After several months of near-constant chatter about Chinese hackers, the U.S. government has finally come right out and said it: the Chinese military is probably, right this very minute, trying to hack into America’s computers to steal our
precious bodily fluids state secrets.
Devices like security cameras, traffic light systems, and high tech temperature controls can all be connected to the web, but they aren’t indexed by Google, which makes them difficult to find without deep computer expertise. Now SHODAN, a search engine that crawls the web for devices like routers, webcams and servers, is helping to expose some of the security flaws inherent to these devices. Read More
If you’ve recently received an email–not sent by your kooky aunt–with the subject line “Check out these kitties! :-),” you may have been the victim of a fake cyberattack. The Wall Street Journal reports that companies are hiring “ethical hackers” to build fake phishing scam emails to test which employees are dumb enough–or big enough cat lovers–to fall for them. Read More
Got a massive pile of stolen money lying around? Happens to us all. You just need the right people to help launder it. And that, of course, is where the Internet comes in.
At some point in October this year, President Obama signed the slightly creepy-sounding and secret Presidential Policy Directive 20, a source tells The Washington Post. According to the Post, the directive gives the military license to “act more aggressively” when combating cyber-attacks directed at major U.S. networks.
In essence, anyone waging war on the country via the internet is on notice: Read More
Maybe Mat Honan is right–for all the importance we place on them, passwords don’t really work worth a damn. Many privacy breaches skip straight to the goodies, like social security and credit card numbers. The latest illustration: Reuters reports that NASA is telling employees that a laptop packed with personal information was lifted from a (locked) car.
Apparently there’s so much information “that must be reviewed and validated,” it could take as long as 60 days to notify everyone involved.
Free credit monitoring for everyone! Read More
Superstorm Sandy washed and blew away some polling places and displaced thousands of residents in New York and New Jersey. New Jersey, in an effort to make sure every voice is heard, has enabled voting via email.
New York didn’t want to go with the email voting option because officials feel it might be vulnerable to fraud.
Writing in Norman’s “Security Exposed” blog, Norman’s vice president and GM Darin Andersen examines the problem of email voting.
Mr. Andersen writes that polling machines may have their own security problems but admits there hasn’t been reliable evidence of hacker interference in previous elections. However, Mr. Andersen is wary of email voting: Read More
A Chinese hacking crew dubbed the Comment Group has been romping through corporate America’s computer networks for a few years now. The extent of the breaches wasn’t clear until Bloomberg published an in-depth report Sunday detailing in part how soft drink giant Coke was hacked in 2009 and didn’t tell.
The deep hacking of sensitive data from Coke’s systems destroyed a $2.4 billion acquisition deal with China Huiyuan Juice Group, which would have been the largest deal of its kind at the time: Read More
Earlier this week, Defense Secretary Leon Panetta took a little trip to the Intrepid Air and Space Museum, where he gave a speech. The New York Times reports that in that speech, he proceeded to do what appears to have been his damnedest to scare the ever-loving crap out of everyone, everywhere about the prospect of cyberattacks on our precious
bodily fluids American infrastructure.