Skip to main content

Home/ History Readings/ Group items matching "cyber" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
anonymous

US Treasury and commerce department targeted in cyber-attack | BBC - 0 views

  • US federal agencies have been hacked in a way that may have let a foreign power monitor government communications.
  • And all federal civilian agencies have been told to disconnect from SolarWinds Orion, a computer network tool being exploited by "malicious actors".FireEye, a company that provides US government cyber-security, says it identified the problem after its own hacking tools were stolen last week.
  • SolarWinds said its 300,000 global customers included all five branches of the US military, the Pentagon, the State Department and the Office of the President of the United States - and all users of its Orion platform should upgrade immediately to address a "security vulnerability".
  • ...3 more annotations...
  • Russia was believed to be behind it.
  • The so-called supply-chain attack means hackers effectively have access to all of SolarWinds's customers.
  • It turns out FireEye was just a small part of a much larger and more serious hack attack.
anonymous

Suspected Russian hackers spied on U.S. Treasury emails - sources | Reuters - 1 views

  • Hackers believed to be working for Russia have been monitoring internal email traffic at the U.S. Treasury and Commerce departments,
  • The hack is so serious it led to a National Security Council meeting at the White House
  • The U.S. government has not publicly identified who might be behind the hacking
  • ...6 more annotations...
  • Russia is currently believed to be responsible for the attack.
  • the Russian foreign ministry described the allegations as another unfounded attempt by the U.S. media to blame Russia for cyberattacks against U.S. agencies.
  • its customers include most of America’s Fortune 500 companies, the top 10 U.S. telecommunications providers, all five branches of the U.S. military, the State Department, the National Security Agency, and the Office of President of the United States.
  • “This is a huge cyber espionage campaign targeting the U.S. government and its interests.”
  • The hackers are “highly sophisticated” and have been able to trick the Microsoft platform’s authentication controls
  • “This is a nation state,” said a different person briefed on the matter.
criscimagnael

Hackers Bring Down Government Sites in Ukraine - The New York Times - 0 views

  • Hackers brought down dozens of Ukrainian government websites on Friday and posted a message on one saying, “Be afraid and expect the worst,” a day after a breakdown in diplomatic talks between Russia and the West intended to forestall a threatened Russian invasion of the country.
  • Diplomats and analysts have been anticipating a cyberattack on Ukraine, but proving the source of such actions is notoriously difficult.
  • A Ukrainian government agency, the Center for Strategic Communications and Information Security, which was established to counter Russian disinformation, later issued a statement more directly blaming Russia for the hack.
  • ...19 more annotations...
  • “the United States and its allies are actually saying ‘no’ to key elements of these texts,” referring to two draft treaties on security issues that Russia had proposed to NATO and the United States.
  • “Ukrainians! All your personal data was uploaded to the internet,” the message read. “All data on the computer is being destroyed. All information about you became public. Be afraid and expect the worst.”
  • The attack came within hours of the conclusion of talks between Russia and the United States and NATO that were intended to find a diplomatic resolution after Russia massed tens of thousands of troops near the border with Ukraine.
  • On Friday, the Biden administration also accused Moscow of sending saboteurs into eastern Ukraine to stage an incident that could provide Russia with a pretext for invasion.
  • Moscow has demanded sweeping security concessions, including a promise not to accept Ukraine into the NATO alliance. But the cyberattack Friday led to immediate pledges of support and closer cooperation with Ukraine from NATO and the European Union, exactly the opposite of what Russian diplomats had said they were seeking.
  • On Thursday, Russian officials said the talks had not yielded results, and one senior diplomat said they were approaching “a dead end.”
  • A Russian military spyware strain called X-Agent, or Sofacy, that Ukrainian cyber experts say was used to hack Ukraine’s Central Election Commission during a 2014 presidential election, for example, was later found in the server of the Democratic National Committee in the United States after the electoral hacking attacks in 2016.
  • Ukrainian government websites began crashing a few hours later, according to the Ukrainian Foreign Ministry, which said the cyberattack occurred overnight from Thursday to Friday.
  • “We have not seen such a significant attack on government organizations in some time,” it said. “We suggest the current attack is tied to the recent failure of Russian negotiations on Ukraine’s future in NATO,” it added, referring to Moscow’s talks with the West.
  • The websites of the president and the defense ministry remained online. Ukrainian officials said the attack targeted 70 government websites.
  • the hacking activity targeting state bodies could be a part of this psychological attack on Ukrainians.”
  • “I strongly condemn the cyberattacks on the Ukrainian Government,” Mr. Stoltenberg said in a statement, adding, “NATO & Ukraine will step up cyber cooperation & we will continue our strong political & practical support.”
  • Sophisticated cybertools have turned up in standoffs between Israel and Iran, and the United States blamed Russia for using hacking to influence the 2016 election in the United States to benefit Donald J. Trump.
  • The U.S. government has traced some of the most drastic cyberattacks of the past decade to Russian actions in Ukraine.
  • By morning, the hack had crippled much of the government’s public-facing digital infrastructure, including the most widely used site for handling government services online, Diia. The smartphone app version of the program was still operating, the Ukrainska Pravda newspaper reported. Diia also has a role in Ukraine’s coronavirus response and in encouraging vaccination.
  • The malware, known as NotPetya, had targeted a type of Ukrainian tax preparation software but apparently spun out of control, according to experts.
  • It coincided with the assassination of a Ukrainian military intelligence officer in a car bombing in Kyiv and the start of an E.U. policy granting Ukrainians visa-free travel, an example of the type of integration with the West that Russia has opposed.
  • But NotPetya spread around the world, with devastating results, illustrating the risks of collateral damage from military cyberattacks for people and businesses whose lives are increasingly conducted online, even if they live far from conflict zones
  • The total global cost is thought to be far higher
kennyn-77

