A typical prank on the Georgian Foreign Ministry’s Web site visually compared Georgian President Mikheil Saakashvili with Adolf Hitler. As Russian tanks lumbered southward over mountainous Ossetian terrain, Russian netizens were seeking to dominate the digital battlefield. But sophomoric pranks and cyberattacks were only the first shots of a much wider online war in which Russian bloggers willingly enlisted as the Kremlin’s grass-roots army. For Russian netizens,...
  • Bearprints found on Georgian cyber-attacks

    08/14/2008 10:43:06 AM PDT · by Schnucki · 3 replies · 91+ views
    The Register ^ | August 14, 2008 | John Leyden
    Security researchers claim to have uncovered evidence pointing to a link between Russian state-run businesses and cyber-attacks against Georgia. Denial of service attacks against Georgian web-sites started a day before Georgian and Russian military units began fighting over the disputed region of South Ossetia. SecureWorks researcher Don Jackson said that logs showed that portions of the attack were run from command and control servers located on the networks of Russian state-operated firms Rostelecom and Comstar. These servers were not linked to previous botnet activity. "We know that the Russian government controls those servers theoretically, if they have not been 'pwned'...
  • When Electrons Attack: Cyber-Strikes on Georgia a Wake-Up Call for Congress

    08/14/2008 8:25:40 AM PDT · by 1rudeboy · 29 replies · 114+ views
    The Heritage Foundation ^ | August 13, 2008 | James Jay Carafano, Ph.D.
    Bombs and bullets are not the only things flying around in the Russia-Georgia war that broke out over the weekend. There is a flurry of battling electrons as well. According to a news story first reported in The Telegraph, the Georgian Ministry of Foreign Affairs claimed that a "cyberwarfare campaign by Russia is seriously disrupting many Georgian websites, including that of the Ministry of Foreign Affairs." How these contributed to the country's crushing defeat and the extent of deliberate Russian "cyber-warfare" remains to be determined. This incident, however, is the latest reminder that Washington needs to get serious about...
  • Threat Matrix: June 2008

    06/02/2008 12:04:34 PM PDT · by nwctwx · 1,085 replies · 5,263+ views
    The Hunt for American al Qaeda The United States is turning up the heat in the hunt for the California boy turned al Qaeda operative, Adam Gadahn, who has been charged with treason and is believed to be hiding in Afghanistan. If caught and convicted, Gadahn could face the death penalty. The State Department along with the Department of Diplomatic Security announced the beginning of a publicity campaign in Afghanistan urging locals to provide any information on Gadahn's whereabouts, with a reward if the information leads to his capture. Radio advertisements with information concerning the $1 million reward have...
  • India set to counter Chinese net attacks

    05/08/2008 5:52:59 AM PDT · by CarrotAndStick · 19 replies · 125+ views
    Heise Online Germany ^ | 08 May 2008 | Heise Online, Germany
    The Indian media are reporting sustained internet-based attacks from China against Indian networks. These attacks, they say, are not just isolated incidents and are sophisticated and broad in scope. Government officials have confirmed off the record that the cyber warfare threat from China is much more serious than attacks carried out from other countries. They believe the Chinese attackers have been scanning and mapping India's networks for around one and a half years. They are primarily using bots – approximately 50,000 of which are currently installed on Indian systems, key loggers and network topology mapping, which allows information to be...
  • Threat Matrix: February 2008

    02/01/2008 6:55:58 PM PST · by nwctwx · 1,614 replies · 19,265+ views
    Is the U.S. Failing in Afghanistan? It was malice in wonderland at the Senate Foreign Relations Committee on Thursday as Bush Administration envoys insisted things are getting better in Afghanistan, while angry lawmakers from both parties cited facts and figures showing just the opposite. Even the senior Republican on the panel, Senator Richard Lugar, found the Administration's claims wanting. "I'm not sure that we have a plan for Afghanistan," he said. Long seen as the "forgotten war" eclipsed by Iraq in U.S. priorities, Afghanistan is in the Washington spotlight this week with the release of three independent reports concluding...
  • Threat Matrix: December 2007

