Skip to main content

Home/ IB ITGS/ Group items tagged attack

Rss Feed Group items tagged

Chalana Perera

Strategic Impact of Cyber Attacks (IRL Estonia) - 0 views

  •  
    This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
Chalana Perera

US plans for cyber attacks (News24) - 1 views

  • disabled US cell phone networks, slowed internet traffic to a crawl and crippled America's power grid
  • stealth cyber attack and a pair of bombings, cutting electricity to tens of millions of homes.
  • has the authority to use the full powers at his disposal
  •  
    This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
ajay tambay

Forecasting Malicious Internet Attacks - 0 views

  • cyberspace is dominated by it
    • ajay tambay
       
      IT Systems - Internet
  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • ajay tambay
       
      Social - Security
  • Last year, computer scientists began exploring a potentially more effective approach: predicting the sites most likely to attack and blocking them in advance. The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims .
    • ajay tambay
       
      Impact - Business, education
Jeewon Yoon

Technology Review: Blogs: arXiv blog: How to Forecast Malicious Internet Attacks - 0 views

  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • Jeewon Yoon
       
      Social Security
  • The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims . It then runs a Google PageRank type algorithm for each victim looking for the most relevant attackers.
    • Jeewon Yoon
       
      IT Systems Communication systems
iman mustafa

Twitter, Facebook attack targeted one user - 0 views

  • The blogger, who uses the account name "Cyxymu," (the name of a town in the Republic of Georgia) had accounts on all of the different sites that were attacked at the same time, Max Kelly, chief security officer at Facebook, told CNET New
  • A Georgian blogger with accounts on Twitter, Facebook, LiveJournal, and Google's Blogger and YouTube was targeted in a denial-of-service attack that led to the sitewide outage at Twitter and problems at the other sites on Thursday, according to a Facebook executive.
  • Kelly declined to speculate on who was behind the attack, but he said: "You have to ask who would benefit the most from doing this and think about what those people are doing and the disregard for the rest of the users and the Internet."
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Chalana Perera

Economic Impacts of Cyber-Attacks (CISCO) - 0 views

  •  
    This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
Chalana Perera

Protect the U.S. from cyber attacks (The Hill) - 0 views

  • technological fixes to this challenge may be easier to solve than the underlying policy questions
  •  
    This article looks at some technological possibilities that would help prevent and prohibit extensive cyber-attacks.
iman mustafa

Spam offers to let people use their PC to attack Obama site - 0 views

  • The e-mail message says: "If You dont like Obama come here, you can help to ddos his site with your installs."
  • It's not clear whether the software does turn the computer into a DoS attacking zombie, or what it does, if anything. But it would be crazy to expose your computer like that, regardless of your political leanings.
Jason Carlson

Lying - 48 views

In this situation, the man should be asked if he wants to hear straight away and the doctors should know and understand the immediate phycological impacts on sharing the truth straight away, and th...

samaraad

Burma hit by massive net attack ahead of election - 2 views

  •  
    An ongoing computer attack has knocked Burma off the internet, just days ahead of its first election in 20 years. This can have political impacts!
Maliha Rahman

Background on Phishing Attacks-(The Honeynet Project) - 1 views

  •  
    This is a page of the honeynet project. It discusses the history of phishing and how it has developed since 1990. How it has affected businesses and how it's popularity has increased. It also discusses the technology part behind the phishing attacks.
Eunice Vincent

Anti-Phishing Specialists - Phishing Monitoring - 0 views

  •  
    FraudWatch International offers a proactive, affordable phishing attack solution, incorporating 24x7 monitoring & detection and a rapid incident response ensuring timely web site take down.
Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
Farah Alam

Slashdot IT Story | Hackers (Or Pen-Testers) Hit Credit Unions With Malware On CD - 0 views

  • The discs have been showing up at credit unions around the country recently, a throwback to the days when viruses and Trojans were distributed via floppy disk.
  • the infected CDs
  • rather than an actual attack.
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
1 - 20 of 31 Next ›
Showing 20 items per page