02 July 2011

#Hacker reportedly breached #Florida voter #database

http://m.examiner.com/examiner/pm_60959/contentdetail.htm?contentguid=PzFRbDUq

#CyberWar News Evening Roundup is out ! Edition of Saturday, Jul. 02, 2011




Begin forwarded message:

From: noreply@paper.li
Date: July 2, 2011 18:55:27 EDT
To: cyberwarnews@gmail.com
Subject: CyberWar_News Evening Roundup is out ! Edition of Saturday, Jul. 02, 2011

Ex-employee charged in #hacking case

http://www.ahherald.com/newsbrief-mainmenu-2/law-and-order/11199-ex-pharmaceutical-employee-charged-in-hacking-attacks

Avoid Phone #Phishing attacks

http://mashable.com/2011/06/30/mobile-phishing/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Mashable+%28Mashable%29

Meet Italy's #Predator #Drone!

http://cencio4.wordpress.com/2011/06/28/italy-is-ready-to-use-the-new-predator-b-mq-9-reaper-drones-in-libya-to-improve-nato-isr-capabilities/

#US expands #drone war in #Somolia

http://www.nytimes.com/2011/07/02/world/africa/02somalia.html?_r=1&smid=tw-nytimes&seid=auto

#IDF #Cyber Commander prepares for assult

http://www.israelnationalnews.com/News/News.aspx/145247

Top 10 #Cyber attacks of June

http://www.crn.com/slide-shows/security/231000795/10-biggest-cyber-attacks-in-june.htm;jsessionid=Abh88y680yvy1cxRu9Zuvg**.ecappj01?pgno=3

#Honeypots and #cryptography used to thwart #hackers

http://networkusall.com/2011/07/02/network-security-using-honeypots-and-cryptography/

#Libyan rebels #hack into disabled #cellular network and restore phone service

http://www.popsci.com/technology/article/2011-04/massive-hardware-hack-libyan-rebels-hijack-disabled-cell-phone-network

#DHS calls for defensive action from Chinese #cyberattacks

http://m.sudburystar.com/articledisplay.aspx?e=3197189

#Iran military states it is prepared to counter #cyberwar attacks

http://www.mehrnews.com/en/newsdetail.aspx?NewsID=1349513

Is the US prepared for a #cyberwar with #China?

Cyberdefenses not ready to handle 'electronic Pearl Harbor,' experts say - News - Stripes

#Chinese hackers attack #Google again, China denies charges of #cyber #espionage

http://www.hindustantimes.com/Google-says-Chinese-hackers-broke-into-Gmail/Article1-704705.aspx

#China invests in #cyberwarfare and conventional #military assets to counter US in Asian Pacific

http://www.airforce-magazine.com/MagazineArchive/Documents/2010/April%202010/0410china.pdf

Technical Analysis of Adobe Flash Exploit

http://blogs.technet.com/b/mmpc/archive/2011/07/01/a-technical-analysis-on-the-exploit-for-cve-2011-2110-adobe-flash-player-vulnerability.aspx?utm_source=twitterfeed&utm_medium=twitter
Good article on drive by web exploits:
http://blogs.cisco.com/security/drive-by-web-exploits/
http://www.telegraph.co.uk/news/worldnews/asia/china/8597485/China-and-Britain-locked-in-cyber-war.html
http://arbutus.patch.com/articles/halethorpe-man-spills-secrets-of-international-cybercrime-takedown
http://www.bernama.com.my/bernama/v5/newsindex.php?id=598181
http://defensesystems.com/articles/2011/06/30/cyber-warfare-summit-battle-dynamics.aspx

01 July 2011

DHS Sec’y Calls for Global Cooperation on Cyber | Defense Tech

DHS Sec’y Calls for Global Cooperation on Cyber | Defense Tech

Cyber weapons development remains highly problematic -- Defense Systems

Cyber weapons development remains highly problematic -- Defense Systems

1 in 4 US Hackers are FBI Informants, Report Says | PCWorld

I think that this number is probably inflated - but this article does give up the name of the person who turned on Bradley Manning last year. 1 in 4 US Hackers are FBI Informants, Report Says | PCWorld
http://mobile.eweek.com/c/a/IT-Infrastructure/Fortify-Network-Security-Before-Replacing-SecurID-Tokens-Verizon-Business-868616/

Kim Kardashian Wants to Know Why People Hack | threatpost

Kim Kardashian Wants to Know Why People Hack | threatpost: Kardashian--who until now has not been known for her security thinking--asked the eternal and unanswerable question...

