Thursday 28 March 2013

Record-breaking cyber attack by anti-spam group - global inernet was slowed


A record-breaking cyber attacktar geting an anti-spam watchdog group has sent ripples of disruption coursing across the Web, experts said on Wednesday. Spamhaus, a site responsible for keeping ads for counterfeit Viagra and bogus weight-loss pills out of the world's inboxes, said it had been buffeted by the monster denial-of-service attack since mid-March, apparently from groups angry at being blacklisted by the Swiss-British group. "It is a small miracle that we're still online," Spamhaus researcher Vincent Hanna said.

Denial-of-service attacks overwhelm a server with traffic - like hundreds of letters being jammed through a mail slot at the same time. Security experts measure those attacks in bits of data per second. Recent cyber attacks - like the ones that caused persistent outages at U.S. banking sites late last year - have tended to peak at 100 billion bits per second. But the furious assault on Spamhaus has shattered the charts, clocking in at 300 billion bits per second, according to San Francisco-based CloudFlare Inc., which Spamhaus has enlisted to help it weather the attack. "It was likely quite a bit more, but at some point measurement systems can't keep up," CloudFlare chief executive Matthew Prince wrote in an email. Patrick Gilmore of Akamai Technologies said that was no understatement. "This attack is the largest that has been publicly disclosed - ever - in the history of the Internet," he said. It's unclear who exactly was behind the attack, although a man who identified himself as Sven Olaf Kamphuis said he was in touch with the attackers and described them as mainly consisting of disgruntled Russian Internet service providers who had found themselves on Spamhaus' blacklists. There was no immediate way to verify his claim.

He accused the watchdog of arbitrarily blocking content that it did not like. Spamhaus has widely used and constantly updated blacklists of sites that send spam. "They abuse their position not to stop spam but to exercise censorship without a court order," Kamphuis said. Gilmore and Prince said the attack's perpetrators had taken advantage of weaknesses in the Internet's infrastructure to trick thousands of servers into routing a torrent of junk traffic to Spamhaus every second. The trick, called "DNS reflection," works a little bit like mailing requests for information to thousands of different organisations with a target's return address written across the back of the envelopes. When all the organizations reply at once, they send a landslide of useless data to the unwitting addressee. Both experts said the attack's sheer size has sent ripples of disruptions across the Internet as servers moved mountains of junk traffic back and forth across the Web. "At a minimum there would have been slowness," Prince said, adding in a blog post that "if the Internet felt a bit more sluggish for you over the last few days in Europe, this may be part of the reason why."

At the London Internet Exchange, where service providers exchange traffic across the globe, spokesman Malcolm Hutty said his organization had seen "a minor degree of congestion in a small portion of the network." But he said it was unlikely that any ordinary users had been affected by the attack. Hanna said his site had so far managed to stay online, but warned that being knocked off the Internet could give spammers an opening to step up their mailings - which may mean more fake lottery announcements and pitches for penny stocks heading to people's inbox's. Hanna denied claims that his organisation had behaved arbitrarily, noting that his group would lose its credibility if it started flagging benign content as spam. "We have 1.7 billion people who watch over our shoulder," he said. "If we start blocking emails that they want, they will obviously stop using us."

Gilmore of Akamai was also dismissive of the claim that Spamhaus was biased.

"Spamhaus' reputation is sterling," he said.


Tuesday 26 March 2013

Nick D’Aloisio Has Millions and a New Job at Yahoo. Soon, He’ll Be 18


   

      One of Yahoo’s newest employees is a 17-year-old high school student in Britain. As of Monday, he is one of its richest, too.That student, Nick D’Aloisio, a programming whiz who wasn’t even born when Yahoo was founded in 1994, sold his news-reading app, Summly, to the company on Monday for a sum said to be in the tens of millions of dollars. Yahoo said it would incorporate his algorithmic invention, which takes long-form stories and shortens them for readers using smartphones, in its own mobile apps, with Mr. D’Aloisio’s help. “I’ve still got a year and a half left at my high school,” he said in a telephone interview on Monday. But he will make arrangements to test out of his classes and work from the Yahoo office in London, partly to abide by the company’s new and much-debated policy that prohibits working from home.