Is Ukraine ready for a Russian attack? Yes and no : NPR - 0 views

  • Over the months that Russia amassed more than 100,000 troops on the borders of Ukraine
  • Ukraine is vulnerable to a major cyber attack
  • Ukraine has repeatedly been a target of cyberattacks, especially since the 2014 Russian invasion of Crimea. In the years since Crimea's annexation — which is unrecognized by the international community — near-constant cyber warfare, much of it from Russia, has targeted almost every sector in Ukraine, from its power grid to its treasury to its media companies.
  • ...11 more annotations...
  • Since 2014, the U.S. has spent tens of millions of dollars toward arming Ukraine with hardware, software and training to secure its critical infrastructure. Those efforts have ramped up in recent months.
  • But Russian disinformation has become less effective
  • When war broke out in eastern Ukraine in 2014, fake news from Russia flooded over the border with the aim of instilling panic in parts of the country with greater sympathy for Russia, like Crimea, turning them away from the Ukrainian government and toward Russia.
  • Russian state-owned TV broadcast false stories about "fascists" in the streets of Kyiv, a ban on the Russian language in Ukraine, and looming food riots and rationing. One story, broadcast on Russian state TV, claimed that Ukrainian soldiers had brutally murdered and crucified a three-year-old boy.
  • Authorities in Kyiv are working to prepare the city
  • One example: A series of bomb scares were called into Ukrainian schools in recent weeks, but many parents shrugged them off.
  • Although an invasion feels unlikely to many who live in Kyiv, city officials say they are not as prepared as they'd like to be.
  • Kyiv has thousands of bomb shelters that date back to the Soviet era, when some of the USSR's nuclear arsenal was based in Ukraine. Over the past several months, authorities have been working to bring as many shelters as possible back into operation. But many are still unusable. Some have been flooded, others are inaccessible. Some shelters have even been taken over by barbershops or bakeries that have set up shop inside. "Authorities will have to take care of this situation and take it more seriously," Mykhailova said.
  • Ukraine's military has strengthened since 2014
  • "Ukrainian troops are well-trained, they're well-equipped and they're very motivated. Ukrainians in general and the Ukrainian military are very patriotic. They love Ukraine. They're willing to fight to save it," said Kristina Kvien, the top U.S. diplomat in Kyiv, in an interview with All Things Considered on Friday.
  • That improvement has come with major help from international donors, primarily the United States. The U.S. has committed more than $5.4 billion in aid to Ukraine since 2014, according to the State Department. About half that total has been security assistance, with the Biden administration announcing another $200 million on Wednesday. Over the years, that military aid has taken many forms: Humvees, patrol boats, counter-artillery radar, a joint training center in western Ukraine.
B Mannke