    12/01/2007 8:47:13 PM PST · by nwctwx · 1,428 replies · 7,285+ views
    Calculating the Risks in Pakistan A small group of U.S. military experts and intelligence officials convened in Washington for a classified war game last year, exploring strategies for securing Pakistan's nuclear arsenal if the country's political institutions and military safeguards began to fall apart. The secret exercise — conducted without official sponsorship from any government agency, apparently due to the sensitivity of its subject — was one of several such games the U.S. government has conducted in recent years examining various options and scenarios for Pakistan's nuclear weapons: How many troops might be required for a military intervention in...
  • Inside the Ring-(China cyberwar,w all)

    12/14/2007 3:06:44 AM PST · by Flavius · 1 replies · 129+ views
    washington times ^ | 12/14/07 | Bill Gertz
    Congress passed legislation this week requiring the Pentagon to report on China's growing computer-warfare capabilities when producing assessments of Chinese military power. The fiscal 2008 National Defense Authorization Act, passed yesterday by the House, contains a provision requiring the annual Military Power of the People's Republic of China report to include a new section on Beijing's "efforts to acquire, develop and deploy cyberwarfare capabilities" in its assessments of China's "asymmetric" warfare capabilities
  • Trojan Dragons: China's International Cyber Warriors

    12/13/2007 3:56:56 AM PST · by JACKRUSSELL · 42 replies · 36+ views
    The Heritage Foundation ^ | December 12, 2007 | By John J. Tkacik, Jr.
    This week, The New York Times reported that in a series of "sophisticated attempts" against the U.S. nuclear weapons lab at Oak Ridge, Tennessee, Chinese hackers were able to "remove data."[1] The story illustrates an alarming fact: China's cyber spies are now a part of America's computer network, literally. It is time for U.S. authorities to be open with the American people about the escalating threat posed by China to America's science and technology secrets. Continuous Attacks U.S. Strategic Command Chief General James E. Cartwright told Congress in March 2007 that "America is under widespread attack in cyberspace." During fiscal...
  • Beijing's Attack on the U.K.

    12/11/2007 12:18:22 AM PST · by Bon mots · 8 replies · 199+ views
    Finextra ^ | December 9, 2007 | David Strachan
    Recent revelations of China's state-sponsored cyber attacks on U.K. financial institutions underscores that strategic financial power is high on Beijing's list of priorities. Moreover, these attacks are consistent with "Unrestricted Warfare," a white paper published in 1999 by two PLA Air Force colonels, Qiao Liang and Wang Xiangsui, in which they argue that future wars will be fought on many fronts, and that in fact economic and financial warfare will become an increasingly necessary and accepted form of conflict. Whether Unrestricted Warfare represents today's official view of China's strategic outlook is unclear. What is clear, however, is that from a...
  • Are We Selling China The Rope?-(wow cnn no less)

    12/05/2007 2:47:52 AM PST · by Flavius · 6 replies · 270+ views
    cnn ^ | 12/5/2007 | trading center
    National Security: China continues to develop its cyberwarfare capabilities and hacks into the computer systems of foreign governments and corporations. So why are we considering a deal to show them how? The London Times over the weekend reported that Jonathan Evans, the head of MI5, Britain's domestic spy agency, sent a letter last week to 300 British executives and security chiefs at major corporations warning them they were under attack from "Chinese state organizations" over the Internet. These attacks involved Chinese "trojans" or software designed to hack into computer systems and feed back confidential data. It is the latest example...
  • US Air Force sets up Cyber Command