Mr. D’Aloisio, who declined to comment on the price paid by Yahoo (the technology news site AllThingsD pegged the purchase price at about $30 million), was Summly’s largest shareholder. Summly’s other investors, improbably enough, included Wendi Murdoch, Ashton Kutcher and Yoko Ono. The most important one was Li Ka-shing, the Hong Kong billionaire, whose investment fund supported Mr. D’Aloisio’s idea early on, before it was even called Summly. “They took a gamble on me when I was a 15-year-old,” Mr. D’Aloisio said, by providing seed financing that let him hire employees and lease office space.
The fund read about Mr. D’Aloisio’s early-stage app on TechCrunch, the Silicon Valley blog of record, found his e-mail address and startled him with a message expressing interest. The others signed up later. “Because it was my first time around, people just wanted to help,” he said. For teenagers who fancy themselves entrepreneurs — and their parents, too — the news of the sale conjured up some feelings of inadequacy, but also awe. For Brian Wong, the 21-year-old founder of Kiip, a mobile rewards company, the reaction was downright laughable: “I feel old!” A few years ago, Mr. Wong was described in the news media as the youngest person ever to receive venture capital funding. But a couple of younger founders came along — “and then Nick broke all of our records,” Mr. Wong said on Monday.
Among the attributes that helped Mr. D’Aloisio, he said, was a preternatural ability to articulate exactly what he wanted Summly to be. “There were no umms, no uhhs, no hesitations, no insecurities,” Mr. Wong said. Mr. D’Aloisio, for his part, sounded somewhat uninterested in answering questions about his age on Monday. He acknowledged that it was an advantage in some pitch meetings, and certainly in the news media, “but so was the strength of the idea.” He was more eager to talk about his new employer, Yahoo, which is trying to reinvent itself as a mobile-first technology company (having dropped the digital media tagline it used before Marissa Mayer became chief executive last year). “People are kind of underestimating how powerful it’s going to become and how much opportunity is there,” he said. For a company that badly wants to be labeled innovative, those words are worth a lot. Mr. D’Aloisio’s father, who works at Morgan Stanley, and his mother, a lawyer, had no special knowledge of technology. But they nurtured their son’s fascination with it and he started coding at age 12. Eventually he decided to develop an app with what he calls an “automatic summarization algorithm,” one that “can take pre-existing long-form content and summarize it.” In other words, it tries to solve a problem that is often summed up with the abbreviation tl;dr: “too long; didn’t read.”
Summly officially came online last November. By December, Mr. D’Aloisio was talking to Yahoo and other suitors. Yahoo said in a statement that while the Summly app would be shut down, “we will acquire the technology and you’ll see it come to life throughout Yahoo’s mobile experiences soon.” Other news-reading apps have attracted corporate attention as of late, reflecting the scramble by media companies to adapt to skyrocketing traffic from mobile devices. The social network LinkedIn was said to be pursuing an app called Pulse earlier this month. Still, the eight-figure payday for a teenage entrepreneur on Monday struck some as outlandish and set off speculation that Yahoo was willing to pay almost any price for “cool.” Mr. D’Aloisio, though, will have plenty of time to prove his and his algorithm’s worth. As for the sizable paycheck from Yahoo, he said he did not have any specific plans for the sudden windfall. “It’s going to be put into a trust fund and my parents will help manage it,” he said. He did say, however, that “angel investing could be really fun.” When not working at Yahoo, he will keep up with his hobbies — cricket in particular — and set his sights on attending college at Oxford. His intended major is philosophy.

Hack Attack - Protect Your Bank Account



Quick. Easy. Efficient. Who doesn’t love online banking? Be aware, though, of the danger: Hackers can access your account, drain your funds and threaten the survival of your business.

The risk’s growing.

Cyber attacks increased some 24 percent in the first half of 2012 over the same period the previous year according to a new report from security firm Symantec. Reason? “Any time the economy goes down, white collar crime goes up,” says Bill McDermott, CEO of Atlanta-based McDermott Financial Solutions (mcdfs.com). “We’re seeing an increase in corporate account takeovers. It’s a huge problem.” Banks commonly refuse to indemnify companies for funds stolen from commercial accounts.Banks commonly refuse to indemnify companies for funds stolen from commercial accounts.  “A lot of people have the misunderstanding that banks offer to business accounts the protection offered to consumers,” says McDermott. “In fact, banks will not hold business account holders harmless for losses from cyber-fraud.” In simple terms, your loss is YOUR problem!

Target: You


Think fraudsters only go after big corporations? Not so. “There seems to be a trend toward hackers targeting smaller businessesThere seems to be a trend toward hackers targeting smaller businesses ,” says Brian Krebs, a cyberfraud investigative reporter in suburban Washington, D.C. (krebsonsecurity.com). “Perhaps that’s because larger businesses tend to have protective systems in place so the bad guys have to jump through more hoops.” The numbers tell the tale: Some 36 percent of attacks during the first half of 2012 were directed at businesses with 250 or fewer employees, according to Symantec. That’s a big spike from the 18 percent over the same period during the previous year. “There appears to be a direct correlation between the rise in attacks against smaller businesses and a drop in attacks against larger ones,” says Paul Wood, Symantec’s cyber security intelligence manager. “It almost seems attackers are diverting their resources directly from one group to the other.”

Secure systems


Why won’t banks protect business accounts?Why won’t banks protect business accounts? One reason is legislative: Only consumers are protected by the Federal Electronic Funds Transfer Act, also known as “Regulation E.” If timely notice is given by the victimized consumer, almost all of the stolen money is reimbursed. Here’s another reason: Banks expect business owners to perform due diligence. “In the area of cybersecurity, banks expect businesses to possess a level of expertise higher than that of consumers,” says McDermott. “For example, businesses are expected to maintain protection against malware and to train employees to avoid Internet sites where they can pick up viruses.” A cyber attack most often begins when a hacker installs a rogue program on the computer of a targeted business. Called “malware,” this program captures usernames and passwords for the company’s online bank accounts. From there it is an easy step for the hacker to access the account and wire funds to other financial institutions. And here’s the really bad news: Computers give little indication they are infected with malware. Software designed to detect rogue programs are often unable to identify the code written to hack financial data. “Once on your system, sophisticated malware may keep itself patched faster than your antivirus software updates itselfOnce on your system, sophisticated malware may keep itself patched faster than your antivirus software updates itself ,” says Krebs. As a result, the only way to really cure a sick computer is to reinstall the operating system.

What to do?


Even small businesses without IT staffs can take basic security steps. “Make sure your computers have virus protection and the appropriate firewalls,” suggests McDermott.  “From the business practice standpoint, if you send out ACH [Automated Clearing House] transactions set up a system of dual control so that one person initiates the transaction and a second person approves it before the bank accepts it. And look at accounts on a daily basis to spot unauthorized transactions quickly.” Some experts suggest dedicating one computer solely to the task of online banking. Keep infections off the computer by prohibiting its use for email or for web surfing other than bank related sites. “Strip down the computer to whatever software you need and nothing else,” says Krebs. “And keep it up to date with the latest patches every day; don’t fall behind.” That last bit of advice, adds Krebs, applies to all your computers. Hackers constantly write new programs that exploit vulnerabilities in software such as the Windows operating system, Java, and the Adobe Acrobat reader of PDF files.


