Skip to main content

Home/ ARIN6902 Internet Cultures and Governance/ Group items tagged Cyber Attacks

Rss Feed Group items tagged

Sarah Manson

Google Attacks Highlight Growing Problem of Cyber Security Threats | Science and Techno... - 0 views

  •  
    This article is dealing with the recent disclosure by Google that it had fallen victim to a cyber attack. It renews the growing sentiment that a global response to the issue of cybersecurity is needed with particular emphasis on the cooperation between the government and business sectors.
  •  
    Interesting comparison was made in this article regarding President Obama's priorities. It stated that "Obama has made cyber security a top priority for his administration, and has listed the threat from cyber weapons along with other weapons of mass destruction - such as nuclear, chemical and biological weapons." Is it fair to make a comparison between the threat of nuclear weapons and threats which exist within the world of computers?
Amit Kelkar

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  •  
    Howard Schdmit, The Whitehouse's Cybersecurity coordinator has revealed the US Government's plans for tackling attacks on it's networks. He has promised transparency. The official announcement (this bookmark) is very vague in it's initiatives. It will be interesting to see whether their can really separate US government networks from other parts of the Internet.  Cyber attacks are definitely increasing and play a major part in conflicts between countries. China amongst others is said to have attacked & attempted to hack and launch DoS attacks on US government networks and Russia shut down the Georgian communications infrastructure during the last week between the two countries et. )
Stephen Murphy

Cyber Espionage 2.0 - 0 views

  •  
    Highly detailed white paper on the underworld of cyber-espionage. Multinational corporation and state sponsored - all explore this backbone of the internet to get an advantage. Note: This gets quite technical at times. Very eye opening considering the recent events with the Australian/China cyber attacks on government and corporate targets.
César Albarrán Torres

Google Links Web Attacks to Vietnam Mine Dispute - NYTimes.com - 0 views

  • oogle, fresh off a dispute with China over censorship and intrusion from hackers, says it has identified cyber-attacks aimed at silencing critics of a controversial, Chinese-backed bauxite mining project in Vietnam.
  • to spy on their owners and to attack blogs containing messages of political dissen
  • It added: “This incident underscores that not every attack is motivated by data theft or money. This is likely the latest example of hacktivism and politically motivated cyberattacks, which are on the rise.”
  •  
    Google blames Chinese-backed groups for attacking blogs of political critics. But who can stop this actions, who has the power to, within the current legal framework, do so?
anonymous

China-Based Hackers may Have used Twitter, Google to Attack Dalai Lama - 0 views

  •  
    This article (posted yesterday) is about the announcement of a huge China-based cyber espionage which stole thousands of documents - including classified information, visa applications, and personal identities - from "politically sensitive targets" around the world using platforms such as Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo Mail to maintain persistent control of infected computers. Among the targets: the offices of the Dalai Lama, the United Nations as well as Indian and Pakistani government officials. Also available in this article, a report document of 58 pages about "Investigating Cyber Espionnage" (scribd application)
Allison Jones

http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general - 1 views

  •  
    Increasing "probes" on US military networks has led to the appointment of a senior general to Cyber Command operations and approximately 30,000 troops have been re-assigned from IT support to "the frontlines of cyberwarfare". The US is increasingly anxious about the vulnerability of its networks to attack. Chinese, Russian and Korean hackers have been targeted as alleged attackers so far. There is concern that cyberwarfare techniques being used by the US are outpacing the ability to develop policy surrounding their use.
Elizabeth Gan

War game reveals U.S. lacks cyber-crisis skills - 0 views

  •  
    This article discusses how a simulated war game called "Cyber ShockWave" can turn any electronic item, for example, cell phone or computer can be "weapons" used to shut down the Internet during terrorist attack. The notion of privacy and civil liberties, should expect to be ceased for Americans during a crisis of that level. During this mock scenario, it was revealed that "[The United States] don't have the authority in this nation as a government to quarantine people's cellphones." Which during a state of emergency brings to question if Internet carriers should allow their networks to be monitored. How secure is online security, and who is the enemy, becomes difficult to discern, as any threat to national security arises.
yunju wang

Official Google Blog: A new approach to China - 0 views

  • twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.
  •  
    google's response to the cyber attacks in China, and claim to close google.cn.
M M

Govt to develop own operating system - Infrastucture - Enterprise IT - Tech - The Times... - 0 views

  •  
    India's government is planning to develop its own OS due to security reasons. They do not want to rely on foreign operating systems as they believe this makes them more susceptible to cyber attacks. 
Gina Spithakis

Cyber crime made easy; A burgeoning service industry is springing up around the creatio... - 0 views

  •  
    With technology making it easier to for computer novices to steal user ids and data, now anyone can become a cybercriminal. This article showcases how easy it is to buy Zeus online, malware software which is used to steal information including online banking user ids and passwords and even security plans of US airports. Does accessibility turn you into a criminal? I still think if you're going to be a criminal you will find a way. Technology is certainly making it easier but you will only search for ways to hack into user info if you intend to steal in the first place.
yunju wang

Canberra urged to join net fightback | The Australian - 1 views

  • graduated-response" antipiracy laws, joining South Korea, Taiwan and New Zealand as the only nations to attack illegal downloading through a government-mandated system of warnings and penalties.
  •  
    Australiam Government may take some actions to prevent online piracy, now with the iinet case is still on going, AFACT urges the government to do something to stop repeat copyright theft in cyber world.
Tom Berzins

There's more to security risk management than just patching - 0 views

  •  
    With an increasing number of critical systems being placed within virtual environments, security is now understandably a prime concern. Systems can be attacked, and valuable information and assets can be compromised. maybe looking at a Vulnerability management system?
Gina Spithakis

Verizon security expert optimistic about progress on cybersecurity - 1 views

  •  
    According to Peter Tippett, Vice President, Verizon, we will see far fewer cyber attacks by 2020, with the majority of them becoming targetted attacks instead. This will be aided by increased use of reputation systems and automation that will help users avoid sites and emails with malicious content.
Anne Zozo

BBC News - Yahoo criticised by Alibaba for 'reckless' China stance - 0 views

  • Yahoo criticised by Alibaba for 'reckless' China stance Yahoo is reported to have been targeted by hackers in China Yahoo's partner in China has called the US internet giant "reckless" for supporting Google in its stand-off with Beijing over alleged cyber-attacks.Yahoo said it was "aligned" with Google's position that the violati
  • Yahoo said it was "aligned" with Google's position that the violation of internet privacy was deeply disturbing and something that had to be opposed. But an Alibaba Group spokesman said on Saturday it did not "share this view".
  •  
    Google speaks out on censorship and the violation of user privacy in China. Yahoo in the US agrees but its Chinese partner Alibaba Group does not. Are they afraid of a backlash from Beijing and fear for their ungoing business success? Makes me wonder how bad the quagmire in China really is...
1 - 14 of 14
Showing 20 items per page