U.S. Demands China Crack Down on Cyberattacks - NYTimes.com - 0 views

  • “acceptable norms of behavior in cyberspace.”
  • was the first public confrontation with China
  • : public recognition of the urgency of the problem; a commitment to crack down on hackers in China; and an agreement to take part in a dialogue to establish global standards.
  • ...3 more annotations...
  • a delicate balancing act at a time when the United States is seeking China’s cooperation in containing North Korea’s nuclear and missile programs, and joining in sanctions on Iran
  • “perfect storm”
  • the United States had assets in place “to insure that South Korea’s defense is provided for.”
James Flanagan

Chinese hackers outed themselves by logging into their personal Facebook accounts - 1 views

  • Mandiant, the U.S. firm contracted to investigate cyberattacks against U.S. corporations, says it was able to track an extensive hacking campaign back to the Chinese military in part by exploiting China’s own Web restrictions.
  • China’s “Great Firewall” blocks Web access to, among other things, Facebook and Twitter. People in China can get around the firewall, and very Web-savvy Chinese often do, by using something called VPNs, or Virtual Private Networks. But Chinese hackers already have access to what is presumably an extremely sophisticated VPN: the very servers they use for their foreign hacking.
  • according to Mandiant, some of the hackers got lazy. “The easiest way for them to log into Facebook and Twitter is directly from their attack infrastructure,” the company’s report explains. “Once noticed, this is an effective way to discover their real identities.” When the hacker uses the “attack” servers to log in to Twitter or Facebook, he or she unintentionally links the espionage servers with specific Facebook and Twitter accounts — in other words, with specific human beings.
zachcutler

American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016 - 0 views

  • American vigilante hacker sends Russia a warning
  • "Comrades! We interrupt regular scheduled Russian Foreign Affairs Website programming to bring you the following important message," he wrote. "Knock it off. You may be able to push around nations around you, but this is America. Nobody is impressed."
  • Stolen emails have been taken by Russia and published by WikiLeaks. Russia and President Vladimir Putin have denied involvement. The Jester referenced Putin's denial in his webpage graffiti.
  • ...4 more annotations...
  • MID.ru is the official website of the Russian agency that is in charge of maintaining that country's international diplomacy -- equivalent to the U.S. Department of State.
  • Jester has taken down jihadist websites, hacking into communication forums, and identifying potential terrorist threats. Ex-FBI agents have called him "the Batman of the internet." CNNMoney profiled this mysterious vigilante last year.
  • In an exclusive interview with CNNMoney this weekend, Jester said he chose to attack Russia out of frustration for the massive DNS cyberattack that knocked out a portion of the internet in the United States on Friday.
  • As of 11 a.m. ET Saturday, the message remained online. Jester wants the Russians to take it seriously. He's not the only American hacker with this kind of capability. "Think of this as a professional courtesy," his public warning states. "Or if you prefer message from 'USA with love.'"
Javier E

It's the end of the West as we know it - The Washington Post - 0 views

  • It is only with effort that the leaders of Europe have managed to compose themselves after the U.S. election, torn between pure shock over the result and the necessity of preserving what can be preserved of the West and the Atlantic relationship.
  • this is the end of the West as we know it.
  • For more than half a century, this story of phenomenal success has been built on a commitment to freedom and democracy, free trade, solid alliances and reliable friendships.
  • ...7 more annotations...
  • But all of this has been either attacked or questioned by Trump.
  • A peaceful, free and prosperous Europe has been a key strategic U.S. interest.
  • There has been a recognition that this aim is best furthered by the process of European integration centered on the European Union. A Europe that starts fracturing will be a less stable and, in the longer perspective, also a more dangerous Europe.
  • When Trump receives the jubilant British anti-Europe campaigner Nigel Farage before seeing other foreign politicians, he is sending the worst possible signal to Europe. By design or by default, he transmits a signal of support to those dark forces in various countries trying to undo what generations of U.S. and European statesmen have worked to achieve.
  • But the list of European concerns certainly doesn’t end there. It also includes his talk of abrogating the Paris global climate agreement, undermining the Iran deal, questioning important free-trade agreements — signature achievements and goals of the past few years that are suddenly up in the air.
  • Europe certainly has nothing against good relations with Russia, but they have to be based on rolling back aggression against Ukraine, ceasing silent cyber-operations and respecting the rules agreed upon between nations.
  • he should see the imperative of trade deals on the free-trade terms of the West, rather than allow a world dominated by the rules-free mercantilist approach of a China that will always give priority to its own gains. A tra
Javier E