Update Your Software and Operating System


An excellent powerful, but simple-to-use, free tool for finding and updating your operating system and programs is available from Secunia.An excellent powerful, but simple-to-use, free tool for finding and updating your operating system and programs is available from Secunia. Secunia is a computer security software firm that offers a broad range of solutions for individuals, small firms and corporate giants. Once installed, this program makes finding obsolete, out-of-date programs and either removing or replacing them simple with a one-button solution to install the patch or update. Individuals and small businesses will likely opt for the Secunia PSI desktop program. Secunia runs invisibly and lets you know any changes to programs. It also gives you a full report at whatever frequency you set, showing any obsolete programs, ones that need to be updated and any missed operating system updates. One final thing: Install the most up-to-date computer operating system, because each iteration provides better security. “According to recent reports, 43 percent of the market is still on Windows XP,” says Stephen Sims, senior instructor at the Bethesda, Md., SANS Institute, a security training organization (sans.org). “We all have to move off these outdated operating systems to take advantage of the much better security features of modern releases.We all have to move off these outdated operating systems to take advantage of the much better security features of modern releases.”


Good habits

Modern operating systems, with their native security features, can do only so much. Employees must be trained on good computing habits. Here are some of the best: Avoid email attachments.  “Three out of four malware attacks come from emails with links that are clicked on by recipients,” says Krebs. “If the browser is not fully patched one click can do it: The computer is infected and there is no warning.”


How Safe is Your Bank Account?

How secure are the funds in your commercial bank account?

Find out by taking this quiz. Score 10 points for every “yes.”

You are in good shape if your total score is between 80 and 100; vulnerable if between 60 and 70; and courting disaster if below 60.

Are you. . .

Using the latest operating system with an active firewall?
Using a capable antivirus and malware program?
Utilizing automatic updates for the operating system, antivirus and malware programs?
Utilizing security programs offered to business accounts by your bank?
Checking bank account transactions daily?
Isolating the financial transaction computer from other activities?
Training your employees on handling email attachments?
Restricting staff access to questionable web sites offering gambling and pornography?
Using strong passwords?

Maintaining a quick response plan, with names and numbers of people to contact, in the event of a fraudulent wire transfer. Surf safely. Undisciplined surfing can also be dangerous, points out Krebs. “Visit certain web pages with a browser that is not fully patched and you can get infected by code in an ad banner or elsewhere on the page.” Bank securely. When visiting your bank’s web site, use a bookmark that points to the institution’s secure “https” page. In other words, go directly to "https://www.bankname.com." In contrast, going to "www.bankname.com" can allow attackers to exploit your unencrypted connection, making your data easier to capture. Review bank statements. Monitor your monthly bank statement closely for unexplained financial activity. “Many attacks involve scraping small amounts from many accounts versus large amounts from a few accounts,” notes Sims. Go offline. When finished with a computer for the day, shut it down completely rather than put it in sleep mode. “While a computer is in sleep mode the encryption keys used for anything from web sessions to hard disk encryption are likely to be resident in memory,” cautions Sims. “An attacker can use special tools to dump the memory from a system that is not completely shut down and potentially steal this information to gain unauthorized access.”


Strong passwords

Security experts have long championed the virtues of strong passwords. A mix of letters and numbers is much safer than using an easily guessed word such as “qwerty” or even “password.” Too often, though, employees don’t get the message. They often complain about the difficulty of remembering complicated strings of characters. That’s because most people end up with dozens, even hundreds, of accounts and rely on a few simplistic passwords or just as bad: write them on sticky notes and put them on their computer. (Yes, they really do that!). Today, you can forget doing things the way you used to if you want to be hard to hackToday, you can forget doing things the way you used to if you want to be hard to hack  says Atlanta business consultant and coach, Chris Dekle. Help is at hand. It’s not really necessary to commit passwords to memory. Password managers make it simple to use random 8, 10 even 15-digit letter, number and symbol combination passwords that defy hacking by anyone short of the National Security Agency yet require you to remember only one password. “For secure internet use, you simply must use password manager software.” As a bonus, you’ll have free text fields to keep account information right with the site logon, so you can always find information you previously had on lost sales slips, buried or lost activation codes, etc. Beyond managing the logins, it makes connecting to a site one-click simple.  Automation takes you to the website and automatically logs you in. “There is a lot of good software to help you manage your passwords, But you could also use something as simple as keeping your passwords in a notebook locked in your desk.”

