Quite a good summary. My Ethical
Hackers should read it just for the obvious errors. You can do
better, my minions...
Coders
Behind the Flame Malware Left Digital Clues Behind on Control Servers
The attackers behind the nation-state
espionage tool known as Flame accidentally left behind tantalizing
clues that provide information about their identity and that suggest
the attack began earlier and was more widespread than previously
believed.
Researchers have also uncovered
evidence that the attackers may have produced at least three other
pieces of malware or variants of Flame that are still undiscovered.
The information comes from clues
the attackers inadvertently left behind on two command-and-control
servers they used to communicate with infected machines
and steal gigabytes of data from them. [Never do
your setup on an active system machine. Bob]
… The new clues show that work on
parts of the Flame operation began as early as December 2006, nearly
six years before Flame was discovered this year, and that more than
10,000 machines are believed to have been infected with the malware.
Perspective I don't like their
definition of an attack (..must damage “an object”... Really?)
But they do provide a rule (29) that allows my Ethical Hackers to
play war.
September 16, 2012
NATO
sponsored manual on the international law applicable to cyber warfare
News release: "From NATO
Cooperative Cyber Defense Center of Excellence: The
Tallinn Manual on the International Law Applicable to Cyber
Warfare, written at the invitation of the Centre by an independent
‘International Group of Experts’, is the result of a three-year
effort to examine how extant international law norms apply to this
‘new’ form of warfare. The Tallinn Manual pays particular
attention to the jus ad bellum, the international law governing the
resort to force by States as an instrument of their national policy,
and the jus in bello, the international law regulating the
conduct of armed conflict (also labelled the law of war, the law of
armed conflict, or international humanitarian law). Related bodies
of international law, such as the law of State responsibility and the
law of the sea, are dealt within the context of these topics."
This was not locked in a lead box with
radiation warnings all over it?
Somewhere in West Texas is a 7-inch
radioactive cylinder that Halliburton would like to find. Anyone who
comes across it is advised to keep their distance.
The oil field services company lost
track of the device, which is used to assess potential sites for
hydraulic fracturing, last Tuesday while trying to transport it from
Pecos to a well site near Odessa 130 miles away. A special unit of
the Texas National Guard has now stepped in to aid Halliburton in a
search for the cylinder, according to Bloomberg.
"It's not
something that produces radiation in an extremely dangerous form,"
said Chris Van Deusen, a spokesman for the Texas Department of State
Health Services. "But it’s best for people to stay back,
20 or 25 feet." [Imagine what “Dangerous” would require...
Bob]
… The Texas health
department says the cylinder is stamped with the words “danger
radioactive” and “do not handle” along with a radiation warning
symbol. [But you shouldn't get close enough to read
it? Bob]
[From the article:
Halliburton
Co. (HAL) crew members who lost a radioactive
rod used in drilling wells in West Texas weren’t guilty of criminal
conduct, the Federal
Bureau of Investigation said as a hunt for the
tool entered a fourth day.
Perspective
"AllThingsD columnist Arik
Hesseldahl noticed another milestone marking the
passing of the personal computer era: for the first time since
the early '80s, the share of worldwide sales of DRAM chips consumed
by PCs (desktop and laptop computers, but not tablets) has dropped
below fifty percent. Perhaps a more important milestone was reached
last year, when more
smartphones were shipped (not sold) worldwide than the combined
total of PC's and tablets (also noticed by Microsoft watcher Joe
Wilcox here).
While this is certainly of tremendous marketing and business
importance to the likes of Apple, Microsoft, Google, Adobe, and PC
OEMs, others may reflect on the impending closing of the history
books on the era
that started in Silicon Valley a little over 35 years ago."
Perspective Generally speaking, you
can't teach an old dog new tech... (Take a quick flip through the
enbeded slides, if nothing else)
Senior
Citizens and Digital Technology
Lee Rainie, director of the Pew
Internet & American Life Project, will describe the Project’s
research about those 65 and older use of technology. In early 2012,
for the first time ever, more than 50% of older Americans are
internet users and an even higher share have mobile phones. This is
changing the way people gather, share, and create information. And
it is changing the way they communicate and act in groups. Rainie
will discuss major themes from his new book, Networked:
The New Social Operating System, about how people ‘network’
in new ways in the digital age and how these themes apply to older
technology users, as well as younger users.
No comments:
Post a Comment