In today's world, the truth is losing - The Washington Post - 0 views

  • in the nearly three years since he joined the State Department, Stengel has seen the rise of what he calls a “post-truth” world, where the facts are sometimes overwhelmed by propaganda from Russia and the Islamic State.
  • “We like to think that truth has to battle itself out in the marketplace of ideas. Well, it may be losing in that marketplace today,” Stengel warned in an interview. “Simply having fact-based messaging is not sufficient to win the information war.
  • How do we protect the essential resource of democracy — the truth — from the toxin of lies that surrounds it? It’s like a virus or food poisoning. It needs to be controlled. But how?
  • ...13 more annotations...
  • Now, says Stengel, social media give everyone the opportunity to construct their own narrative of reality
  • , the problems of today’s information-saturated society would have been unimaginable for Marshall, who lived at a time when information was scarce and precious and when openness brought change.
  • Stengel argues that the U.S. government should sometimes protect citizens by exposing “weaponized information, false information” that is polluting the ecosystem. But ultimately, the defense of truth must be independent of a government that many people mistrust. “There are inherent dangers in having the government be the verifier of last resort,”
  • “They’re not trying to say that their version of events is the true one. They’re saying: ‘Everybody’s lying! Nobody’s telling you the truth!’ ”
  • For a Russian leadership schooled on KGB tactics, Pomerantsev argues, “It’s not an information war. It’s a war on information.”
  • “The central insight was that we’re not the best messenger for our message,” Stengel explains, “because in the post-truth world, the people we’re trying to reach automatically question anything from the U.S. government.
  • “They don’t have a candidate, per se. But they want to undermine faith in democracy, faith in the West.” In the cyber-propagandists’ atomized, construct-your-own-narrative world, agreement on a common framework of factual evidence can become almost impossible.
  • How should citizens who want a fact-based world combat this assault on truth? Stengel has approved State Department programs that teach investigative reporting and empower truth-tellers, but he’s right that this isn’t really a job for Uncle Sam
  • The best hope may be the global companies that have created the social-media platforms. “They see this information war as an existential threat,” says Stengel. The tech companies have made a start: He says Twitter has removed more than 400,000 accounts, and YouTube daily deletes extremist videos.
  • The real challenge for global tech giants is to restore the currency of truth.
  • Perhaps “machine learning” can identify falsehoods and expose every argument that uses them. Perhaps someday, a human-machine process will create what Stengel describes as a “global ombudsman for information.”
  • right now, the truth is losing.
  • Which side will America’s next president take in the war on information?
horowitzza

How Trump's reset with Russia can work (Opinion) - CNN.com - 0 views

  • "Wouldn't it be nice if we actually got along with Russia?"
  • President Obama's feckless handling of Russia has been so embarrassing that it may have emboldened Putin to annex Crimea, and terrified NATO allies along Russia's border.
  • When Trump takes office on January 20, he will have to contend with a slew of issues that demonstrate the extent to which Russia and America are strategically interdependent
  • ...7 more annotations...
  • arms control to China, from radical Islamic terrorism to cyber threats and from nuclear proliferation to the price of energy. For all of the liberal media's mockery of Trump, he's right that dialogue with Moscow is essential, although dialogue with Moscow will be productive only if we talk about the tough issues we disagree on.
  • Getting along with Russia is a worthy goal, so long as the purpose is to attain a specific set of ends, not friendship for friendship's sake.
  • "Russia is a riddle wrapped in a mystery inside an enigma,"
  • We may, however, be able to cooperate with Russia on some issues, like terrorism, arms control, and perhaps stabilizing Central Asia
  • Russia may be calling the shots there, and may try to leverage this in other sensitive regions, such as the Baltics.
  • America does not have a Putin problem. Putin is a fairly typical Russian authoritarian leader, although more effective than most. If he were to pass away or be overthrown tomorrow, his successor would likely pursue a substantively similar foreign policy. America has a Russia problem, in that we have a difference in interests.
  • President-elect Trump is right: it would be nice if we got along with Russia. Every President since the end of the Cold War has had a similar sentiment. It is important to see dialogue and engagement as tools for achieving our objectives, not ends in and of themselves.
marleymorton