Vet your bank

Businesses are not always to blame when cyberfraud hits. Sometimes banks drop the ball. There is some motivation for financial institutions to maintain a minimal level of security: Good internal practices are encouraged by government agencies charged with overseeing bank activities. “The bright side of enforcement is that financial institutions are having to architect and deploy solutions that hopefully increase the security of customer accounts,” points out Sims. Even so, you will want to subject your own bank to some due diligence. “Perform risk assessments when evaluating potential banksPerform risk assessments when evaluating potential banks ,” suggests Sims. “Draft a list of questions with your biggest concerns and run them by each organization.” How good are the bank’s Internet defenses? How do the bank’s practices, and the security features it offers business accounts, compare with other institutions? For example, does it offer a two-step validation, in which an ACH transfer must be approved by a second representative at your office? There are other forms of what is called “multi-factor authentication,” in which the bank must receive a back-up confirmation from your business, in the form of a voice phone call or email, before honoring a wire transfer. Sims suggests researching each prospective bank using publicly available tools such as Google, SEC, Dun & Bradstreet, and others. “Analyze each bank’s stock performance if publicly traded,” he says. “Read through some of the comments in public message boards. Hint: Many of the posters are employees.” Sims suggests visiting websites such as www.darkreading.com to see if there are any reports regarding incidents at your prospective bank. Use specially crafted Google searches to find breaches. For example, try using: intitle:"bank name" intext:hackers or breach. Big bank, small bank: Which is better?Big bank, small bank: Which is better?  Each has its benefits. While all financial institutions are required to abide by federal regulations, larger banks may have more security resources and experience. However, smaller banks may have fewer accounts to monitor and may give each one more attention. Since no banks of any size indemnify business accounts you may want to look into getting your own coverage. Ask your broker for information about fraud insurance that has a rider for fraudulent bank transfers.

When hackers strike

Suppose that despite your best efforts and smart practices, a hacker siphons money from your account. Can you get any back?Suppose that despite your best efforts and smart practices, a hacker siphons money from your account. Can you get any back?
 While it’s highly unlikely that a victimized business will recover all of its stolen money, portions can often be saved. “Fraudulent transactions frequently are reversed, so most victims get some money back,” says Krebs.
The secret to recovering your cash? Act fast. “Time is your enemy,” says Krebs. “The longer the time that elapses since a breach, the more money you are likely to lose.The longer the time that elapses since a breach, the more money you are likely to lose. ” Don’t wait until the last minute to figure out whom to call in the event of a money loss. Put together a list of vital financial and legal contacts and keep it handy. Quick action on your part, though, must be matched by your financial institution. “You have to have a cooperative bank that pulls things together quickly,” says Krebs. Once your funds have been withdrawn as cash—often at overseas money transfer offices—they are gone for good.