    09/18/2007 1:27:10 PM PDT · by STARWISE · 18 replies · 167+ views
    Breitbard/AFP ^ | 9-18-07
    The US Air Force established a provisional Cyber Command Tuesday as part of an expanding mission to prepare for wars in cyberspace, officials said. The move comes amid concerns over the vulnerability of the US communications and computer networks to cyber attack in a conflict, as well as the military's desire to exploit the new medium. Air Force Secretary Michael Wynne announced the creation of the new command at Barksdale Air Force Base in Louisiana, where the air force's existing cyber warfare operations are centered. Officials said the provisional command will pave the way within a year for the creation...
  • Pentagon tracks global buildup in China's military

    05/26/2007 7:24:46 PM PDT · by Tolerance Sucks Rocks · 9 replies · 1,035+ views
    Washington Times ^ | May 26, 2007 | Bill Gertz
    China's military buildup is moving beyond countering Taiwan to global operations from the Middle East through Southeast Asia, according to the Pentagon's annual assessment of Chinese military power. "China's military acquisitions and strategic thinking suggests Beijing is also generating capabilities for other regional contingencies, such as conflict over resources or territory," the report to Congress said. The statement, released yesterday, contradicts assessments of some pro-China analysts and intelligence officials who have said the nation's military buildup is relatively benign and limited to resolving the sovereignty issue of Taiwan, which was separated from China in 1949 during a civil war. China...
  • China's Quest for a Superpower Military

    05/22/2007 8:49:17 AM PDT · by TigerLikesRooster · 31 replies · 1,032+ views
    Heritage Foundation ^ | 05/17/07 | John J. Tkacik, Jr.
    May 17, 2007 China's Quest for a Superpower Military by John J. Tkacik, Jr. Backgrounder #2036 The National People's Congress of the People's Republic of China (PRC) announced on March 4, 2007, that it would increase the country's military budget by 17.8 percent in 2007 to a total of $45 bil­lion—by far the largest acknowledged amount that China has ever spent on its military.1 The Chinese government went out of its way to reassure the world that this spending hike was normal and need not worry anyone. "China is committed to taking a path of peaceful development and it pursues...
  • INFORMATION WARFARE: The Mysterious Botnets of China

    04/12/2006 3:07:09 AM PDT · by Wiz · 7 replies · 560+ views
    Strategy Page ^ | 2006 Apr 11
    April 11, 2006: Cyber Criminals are developing weapons and tactics that are providing real-life examples of what Cyber War would be like. In the last few years, organized gangs have gotten into online crime in a big way, pushing aside the amateurs and part-timers who had dominated the scene for so long. The motivator is money, and the fact that 95 percent of online crimes never get punished. In the last year, the amount of software developed to steal money online has increased 500 percent. While spam is still a major source of this larcenous malware, most of it is...
  • The Invasion Of The Chinese Cyberspies (into "secure" military computers)

    08/28/2005 10:56:31 AM PDT · by FairOpinion · 38 replies · 989+ views
    Time Magazine ^ | Aug. 28, 2005 | NATHAN THORNBURGH
    Carpenter had never seen hackers work so quickly, with such a sense of purpose. They would commandeer a hidden section of a hard drive, zip up as many files as possible and immediately transmit the data to way stations in South Korea, Hong Kong or Taiwan before sending them to mainland China. They always made a silent escape, wiping their electronic fingerprints clean and leaving behind an almost undetectable beacon allowing them to re-enter the machine at will. An entire attack took 10 to 30 minutes. "Most hackers, if they actually get into a government network, get excited and make...
  • North Korea ready to launch cyber war -- defense ministry report

    10/03/2004 9:24:05 PM PDT · by HAL9000 · 22 replies · 647+ views
    Agence France Presse | October 4, 2004
    SEOUL, Oct 4 (AFP) - North Korea has trained more than 500 computer hackers capable of launching cyber warfare against the United States, South Korea's defense ministry said Monday. In a report to the National Assembly's National Defense Committee, the ministry said that hackers from the impoverished Stalinist state were among the best in the world. "North Korea's intelligence warfare capability is estimated to have reached the level of advanced countries," the report said, according to Yonhap news agency. The military hackers had been put through a five-year university course training them to penetrate the computer systems of South...

