The U.S. Attorney's Office today unsealed an indictment charging four Russians and a Ukrainian with a multi-million hacking scheme that netted 160 million credit card numbers from several major American and international corporations.
Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
Phil,
This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands.
Lee
A smaller version of the simple device known as the beagle board can be inserted into an apple charger to pose multiple security risks for the once secure hardware developer.
This is the website of Black Hat that lists the dates of the Las Vegas security conference, where the unveiling of the device known as Mactans (charger that is capable of hacking into an iPhone) will take place.
This was an interesting source that talks about how our adversary can utilized off the shelf programs to defeat the multi-million dollars system of our UAV programs.
This article requires that you login into the UMUC Library in order to view it. It dealt with a more technical aspect of what the UAV is all about it. It contains drawings and addresses some ethical concerns.
With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
This was an interesting article. I wish it explained how the attack was carried out. I am surprised that firewalls would not be a part of VOIP installation for large institutions. The treat has always been there. I am guessing that somebody cut costs up front and paid for it later. Maybe the attacker sold them the firewalls?