Monday 25 March 2013

File-Sharing Service isoHunt Illegally Fosters Piracy, Appeals Court Says


    
    federal appeals court ruled Thursday that the popular BitTorrent file-sharing service isoHunt and its related websites violate U.S. copyright law and are on the hook for hefty monetary damages.
The decision (.pdf) by a three-judge panel of the 9th U.S. Circuit Court of Appeals, hailed by the Motion Picture Association of America, marks the first time a federal appeals court has ruled against a BitTorrent search engine. IsoHunt, TorrenTBox and Podtropolis unlawfully pointed the way to free movies, music, videogames and software that were copyrighted and not authorized for the sites’ operator — Gary Fung — to help distribute, the court said.
Programmer Bram Cohen released the BitTorrent file-sharing protocol in 2001, and its efficient way of transferring files has become the method of choice for illicit, peer-to-peer sharing of copyright-protected content that sites like Canada’s isoHunt and Europe’s The Pirate Bay have capitalized upon.
“This ruling affirms a core principle of copyright law: Those who build businesses around encouraging, enabling and helping others to commit copyright infringement are themselves infringers, and will be held accountable for their illegal actions,” said Henry Hoberman, a vice president for the MPAA, which initially sued Fung in 2009.
The opinion comes the same day Hollywood studios announced record-setting global box office sales of $34.7 billion, a 6 percent increase over the prior year.
A three-judge panel of the San Francisco-based appeals court ruled that, unlike the search engine Google, Fung does not deserve protection under U.S. copyright laws for hosting links to pirated content. That’s because Fung’s business model, the court said, was designed for the primary purpose of copyright infringement, with the majority of links on his search engines pointing to unauthorized, copyright-protected content.
Fung claimed it was not he, but his millions of users, who fed his sites with links and were redistributing them without authorization from the rights holders. Fung asserted that he was merely a search engine, like Google, that was protected by the Digital Millennium Copyright Act’s so-called safe-harbor provision that permits internet companies to escape liability for illegal content posted by their users if it is promptly removed at the request of the rights holder. Fung claimed he removed files upon request.
The appeals court did not see it his way, ruling the safe harbor under the DMCA does not exist for sites that “induce” unlawful file sharing. The court noted that isoHunt had prominently featured a list of “Box Office Movies” of the 20 highest-grossing movies in U.S. theaters, and also hosted links to where the movies were being seeded by BitTorrent users. Once somebody begins downloading the link, they also begin seeding the file to others in what is known as a “swarm.”
The court said that Fung also posted messages on the site asking users to upload torrents of copyright-protected films, and he urged file-sharers to download files when visiting his site — which profits via advertising:
As a result, one can infringe a copyright through culpable actions resulting in the impermissible reproduction of copyrighted expression, whether those actions involve making available a device or product or providing some service used in accomplishing the infringement. For example, a retail copying service that accepts and copies copyrighted material for customers after broadly promoting its willingness to do so may be liable for the resulting infringement although it does not produce any copying machines or sell them; all it provides is the ‘service’ of copying. Whether the service makes copies using machines of its own manufacture, machines it owns, or machines in someone else’s shop would not matter, as copyright liability depends on one’s purposeful involvement in the process of reproducing copyrighted material, not the precise nature of that involvement.
The attorney for Fung, of Canada, said the decision was a blow for internet freedom.
“We disagree with the court’s ruling. We find the standard they pronounce for inducement is ambiguous,” attorney Ira Rothken said in a telephone interview. “An ambiguous copyright standard will chill innovation.”
Unauthorized content can still be acquired via Fung’s websites, despite a lower court judge having ordered Fung to filter out copyrighted content via keywords.
Fung is likely to face harsh monetary damages when the case returns to Los Angeles federal court, where Fung was initially found liable in 2009. The U.S. Copyright Act allows damages of up to $150,000 per infringement.
His attorney, however, said Fung might file for bankruptcy if push comes to shove.
But before it gets that far, Rothken said he will urge the appeals court to rehear the case with 11 judges.
Share This on Facebook | Share This on Twitter | Share This on Linkedin

Friday 22 March 2013

NORTH KOREAN USED CHINESE IP FOR HACKING


        South Korean investigators check the Korean Broadcasting System's hardware hit by a hacking attack at the Cyber Terror Response Center of the National Police Agency in Seoul on Thursday. South Korea said it had sourced a damaging cyber attack on its broadcasters and banks to an IP address in China, fueling suspicions that North Korea may have been responsible. 
South Korea Thursday said North Korea is "strongly suspected" of masterminding Wednesday's cyber attacks against its broadcasters and banks, after sourcing the attacks to an Internet protocol (IP) address in China. The Korea Communications Commission (KCC) announced Thursday that the incident was caused by a malicious code. A Chinese IP address (101.106.25.105) accessed the update management server of NongHyup Bank, one of three financial institutions targeted in the attacks, and generated malicious files, Seoul's Yonhap News Agency reported. According to online IP inquiry website ipaddress.com, the IP address where the attacks allegedly originated can be traced to Internet service provider Beijing Teletron Telecom Engineering. The company did not reply to the Global Times' interview requests by press time. Fang Binxing, president of the Beijing University of Posts and Telecommunications, told the Global Times that the identified IP address did not directly link China to the cyber attacks because it is "very simple" for hackers to access foreign IP addresses via virtual private networks. In response to the incident, Chinese foreign ministry spokesman Hong Lei Thursday also reiterated that cyber attacks are an "anonymous, transnational and deceptive" problem plaguing the world. 