    08/15/2004 12:21:04 PM PDT · by neverdem · 13 replies · 696+ views
    NY Post ^ | August 15, 2004 | HILARY KRAMER
    August 15, 2004 -- With little fanfare, the Federal Reserve will begin transferring the nation's money supply over an Internet-based system this month — a move critics say could open the U.S.'s banking system to cyber threats. The Fed moves about $1.8 trillion a day on a closed, stand-alone computer network. But soon it will switch to a system called FedLine Advantage, a Web-based technology. Proponents say the system is more efficient and flexible. The current system is outdated, using DOS — Microsoft's predecessor to the Windows operating system. But security experts say the threat of outside access is too...
  • US Nuclear Regulator Warns on Worms

    09/05/2003 9:01:34 PM PDT · by Hal1950 · 15 replies · 472+ views
    Computer Business Review ^ | September 6, 2003
    The US Nuclear Regulatory Commission this week warned nuclear power plant operators to implement safeguards against the Slammer worm, which took systems at one such plant offline in January. The advisory details exactly how the Davis-Besse power plant in Ohio, operated by FirstEnergy Corp, had its "safety parameter display system" and "plant process computer" made unavailable for several hours by the worm. The news of the outage came to light after a report by two weeks ago. It is particularly concerning as Slammer was preventable - it exploited a vulnerability in SQL Server that Microsoft Corp had issued a...
  • Cabinet says computers under attack (China cyber attacking Taiwan?)

    09/05/2003 1:42:46 PM PDT · by Michael Barnes · 9 replies · 402+ views
    Taipei Times ^ | ep 04, 2003 | Ko Shu-ling
    China has launched a systematic information warfare campaign against Taiwan, spreading Trojan-horse programs into private companies' computers as a means to break into government databases, the Cabinet said yesterday. "National intelligence has indicated that an army of hackers based in China's Hubei and Fujian provinces has successfully spread 23 different Trojan horse programs to the networks 10 private high-tech companies here to use them as a springboard to break into at least 30 different government agencies and 50 private companies," Cabinet Spokesman Lin Chia-lung (ªL¨ÎÀs) said yesterday. The government agencies invaded by the Trojan-horse programs include the National Police Administration,...

    08/18/2003 10:39:31 AM PDT · by Terriergal · 16 replies · 358+ views
    How vulnerable is the United States to attack from cyberspace? How imminent is the threat? Many experts believe the clock is already ticking, and that America is already fighting a Cyberwar... You can download and watch the whole show here. Just click on "Watch the full program" at the top left.
  • U.S. government warns 'patriot hackers' against cyber attacks on Iraqi interests

    02/12/2003 7:39:12 PM PST · by HAL9000 · 1 replies · 208+ views
    Associated Press | February 12, 2003 | DAVID PACE
    WASHINGTON, Feb 12, 2003 (AP WorldStream via COMTEX) -- The FBI's National Infrastructure Protection Center warned that growing tensions between the United States and Iraq could lead to an increase in global computer hacking activities on both sides. "Regardless of the motivation, the NIPC reiterates such activity is illegal and punishable as a felony," the agency warned Wednesday on its Web site. "The U.S. government does not condone so-called 'patriot hacking' on its behalf. "Further, even 'patriotic hackers' can be fooled into launching attacks against their own interests by exploiting malicious code that purports to attack the other side...
  • U.S. Plans for Cyber Warfare [Reuters]

    02/08/2003 6:38:14 AM PST · by summer · 1 replies · 139+ views
    Reuters via ^ | Feb. 7, 2003 | Reuters
    <p>The White House reveals that the president signed a security directive in July ordering the government to develop rules for deciding when and how the United States would attack enemy computer networks.</p> <p>WASHINGTON -- President Bush has ordered the government to draw up guidelines for electronic attacks against enemy computer networks, the Washington Post reported on Friday.</p>