Spam Profits Down, Cybercrooks Flock to Targeted Attacks | threatpost

Spam Profits Down, Cybercrooks Flock to Targeted Attacks | threatpost

Podcasts | threatpost

Great podcast on targeted attacks and database security Podcasts | threatpost

War News Updates: The Pentagon Gets Ready For Cyberwar -- News Roundup

War News Updates: The Pentagon Gets Ready For Cyberwar -- News Roundup

USA, your poorly protected PCs are polluting the world with spam | Naked Security

USA, your poorly protected PCs are polluting the world with spam | Naked Security

The first big Google+ spam campaign blasted out by pill-pushers | Naked Security

The first big Google+ spam campaign blasted out by pill-pushers | Naked Security

PA Consulting Group Leads the Debate on Cyber Security, the Insider Threat and Strategic Protective Monitoring - PR Newswire - sacbee.com

PA Consulting Group Leads the Debate on Cyber Security, the Insider Threat and Strategic Protective Monitoring - PR Newswire - sacbee.com

World’s Biggest Cyber Threat? | China Power

World’s Biggest Cyber Threat? | China Power

Is your family prepared for a cyberattack? - USATODAY.com

This might be a little over the top... Is your family prepared for a cyberattack? - USATODAY.com

Better laws needed to counter cyber attacks - U.S | Reuters

Better laws needed to counter cyber attacks - U.S | Reuters

Cyber attacks outpace global response, U.S. warns | Reuters

Cyber attacks outpace global response, U.S. warns | Reuters

Israeli Intelligence Report: Erdogan Backed Flotilla Radicals - By Andrew C. McCarthy - The Corner - National Review Online

Israeli Intelligence Report: Erdogan Backed Flotilla Radicals - By Andrew C. McCarthy - The Corner - National Review Online

Gaza Flotilla - The World should know the Truth - CNN iReport

Gaza Flotilla - The World should know the Truth - CNN iReport

The Battle Over the Gaza Flotilla | The Nation

The Battle Over the Gaza Flotilla | The Nation

More surveillance balloons ordered by Army - UPI.com

More surveillance balloons ordered by Army - UPI.com

Secret Lockeed Martin Spy Blimp Crashes - Leaving Many Questions

Secret Lockeed Martin Spy Blimp Crashes - Leaving Many Questions

Whistleblower: Patriot Hacker The Jester's Libyan Psyops Campaign

Whistleblower: Patriot Hacker The Jester's Libyan Psyops Campaign

Hackers pierce network with jerry-rigged mouse • The Register

Hackers pierce network with jerry-rigged mouse • The Register

Future cybersecurity workforce gets training at summer boot camps -- Government Computer News

Future cybersecurity workforce gets training at summer boot camps -- Government Computer News

Technology | Academics | Policy - Cyber Activity Continues – Both Hacking and Preventing Efforts on the Rise

Technology | Academics | Policy - Cyber Activity Continues – Both Hacking and Preventing Efforts on the Rise

U.N. Report Shreds Military’s Claim of Afghanistan Progress | Danger Room | Wired.com

U.N. Report Shreds Military’s Claim of Afghanistan Progress | Danger Room | Wired.com

Chinese military releases Counter-Strike clone for army training

Chinese military releases Counter-Strike clone for army training

CyberWar_News Morning Report

CyberWar_News Morning Report

Infosecurity (USA) - Symantec researcher delves into the technology of a backdoor attack

Infosecurity (USA) - Symantec researcher delves into the technology of a backdoor attack

Someone Tell Obama’s Counterterrorism Crew About the Internet | Danger Room | Wired.com

Someone Tell Obama’s Counterterrorism Crew About the Internet | Danger Room | Wired.com

Fars News Agency :: Minister: Iran Prepared to Defuse US 'Internet in Suitcase' Plot

Fars News Agency :: Minister: Iran Prepared to Defuse US 'Internet in Suitcase' Plot

Microsoft seeks patent for spy tech for Skype - Computerworld

Microsoft seeks patent for spy tech for Skype - Computerworld

Expert in Cyberwarfare Welcomes Obama's Long-Awaited Executive Orders - UB NewsCenter

Expert in Cyberwarfare Welcomes Obama's Long-Awaited Executive Orders - UB NewsCenter

Space Command Official Stresses Cyber Training, Security | Defense Technology News at DefenseTalk

Space Command Official Stresses Cyber Training, Security | Defense Technology News at DefenseTalk