Recently, China's military has been under attack for the alleged hacking activities against US businesses. Seoul pointed the finger at Pyongyang for launching Wednesday's cyber attacks, adding that the North has used Chinese IPs for past hacking campaigns. "[The government] is closely analyzing the incident with all possibilities open, while bearing strong suspicion that North Korea conducted the attack," a high-ranking official from South Korea's presidential office told Yonhap. North Korea has yet to issue any statement on the cyber attacks.


"Seoul believes North Korea would benefit from the move and the attacks pose no benefit for China," Fang said. Yang Mian, a professor of international relations at the Communication University of China, told the Global Times that though North Koreans are only connected to a local area network instead of the Internet, Pyongyang has attached importance to the cultivation of IT talents. But Yang said the South lacks evidence to back its claim Pyongyang was to blame for Wednesday's hackings. The AP reported that the cyber attacks on South Korean banks led to long queues in front of ATMs, with one bank unable to provide customer service operations at bank windows, nor corporate banking. Li Wei, director of the Anti-terrorism Research Center at the China Institutes of Contemporary International Relations, told the Global Times that if the cyber attacks were by Pyongyang, its motivation might be to spark panic among South Koreans by disrupting the country's financial system.


The incident has stoked tension already running high on the Korean Peninsula. Pyongyang had earlier reacted strongly to the UN Security Council's renewed sanctions over its February 12 nuclear test and a series of US-South Korea military drills. The North last week also accused South Korea and the US of plotting recent cyber attacks against it, fueling concerns of all-out virtual warfare. However, Li said the current situation should not be viewed as a cyber war, given that neither the government in Pyongyang or Seoul could be linked to the attacks. Yang predicted both sides would continue their cyberspace skirmishes, but said it is unlikely to become a flash point on the peninsula due to the low likelihood of large-scale paralysis of networks on either side. North Korea on Thursday threatened strikes on US military bases in Japan and Guam. "The US should not forget that the Andersen base on Guam where B-52s take off and naval bases on the Japanese mainland and Okinawa, where nuclear-powered submarines are launched, are all within the range of our precision target assets," a spokesman for the Korean People's Army said. North Korea also issued air raid alerts as part of a one-hour civil defense drill on Thursday.


Saturday 16 March 2013

Defacement of the Los Angeles Times website


     
   A former web producer for a Tribune Company-owned television station in Sacramento, Calif., was charged today in an indictment for allegedly conspiring with members of the hacker group “Anonymous” to hack into and alter a Tribune Company website, the Justice Department announced.


Matthew Keys, 26, of Secaucus, N.J., was charged in the Eastern District of California with one count each of conspiracy to transmit information to damage a protected computer, transmitting information to damage a protected computer and attempted transmission of information to damage a protected computer. 



Keys was employed by Sacramento-based television station KTXL FOX 40, as its web producer, but was terminated in late October 2010.



The three-count indictment alleges that in December 2010 Keys provided members of the hacker group Anonymous with log-in credentials for a computer server belonging to KTXL FOX 40’s corporate parent, the Tribune Company. According to the indictment, Keys identified himself on an Internet chat forum as a former Tribune Company employee and provided members of Anonymous with a login and password to the Tribune Company server. 



After providing log-in credentials, Keys encouraged the Anonymous members to disrupt the website. At least one of the computer hackers used the credentials provided by Keys to log into the Tribune Company server, and ultimately that hacker made changes to the web version of a Los Angeles Times news feature.



