March 25, 2014
Will Congress be able to thwart the plan of the Obama Administration to relinquish U.S. control over ICANN, which governs Internet root systems and addresses? If not, who will be calling the shots? Will authoritarian countries be able to block access not only internationally, but what we can see at home?
Read more in L. Gordon Corvitz's WSJ piece 'How to the Save the Internet'
March 17, 2014
A British geek helped three women friends fix their computers. Then he added a little something extra – he reversed their webcams so he could spy on them. Wired reports:
Digital forensics expert Peter Sommer told Wired.co.uk that the techniques employed by Meldrum were "relatively unsophisticated" in that the victims knew him and had given him access to their computers.
"Most of the time people would send a trojan to somebody and the software would covertly switch the webcam on," he said. Anecdotally, he says, this sort of voyeurism is "very common" and spying software is "very easy to get hold of", but it's hard to tell the scale of the issue since people who are being viewed without their knowledge won't make a complaint to the police.
"But once there's a suspicion, any competent digital forensics investigator will be able to find the digital traces and trap [the perpetrator]."
Guilty on three counts. Comments
February 26, 2014
Beware the “Chameleon virus.” A new computer virus is now spreading like air-borne common colds, via WiFi. Like microbial evolution, viruses are gaining new advantages on an alarming scale.
The weaker security of public WiFi areas, like airports and coffee houses, are the targets of the Chameleon, according to a study at the University of Liverpool. Comments
December 8, 2013
The CEO of the cybersecurity company Mandiant reports receiving spearphishing attacks in the form of PDF invoices from his limo provider. What is truly scary about this is that the Chinese hackers are not yet inside Mandiant’s systems – otherwise, why would they bother? Given that the company’s relationship with a limo provider is not something posted on public sites either, it raises the question of how the Chinese hackers knew which limo service the CEO uses. Are the cyberattackers in China being helped by agents on the ground? Comments
Click here to see our blog archive