Archive | Links RSS feed for this section

Links for 14-03-2013

These are my links for 14-03-2013:

  • Govt orders probe into cyber attack on DRDO – Fluttered by reports that computers of the Defence Research and Development Organisation (DRDO) having highly sensitive information were hacked by Chinese hackers, the Centre has initiated a probe into the issue on Wednesday.
Comments are closed

Links for 12-03-2013

These are my links for 12-03-2013:

  • A new infosec era? Or a new infosec error? – On March 4, 2013, a contest was held at the Nullcon conference in Goa, India, to see who could take over a botnet. The Times of India reported that the prize money was provided by an Indian government official and was awarded to the Garage4Hackers team.
    (…)
    A contest is the least controlled, riskiest, noisiest, and most irresponsible way to deal with a criminal botnet I can imagine.
Comments are closed

Links for 6-03-2013

These are my links for 6-03-2013:

  • On the web front – This unfolding US-China duel in cyberspace is a stark reminder that not only is the strategic rivalry between the world's two most powerful countries becoming full-fledged, but it could also spread into dangerous territories if neither side sets the minimum rules of engagement.
Comments are closed

Links for 27-02-2013

These are my links for 27-02-2013:

  • Experts Say It’s Time to Prepare for a ‘Post-Crypto’ World | threatpost – In the current climate of continuous attacks and intrusions by APT crews, government-sponsored groups and others organizations, cryptography is becoming less and less important and defenders need to start thinking about new ways to protect data on systems that they assume are compromised, one of the fathers of public-key cryptography said Tuesday. Adi Shamir, who helped design the original RSA algorithm, said that security experts should be preparing for a "post-cryptography" world
Comments are closed

Links for 2-12-2012

These are my links for 2-12-2012:

Comments are closed

Links for 27-07-2012

These are my links for 27-07-2012:

Comments are closed

Links for 16-07-2012

These are my links for 16-07-2012:

  • Hardware Assurance and its importance to National Security – We chose an American military chip that is highly secure with sophisticated encryption standard, manufactured in China. Our aim was to perform advanced code breaking and to see if there were any unexpected features on the chip. We scanned the silicon chip in an affordable time and found a previously unknown backdoor inserted by the manufacturer. This backdoor has a key, which we were able to extract. If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems.
Comments are closed

Links for 8-07-2012

These are my links for 8-07-2012:

Comments are closed

Links for 24-05-2012

These are my links for 24-05-2012:

  • NSA Announces New Program to Prime College Students for Careers in Cyber Ops – Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations – collection, exploitation, and response, for example. Each new center is also required to include an academic unit about the legal and ethical issues in this area.
Comments are closed

Links for 2-05-2012

These are my links for 2-05-2012:

  • Equipment Maker Caught Installing Backdoor Vows to Fix Following Public Pressure – After ignoring a serious security vulnerability in its product for at least a year, a Canadian company that makes equipment and software for critical industrial control systems announced quietly on Friday that it would eliminate a backdoor login account in its flagship operating system, following public disclosure and pressure.
Comments are closed