A group of 15 Nations agree to start working together to reduce Cyberwarfare Threat

[The Washington Post] A group of nations — including the United States, China and Russia — have for the first time signaled a willingness to engage in reducing the threat of attacks on each other’s computer networks.  http://www.washingtonpost.com/wp-dyn/content/article/2010/07/16/AR2010071605882.html Urs  

0

Microsoft Unveils One-Stop Service for Reporting Stolen Accounts

Microsoft on Thursday unveiled a program to alert banks and online services when accounts they oversee are compromised. The Internet Fraud Alert will serve as a centralized repository for stolen account credentials and personal information, Microsoft said in a press release announcing the system.  http://www.microsoft.com/Presspass/press/2010/jun10/06-17FraudAlertPR.mspx Urs  

0

The Biggest Cloud on the Planet is Owned by … the Crooks!

Network World: Who’s got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They’re just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers controlled by the Conficker…

1

Protecting Against Terrorism [PDF]

Centre for the Protection of National Infrastructure: This publication offers security advice and good practice for any organisation looking to protect against the risk of a terrorist act or limit the damage such an incident could cause. It sets out how a security plan might be developed and updated, the key measures that can help…

0

Microsoft cloud-computing service offers federal agencies

New Microsoft cloud-computing service offers federal agencies a high level of security, including biometric access control and fingerprinting for background checks.http://news.cnet.com/8301-27080_3-10459301-245.html?part=rss&subj=news&tag=2547-1_3-0-20 -Urs  

0

High-Tech Copy Machines a Gold Mine for Data Thieves

Victor Beitner, a security expert who reconfigures photocopy machines destined for resale in Toronto, says businesses are completely unaware of the potential information security breach when the office photocopier is replaced. They think the copier is just headed for a junkyard but, in most cases, when the machine goes, so does sensitive data that have…

1

MS: What We Know (and Learned) from the Waledac Takedown

Very interesting article from the MSRC: Recently, following an investigation to which various members of the MMPC contributed, Microsoft’s Digital Crimes Unit initiated a takedown of the Waledac botnet in an action known as Operation b49, an ongoing operation to disrupt the botnet for the long term.  To effectively counter a botnet like Waledac, we…

0

Pentagon Searches for ‘Digital DNA’ to Identify Hackers

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying to fix that, with a new effort to develop the “cyber equivalent of fingerprints or DNA” that can identify even the best-cloaked hackers. http://www.wired.com/dangerroom/2010/01/pentagon-searches-for-digital-dna-to-identify-hackers/ -Urs  

0

Report details hacks targeting Google and others

It’s been three weeks since Google announced that a sophisticated and coordinated hack attack dubbed Operation Aurora recently targeted it and numerous other U.S. companies. Now a leading computer forensic firm is providing the closest look so far at the nature of the attacks, and attackers that struck Google and others. http://www.wired.com/threatlevel/2010/02/apt-hacks/ -Urs  

0

Internet Phone Systems Become the Fraudster’s Tool

Cyber criminals have found a new launching pad for their scams: the phone systems of small- and medium-sized businesses across the U.S. In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into divulging their bank account numbers…

0