Warning: A non-numeric value encountered in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php on line 50
Warning: Cannot modify header information - headers already sent by (output started at /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php:50) in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/wp-super-cache/wp-cache-phase2.php on line 1152
Warning: Cannot modify header information - headers already sent by (output started at /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php:50) in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-includes/feed-rss2.php on line 8 Links – Vyūha https://vyuha.nationalinterest.in Mapping the digital battlelinesThu, 30 May 2013 08:20:11 +0000en-UShourly1https://wordpress.org/?v=4.9.18Links for 14-03-2013https://vyuha.nationalinterest.in/links-for-14-03-2013/ Fri, 15 Mar 2013 22:45:00 +0000http://vyuha.nationalinterest.in/links-for-14-03-2013/ Similar posts:
Govt orders probe into cyber attack on DRDO – Fluttered by reports that computers of the Defence Research and Development Organisation (DRDO) having highly sensitive information were hacked by Chinese hackers, the Centre has initiated a probe into the issue on Wednesday.
A new infosec era? Or a new infosec error? – On March 4, 2013, a contest was held at the Nullcon conference in Goa, India, to see who could take over a botnet. The Times of India reported that the prize money was provided by an Indian government official and was awarded to the Garage4Hackers team. (…) A contest is the least controlled, riskiest, noisiest, and most irresponsible way to deal with a criminal botnet I can imagine.
On the web front – This unfolding US-China duel in cyberspace is a stark reminder that not only is the strategic rivalry between the world's two most powerful countries becoming full-fledged, but it could also spread into dangerous territories if neither side sets the minimum rules of engagement.
Experts Say It’s Time to Prepare for a ‘Post-Crypto’ World | threatpost – In the current climate of continuous attacks and intrusions by APT crews, government-sponsored groups and others organizations, cryptography is becoming less and less important and defenders need to start thinking about new ways to protect data on systems that they assume are compromised, one of the fathers of public-key cryptography said Tuesday. Adi Shamir, who helped design the original RSA algorithm, said that security experts should be preparing for a "post-cryptography" world
Hardware Assurance and its importance to National Security – We chose an American military chip that is highly secure with sophisticated encryption standard, manufactured in China. Our aim was to perform advanced code breaking and to see if there were any unexpected features on the chip. We scanned the silicon chip in an affordable time and found a previously unknown backdoor inserted by the manufacturer. This backdoor has a key, which we were able to extract. If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems.
NSA Announces New Program to Prime College Students for Careers in Cyber Ops – Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations – collection, exploitation, and response, for example. Each new center is also required to include an academic unit about the legal and ethical issues in this area.
Equipment Maker Caught Installing Backdoor Vows to Fix Following Public Pressure – After ignoring a serious security vulnerability in its product for at least a year, a Canadian company that makes equipment and software for critical industrial control systems announced quietly on Friday that it would eliminate a backdoor login account in its flagship operating system, following public disclosure and pressure.