Senate intelligence panel to probe Russia hacking - 0 views

  •  
    Politics | Fri Jan 13, 2017 | 6:46pm EST WASHINGTON The leaders of the Senate Intelligence Committee said the panel will investigate allegations Russia used cyber attacks to influence the U.S. presidential election, including any links between Russia and the political campaigns.
zachcutler

Obama Orders Review of Hacking During Election 2016 - WSJ - 0 views

  • Obama Orders Review of Hacking During Election 2016
  • President Barack Obama has instructed U.S. intelligence agencies to investigate hacking activity aimed at meddling in the 2016 election, one of his top security advisers said Friday.
  • The administration was short on details about what the report would cover, and it wasn’t immediately clear how it would differ from the investigations that intelligence agencies, the Federal Bureau of Investigation and the Homeland Security Department have already conducted.
  • ...5 more annotations...
  • The report could put President-elect Donald Trump, who has consistently denied Russia’s involvement, in the position of having to respond to yet another review of the hacks by the intelligence agencies that he will eventually direct.
  • After the 2014 hack of Sony Pictures Entertainment, FBI Director James Comey publicly detailed technical evidence tying the intrusions to North Korea, in order to refute some experts who doubted the link.
  • Analogous to the panel that investigated the Sept. 11, 2001, terrorist attacks, it would be composed of outside experts and would have the power to interview witnesses and issue subpoenas and hear public testimony.
  • Sen. Lindsey Graham (R., S.C.) said this week he would head up a review of the Russian operation. Mr. Graham has previously called on Congress to look into the Russian hacks. He said Friday that his probe would look beyond Russia’s malicious cyberactivity.
  • Top Russian officials have shifted away from denying a role in the hack of the Democratic National Committee. Mr. Putin has said it is irrelevant who stole the computer records, and the foreign minister said the U.S. hasn’t proven anything so far.
ethanmoser

Russian security chief says country seeing more cyberattacks | Fox News - 0 views

  • Russian security chief says country seeing more cyberattacks
  • MOSCOW –  The head of the Russian Security Council says the country recently has seen a marked increase in attempted cyberattacks from overseas.
  • The alleged cyberattacks included penetrations of the Democratic National Committee and the campaign of Hillary Clinton.
  • ...1 more annotation...
  • The Russian news agencies quoted Patrushev saying in an interview that is to appear in state newspaper Rossiiskaya Gazeta: "Recently, we have established a significant growth in attempts to inflict damage on the Russian information system from the side of outside powers."
Javier E

Facebook temporarily bans author after he calls Trump fans 'nasty fascistic lot' | Technology | The Guardian - 0 views

  • Sessums received a notification from Facebook that the post violated the company’s “community standards” and that he was barred from posting for 24 hours.
  • “What will the cyber world be like under a Trump administration?” he asked, referencing Facebook board member Peter Thiel’s support of the president-elect. “This is chilling to me.”
  • For Sessums, the temporary banning was particularly significant because he uses his Facebook page as a “personal blog”. The author has about 20,000 friends and followers, and he considers his frequent posts a “meta-memoir”
ecfruchtman

Russia sanctions announced by White House - 0 views

  •  
    The administration described Russia's involvement as "Significant Malicious Cyber-Enabled Activities" and sanctioned four Russian individuals and five Russian entities for what it said was election interference. The administration also ordered 35 Russian diplomats to leave the country and two Russian compounds are being closed.
proudsa

