Search Results for: malware

NSA slapped malware on 50,000+ networks, says report

By Violet Blue – A new slide culled from the trove of documents leaked by Edward Snowden shows where the NSA placed malware on more than 50,000 computer networks worldwide, according to Dutch media outlet NRC. An NSA Web page … Continue reading

FBI takes out $14M DNS malware operation

By Michael Cooney/Layer 8 – Details of the two-year FBI investigation called Operation Ghost Click were announced today (11/9/11) in New York when a federal indictment was unsealed against six Estonian nationals and one Russian national. The six cyber criminals … Continue reading

Updates from Ciena

Protecting your business from cyber threats The phone rings — there’s been a breach. Ciena’s chief security architect Jim Carnes explains how to integrate security into each aspect of your business to mitigate this stressor – and stop fearing that … Continue reading

Network industry is operating on flawed foundational principles

By George Mattathil – In a nutshell, the current situation with cyber security [2] is the direct result of the developments during the the “internet bubble,” in the 1990s. Collapse of the Bell Labs permitted the unchecked growth of the … Continue reading

Cyberwar: A guide to the frightening future of online conflict

By Steve Ranger – At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction. Governments and intelligence agencies … Continue reading

Updates from Georgia Tech

Decades of Data on World’s Oceans Reveal a Troubling Oxygen Decline By Takamitsu Ito, Shoshiro Minobe, Matthew C. Long and Curtis Deutsch – A new analysis of decades of data on oceans across the globe has revealed that the amount … Continue reading

Updates from Georgia Tech

Study Finds “Lurking Malice” in Cloud Hosting Services By John Toon – “Bad actors have migrated to the cloud along with everybody else,” said Raheem Beyah, a professor in Georgia Tech’s School of Electrical and Computer Engineering. “The bad guys … Continue reading

How to Rob a Central Bank

Bloomberg – The scheme started when intruders inserted malware into Bangladesh Bank’s system in January. With information evidently gleaned from the attack, they were able to divert funds from the bank’s account at the New York Fed using the SWIFT … Continue reading

Updates from GE

How to Restore a Touch of Humanity to the Online World By L. Mark Carrier – We need a new set of social norms for the Internet era to prevent online interactions from doing more harm than good. What makes … Continue reading

“Cyberweapons” crackdown could be used to criminalize basic software-bug testing

By Andrea Castillo – The Wassenaar Arrangement emerged in 1996 from a Cold War agreement to regulate the international arms trade. It is not a treaty, bound by force of law, but rather a voluntary pact between 41 major world … Continue reading