Remote tool could be used to detonate IEDs in Afghanistan | News | The Engineer

Remote tool could be used to detonate IEDs in Afghanistan | News | The Engineer

http://www.wired.com/dangerroom/2011/06/iraqs-invisible-war/all/1

http://www.wired.com/dangerroom/2011/06/iraqs-invisible-war/all/1

http://www.wired.com/dangerroom/2011/06/iraqs-invisible-war/all/1

http://www.wired.com/dangerroom/2011/06/iraqs-invisible-war/all/1

U.S. rejects demands to vacate Pakistan drone base | Reuters

U.S. rejects demands to vacate Pakistan drone base | Reuters

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes

Hackers hit church's collection plate - CBS News

Hackers hit church's collection plate - CBS News

Technology | Academics | Policy - Cyber Activity Continues – Both Hacking and Preventing Efforts on the Rise

Technology | Academics | Policy - Cyber Activity Continues – Both Hacking and Preventing Efforts on the Rise

WordPress › WordPress 3.1.4 (and 3.2 Release Candidate 3)

Keep Hackers at bay with update WordPress › WordPress 3.1.4 (and 3.2 Release Candidate 3)

Meggit - US Military and Law Enforcement equipment supplier hacked for #Antisec ~ THN : The Hacker News

Meggit - US Military and Law Enforcement equipment supplier hacked for #Antisec ~ THN : The Hacker News

Active Self Defense Against Cyber Attacks | isssource.com

Active Self Defense Against Cyber Attacks | isssource.com

(CYA) Cover Your Applications – All of Them | WhiteHat Security Blog

(CYA) Cover Your Applications – All of Them | WhiteHat Security Blog

30 June 2011

http://m.gmanews.tv/story/224904/39phl-cybersecurity-not-a-gov39t-priority39-cict-chair
http://www.thehackernews.com/2011/06/sql-injection-vulnerability-in-google.html?m=1

IED found along banks of Dal Lake - Online News # 18509

http://www.newkerala.com/news/2011/worldnews-18509.html

Apple Bans Palestinian Activist App From iTunes, But Allows Israeli Government Propaganda App | ThinkProgress

Apple Bans Palestinian Activist App From iTunes, But Allows Israeli Government Propaganda App | ThinkProgress

Killer Drones, Stealth Jets, Spy Planes: Bob Gates’ Legacy in Military Tech | Danger Room | Wired.com

Killer Drones, Stealth Jets, Spy Planes: Bob Gates’ Legacy in Military Tech | Danger Room | Wired.com

‘Caution Zombies Ahead’: N. Va. electronic sign hacked - The Buzz - The Washington Post

‘Caution Zombies Ahead’: N. Va. electronic sign hacked - The Buzz - The Washington Post

Judge Allows Wiretap Complaints in Google Wi-Fi Sniffing Case | News & Opinion | PCMag.com

Judge Allows Wiretap Complaints in Google Wi-Fi Sniffing Case | News & Opinion | PCMag.com

What Does the Sony PlayStation Network Breach Teach Us about Cloud Security? | SecurityWeek.Com

What Does the Sony PlayStation Network Breach Teach Us about Cloud Security? | SecurityWeek.Com

Defense Advanced Research Projects Agency

Defense Advanced Research Projects Agency completes key milestone in compact high-powered laser program

The free runners of Gaza - Artscape - Al Jazeera English

The free runners of Gaza - Artscape - Al Jazeera English

Pakistan Security Brief - June 30, 2011 | Critical Threats

Pakistan Security Brief - June 30, 2011 | Critical Threats

The Ethical Hacker Network - Course Review: The Hacker Academy Online Curriculum

The Ethical Hacker Network - Course Review: The Hacker Academy Online Curriculum

Secret Service Reveals How It Stalks Cybercriminals | Fast Company

Secret Service Reveals How It Stalks Cybercriminals | Fast Company

DropBox CEO: Lone hacker downloaded data from 'fewer than a hundred' accounts | ZDNet

DropBox CEO: Lone hacker downloaded data from 'fewer than a hundred' accounts | ZDNet

Verizon: RSA Hackers Using Trojans, Keyloggers In Second Wave Attacks | threatpost

Verizon: RSA Hackers Using Trojans, Keyloggers In Second Wave Attacks | threatpost

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks - Andy Greenberg - The Firewall - Forbes

Indonesian and Australian police launched Cyber Crime Investigation Center ~ THN : The Hacker News

Indonesian and Australian police launched Cyber Crime Investigation Center ~ THN : The Hacker News

Indonesian and Australian police launched Cyber Crime Investigation Center ~ THN : The Hacker News

Indonesian and Australian police launched Cyber Crime Investigation Center ~ THN : The Hacker News

Flying lessons: Learning how to pilot a drone - CNN.com

Flying lessons: Learning how to pilot a drone - CNN.com

Israel Vulnerable to Cyber Attack, Leaders Warn - Technology Review

Israel Vulnerable to Cyber Attack, Leaders Warn - Technology Review

Air Force To Launch Tactical Spy Satellite -- InformationWeek

Air Force To Launch Tactical Spy Satellite -- InformationWeek

Air Force To Launch Tactical Spy Satellite -- InformationWeek

Air Force To Launch Tactical Spy Satellite -- InformationWeek

How Cellphone Jammers Are Helping Us Win the Iraq War

How Cellphone Jammers Are Helping Us Win the Iraq War

How Jammers Helped Counter the Iraqi Insurgency | PRI's The World

How Jammers Helped Counter the Iraqi Insurgency | PRI's The World

U.S. drone targets two leaders of Somali group allied with al-Qaeda - The Washington Post

U.S. drone targets two leaders of Somali group allied with al-Qaeda - The Washington Post

Technolog from msnbc.com - Anonymous hacks Universal Music, Viacom

Technolog from msnbc.com - Anonymous hacks Universal Music, Viacom

New Haven Feds Destroy Russian Hackers' "Botnet" - fairfieldweekly.com

New Haven Feds Destroy Russian Hackers' "Botnet" - fairfieldweekly.com

Navy to Launch Regional Components to Support Navy Fleet Cyber Command - The New New Internet

Navy to Launch Regional Components to Support Navy Fleet Cyber Command - The New New Internet

MoD cyber-command will combine with intelligence | Security Management | ZDNet UK

MoD cyber-command will combine with intelligence | Security Management | ZDNet UK

China’s Rise from Hacking To Digital Espionage

China’s Rise from Hacking To Digital Espionage

Former Secretary of State Henry Kissinger wants cyber detente agreement for US and China -- Defense Systems

Former Secretary of State Henry Kissinger wants cyber detente agreement for US and China -- Defense Systems

Syrian Electronic Army Defaces 41 Web sites, One UK Government Web site

Syrian Electronic Army Defaces 41 Web sites, One UK Government Web site

Time to guard your digital certificates | Data security - InfoWorld

Time to guard your digital certificates | Data security - InfoWorld

Sorry, but the TDL botnet is not 'indestructible' | Malware - InfoWorld

Sorry, but the TDL botnet is not 'indestructible' | Malware - InfoWorld

Technology News: Internet: Internet Censorship Storm Is Coming, Warns Schmidt

Technology News: Internet: Internet Censorship Storm Is Coming, Warns Schmidt

Technology News: Internet: Internet Censorship Storm Is Coming, Warns Schmidt

Technology News: Internet: Internet Censorship Storm Is Coming, Warns Schmidt

Weibo, China’s Twitter-like service, hit by worm | Naked Security

China’s Twitter-like service, hit by worm

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

Operation Anti Security Breakdown and targets, the full time line | Cyber War News

NBC News: Hacker attack cripples al-Qaida on Web – US news – Security – msnbc.com | NotSoCrazyNews BETA

NBC News: Hacker attack cripples al-Qaida on Web – US news – Security – msnbc.com | NotSoCrazyNews BETA

Hackers target social networking sites in M'sia - Yahoo! News

Hackers target social networking sites in M'sia - Yahoo! News

28 June 2011

AntiSec Hacker Dumps Myspace and Paypal Account Data

I had the opportunity to chat with #AntiSec hacker D3V29 in an IRC session regarding his recent data dump of MySpace and Paypal account data.  D3V29 indicated that he was able to grab this data at an undisclosed retail location that had free wifi.  Using custom tools, D3V29 was able to lift the login details for users PayPal accounts along with data from user MySpace accounts.  A list of the Paypal accounts identified can be seen here.  A list of Myspace user logs/passwords can be found here.

The #AntiSec movement picks up steam where LulzSec left off after 50 days of hacking various high profile websites.  The movement seems to continue to grow as more hackers join in on the movement. While there are some high profile targets that the movement will undertake, D3V29 was not forthcoming with who or what was in his crosshairs.  When I asked D3V29 about his next target he just hit me with a :) and a "who knows".

Some people might call them criminals, but I believe that the hackers are for the first time exposing the dirty underbelly of Internet security by providing the public and the United States a good look at what has actually been going on since the beginning of the Internet.  Our data is not safe, and we still have not taken Internet security seriously.  In fact, we have been lulled into a false sense or security by thinking that using Firefox alone and some antivirus software is going to protect us.  The truth is our information is out there to grab when we use unsecured wireless networks.  Whether you like it or not, the United States is in the early stages of a cyberwar  where the belligerents are mix of nation states, organized crime syndicates, terrorist organizations, hacker groups, hactivist and individual script kiddies acting alone.  This war has actually been going on for years but has now finally bubbled to the surface.