Monday, September 17, 2012

Quite a good summary. My Ethical Hackers should read it just for the obvious errors. You can do better, my minions...
Coders Behind the Flame Malware Left Digital Clues Behind on Control Servers
The attackers behind the nation-state espionage tool known as Flame accidentally left behind tantalizing clues that provide information about their identity and that suggest the attack began earlier and was more widespread than previously believed.
Researchers have also uncovered evidence that the attackers may have produced at least three other pieces of malware or variants of Flame that are still undiscovered.
The information comes from clues the attackers inadvertently left behind on two command-and-control servers they used to communicate with infected machines and steal gigabytes of data from them. [Never do your setup on an active system machine. Bob]
… The new clues show that work on parts of the Flame operation began as early as December 2006, nearly six years before Flame was discovered this year, and that more than 10,000 machines are believed to have been infected with the malware.


Perspective I don't like their definition of an attack (..must damage “an object”... Really?) But they do provide a rule (29) that allows my Ethical Hackers to play war.
September 16, 2012
NATO sponsored manual on the international law applicable to cyber warfare
News release: "From NATO Cooperative Cyber Defense Center of Excellence: The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare. The Tallinn Manual pays particular attention to the jus ad bellum, the international law governing the resort to force by States as an instrument of their national policy, and the jus in bello, the international law regulating the conduct of armed conflict (also labelled the law of war, the law of armed conflict, or international humanitarian law). Related bodies of international law, such as the law of State responsibility and the law of the sea, are dealt within the context of these topics."


This was not locked in a lead box with radiation warnings all over it?
Halliburton misplaces mystery radioactive device: 'Do not handle'
Somewhere in West Texas is a 7-inch radioactive cylinder that Halliburton would like to find. Anyone who comes across it is advised to keep their distance.
The oil field services company lost track of the device, which is used to assess potential sites for hydraulic fracturing, last Tuesday while trying to transport it from Pecos to a well site near Odessa 130 miles away. A special unit of the Texas National Guard has now stepped in to aid Halliburton in a search for the cylinder, according to Bloomberg.
"It's not something that produces radiation in an extremely dangerous form," said Chris Van Deusen, a spokesman for the Texas Department of State Health Services. "But it’s best for people to stay back, 20 or 25 feet." [Imagine what “Dangerous” would require... Bob]
… The Texas health department says the cylinder is stamped with the words “danger radioactive” and “do not handle” along with a radiation warning symbol. [But you shouldn't get close enough to read it? Bob]
[From the article:
Halliburton Co. (HAL) crew members who lost a radioactive rod used in drilling wells in West Texas weren’t guilty of criminal conduct, the Federal Bureau of Investigation said as a hunt for the tool entered a fourth day.


Perspective
"AllThingsD columnist Arik Hesseldahl noticed another milestone marking the passing of the personal computer era: for the first time since the early '80s, the share of worldwide sales of DRAM chips consumed by PCs (desktop and laptop computers, but not tablets) has dropped below fifty percent. Perhaps a more important milestone was reached last year, when more smartphones were shipped (not sold) worldwide than the combined total of PC's and tablets (also noticed by Microsoft watcher Joe Wilcox here). While this is certainly of tremendous marketing and business importance to the likes of Apple, Microsoft, Google, Adobe, and PC OEMs, others may reflect on the impending closing of the history books on the era that started in Silicon Valley a little over 35 years ago."


Perspective Generally speaking, you can't teach an old dog new tech... (Take a quick flip through the enbeded slides, if nothing else)
Senior Citizens and Digital Technology
Lee Rainie, director of the Pew Internet & American Life Project, will describe the Project’s research about those 65 and older use of technology. In early 2012, for the first time ever, more than 50% of older Americans are internet users and an even higher share have mobile phones. This is changing the way people gather, share, and create information. And it is changing the way they communicate and act in groups. Rainie will discuss major themes from his new book, Networked: The New Social Operating System, about how people ‘network’ in new ways in the digital age and how these themes apply to older technology users, as well as younger users.

No comments: