"Anonymous was the first group to build an operational voluntary botnet. By running the LOIC on your computer, you are, essentially, declaring your allegiance to Anonymous. You donate part of your computer’s processing power to the cause. That cause—or, if you prefer, the target—is determined by rough consensus among Anons. Read more from [dmagazine]"
"As hardware devices are almost exclusively produced in countries where controls about who has access to the manufacturing process are non-existent or, at best, pretty lax, government agencies, military organizations and businesses that operate systems critical to a country's infrastructure can never be too careful when checking whether the devices they are planning to use have been tampered with. Read more from [net-security.org]"
"... "Modern warfare will demand the effective use of cyber, kinetic and combined cyber and kinetic means," said DARPA director Regina Dugan, referring to traditional, "kinetic" methods of warfare that involve troops, vehicles, and bombs. Read more from [pcmag]"
"With so many potential exposures -- malware, system threats, new regulations -- Cullinane says a big part of his job is calculating a risk picture and quantifying it to show the residual risk and the ROI of your intended fix. Read more from [infoworld]"
"The largest telecommunications company in the Netherlands has stopped issuing SSL certificates after finding indications that the website used for purchasing the certificates may have been hacked. Read more from [computerworld]"
"Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Read more from [computerworld]"
"From its origins in 2003, crimeware (also termed financial malware, stealth malware, or banking Trojans) evolved through a series of advancements that outpaced any and all traditional security defenses, including the foundational Internet defense triad of SSL encryption, anti-virus, and two-factor authentication. The result of these advancements is an efficient attack tool--ZeuS and SpyEye being the leading examples--capable of collecting large volumes of highly-sensitive authentication data. Read more from [computerworld]"
"Espionage attempts are expected to increase as more sensitive information moves online.
The U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing, according to a new government report released Thursday. Read more from [computerworld]"