Will the Constitution Protect Your Next Smartphone? - The Atlantic - 0 views

  • he preeminent cyber-prophet of the day
  • The next frontier—devices that can detect an authorized user based solely on the quirks of how they interact with it—is just around the bend.
  • Will new unlocking methods enjoy the same Fifth Amendment protections that prevent the government from forcing a person to give up their passwords?
  • ...6 more annotations...
  • Indeed, just a year later, a Virginia judge ruled that police could force a person to unlock his own iPhone with his fingerprint. And this February, a federal judge in Los Angeles signed a search warrant that compelled a 29-year-old woman to do the same.
  • “Unlocking devices through biometric systems generally won’t raise Fifth Amendment issues.”
  • “When you put your fingerprint on the phone, you’re actually communicating something,” Gidari said. “You’re saying, ‘Hi, it’s me. Please open up.’”
  • With that nuanced a system, it’s unclear how police could force a user to retrieve information from a phone, even with a legal court order in hand.
  • It’s possible that a more advanced system, however, would be able to pick up even a slight tremor of fear and lock up.
  • a strong, memorized password remains the only foolproof way to get away with invoking the Fifth and keep your phone locked.
Javier E

Online Education: My Teacher Is an App - WSJ.com - 0 views

  • The drive to reinvent school has also set off an explosive clash with teachers unions and backers of more traditional education. Partly, it's a philosophical divide. Critics say that cyberschools turn education into a largely utilitarian pursuit: Learn content, click ahead. They mourn the lack of discussion, fear kids won't be challenged to take risks, and fret about devaluing the softer skills learned in classrooms. "Schools teach people the skills of citizenship—how to get along with others, how to reason and deliberate, how to tolerate differences,"
  • A teacher in a traditional high school might handle 150 students. An online teacher can supervise more than 250, since he or she doesn't have to write lesson plans and most grading is done by computer.
  • In Georgia, state and local taxpayers spend $7,650 a year to educate the average student in a traditional public school. They spend nearly 60% less—$3,200 a year—to educate a student in the statewide online Georgia Cyber Academy, saving state and local tax dollars. Florida saves $1,500 a year on every student enrolled online full time.
  • ...1 more annotation...
  • Kids who work closely with parents or teachers do well, she says. "But basically letting a child educate himself, that's not going to be a good educational experience." The computer, she says, can't do it alone.
Javier E

Cyberattack Hits Iranian PCs - WSJ.com - 0 views

  • Flame is the biggest and most high-functioning cyberweapon ever discovered, various cybersecurity experts said. It is comprised of multiple files that are 20 times larger than Stuxnet and carry about 100 times more code than a basic virus, experts said.
  • The most alarming feature, experts said, is that Flame can be highly versatile, depending on instructions by its controller. The malware can steal data and social-network conversations, take snapshots of computer screens, penetrate across networks, turn on a computer's microphone to record audio and scan for Bluetooth-active devices.
  • Experts said they believe Flame reports back the information to a central command-and-control network that has constantly changed location. Analysts found servers in Germany, Vietnam, Turkey, Italy and elsewhere, but haven't located the main server.
  • ...1 more annotation...
  • U.S. officials draw a distinction between cyber espionage and cyberattacks, which have a destructive or manipulative purpose and could be considered an act of war.
Javier E

We've Only Got America A - NYTimes.com - 0 views

  • The world system is currently being challenged by two new forces: a rising superpower, called China, and a rising collection of superempowered individuals, as represented by the WikiLeakers, among others. What globalization, technological integration and the general flattening of the world have done is to superempower individuals to such a degree that they can actually challenge any hierarchy — from a global bank to a nation state — as individuals.
  • A China that can choke off conversations far beyond its borders, and superempowered individuals who can expose conversations far beyond their borders — or create posses of “cyber-hacktivists” who can melt down the computers of people they don’t like — are now a reality. They are rising powers. A stable world requires that we learn how to get the best from both and limit the worst; it will require smart legal and technological responses.
  • The alternative today to a world ordered by American power is not some cuddly multipolar system — half-Sweden and half-heaven. It is half-China and half-superempowered individuals.
‹ Previous 21 - 40 of 98 Next › Last »
Showing 20 items per page