The indictment further alleges that Keys had a conversation with the hacker who claimed credit for the defacement of the Los Angeles Times website. The hacker told Keys that Tribune Company system administrators had thwarted his efforts and locked him out. Keys attempted to regain access for that hacker, and when he learned that the hacker had made changes to a Los Angeles Times page, Keys responded, “nice.”



Each of the two substantive counts carry a maximum penalty of 10 years in prison, three years of supervised release and a fine of $250,000. The conspiracy count carries a maximum penalty of five years in prison, three years of supervised release and a fine of $250,000.







Friday 15 March 2013

Obama accuses China over hacking


WASHINGTON: President Barack Obama has entered the fray on cyber attacks from China, saying some intrusions affecting US firms and infrastructure were "state sponsored."
The comments appeared to step up the rhetoric against China following similar remarks from other members of the US administration.
"What is absolutely true is that we have seen a steady ramping up of cyber security threats. Some are state sponsored. Some are just sponsored by criminals," Mr Obama said in an interview with ABC News released on Wednesday.
"We've made it very clear to China and some other state actors that, you know, we expect them to follow international norms and abide by international rules.
"And we'll have some pretty tough talk with them. We already have," Mr Obama said, complaining that billions of dollars and industrial secrets were lost as a consequence of hacking.
The comments by the president come after a series of warnings from top US security officials that Washington would not stand idly by in the face of these threats.
General Keith Alexander, who heads the US National Security Agency and Cyber Command, told politicians on Tuesday the military is creating at least 13 units which would have offensive capabilities in cyberspace as part of efforts to protect US infrastructure.
"I would like to be clear that this team, this defend-the-nation team, is not a defensive team. This is an offensive team that the Defense Department would use to defend the nation if it were attacked in cyberspace," General Alexander told a Senate panel.
"Thirteen of the teams that we're creating are for that mission set alone."
James Lewis, a cybersecurity specialist at the Centre for Strategic and International Studies, said the heightened rhetoric suggests Washington's patience has worn thin with China and some other governments after numerous diplomatic initiatives.
"There is some intelligence which hasn't been made public that points toward China as the major actor in economic espionage," Lewis told AFP.
"Embarrassing the Chinese doesn't work, and this raises the ante."

Thursday 14 March 2013

Internal site breached by hackers, no critical functions affected, said by FED


Internal site breached by hackers, no critical functions affected, said by FED


WASHINGTON — The Federal Reserve said on Tuesday that one of its internal websites had been briefly breached by hackers, though no critical functions of the central bank were affected by the intrusion.
The admission, which raises questions about cyber security at the Fed, follows a claim that hackers linked to the activist group Anonymous had struck the Fed on Sunday, accessing personal information of more than 4,000 U.S. bank executives, which it published on the Web.
"The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product," a Fed spokeswoman said.
"Exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve system," the spokeswoman said, adding that all individuals effected by the breach had been contacted.
Technology news site ZDNet separately reported that Anonymous appeared to have published information allegedly containing the login information, credentials, internet protocol addresses and contact information of over 4,000 U.S. bankers on Sunday night.
The claim was made via Twitter over an account registered to OpLastResort, which is linked to Anonymous, a loosely organized group of hacker activists who have claimed responsibility for scores of attacks on government and corporate sites over the past several years.
OpLastResort is a campaign that some hackers linked to Anonymous have started to protest government prosecution of computer prodigy Aaron Swartz, who took his own life Jan. 11.
The Fed declined to identify which website had been hacked. But information that it provided to bankers indicated that the site, which was not public, was a contact database for banks to use during a natural disaster.
The website's purpose is to allow bank executives to update the Fed if their operations have been flooded or otherwise damaged in a storm or other disaster. That helps the Fed to assess the overall impact of the event on the banking system.
Hackers identifying themselves as Anonymous infiltrated the U.S. Sentencing Commission website late last month to protest the government's treatment of the Swartz case.
Swartz was charged with using the Massachusetts Institute of Technology's computer networks to steal more than 4 million articles from JSTOR, an online archive and journal distribution service. He faced a maximum sentence of 31 years if convicted.