. Solar Energy News .




.
CYBER WARS
Cybercrime gurus warn of disguised threats
by Staff Writers
San Diego (UPI) Nov 1, 2011

disclaimer: image is for illustration purposes only

Often criticized for thriving on threat perceptions, the security industry is close to admitting that its foes in a burgeoning global gangland of cybercrime are getting more clever, multimedia savvy and becoming masters of disguise.

Some of the security industry's biggest minds will gather Nov. 7-9 at San Diego for a conference dripping with acronyms, computer jargon and geek-speak. The conference is the jamboree of APWG -- Anti-Phishing Working Group to those not initiated into the mysteries of cybercrime terminology.

Phishing, originally coined with a nod to fishing of the marine variety, is the dark craft of identity theft that has mutated into numerous sinister and highly dangerous forms of cybercrime since APWG came into being in 2003.

APWG was formed that year -- two years after the terrorist attacks on the United States on Sept. 11, 2001 -- in response to Internet-based threats from various sources, some directly linked to terrorism, others originating in malicious hacking and still others traced to computer experts serving the interests of organized crime by phishing for financial gain.

Phishing is hugely expensive to get rid of and has cost governments and corporations tens of millions of dollars as they try to clean systems of malware -- usually after an attack. Only recently have governments and corporate entities begun spending more on preventive measures.

APWG said the upcoming conference's agenda "reveals a disturbing trend in the organization of cybercrime gangs' enterprises: a growing mastery of disguise, camouflage and deft, penetrating impersonation of trusted technologies, persons and institutions."

One major threat often mentioned but not sufficiently publicized is fake antivirus software. Just when you think you are doing the right thing to clean up your system you are actually infecting it more, sometimes beyond repair, APWG experts point out.

Fake antivirus software is so widespread that it has spawned an underground economy of its own.

Targeted crimeware and social engineering attacks focus deep inside corporations large and small. Targeted crimeware threats are growing in potency and evasive capacities.

Skeptics who cited the security industry pronouncements as scare tactics to boost sales are among people, including hesitant decision-makers, who are being converted to the threat perception scenarios presented at technology conferences such as next week's APWG.

A keynote address by Eugene H. Spafford, professor of computer sciences at Purdue University, will review new technologies and systems being used to protect Internet works and data resources.

Cynics in the computer industry say the preventive technologies are as good as the last malware -- they need to keep pace with new criminal software being unleashed on the Internet and other systems offline.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries


New cyber attack on Japan parliament
Tokyo (AFP) Nov 2, 2011 - Japan's parliament has come under cyber attack again, apparently from the same emails linked to a China-based server that have already hit several lawmakers' computers, an official said Wednesday.

Malicious emails were found on computers used in the upper chamber of the Japanese parliament, a government spokesman said.

"The upper house office has confirmed that seven suspicious emails, the same ones that were sent to the lower house, were found" in computers in the upper house, Deputy Chief Cabinet Secretary Isao Saito said.

A report last week said that computers in the lower chamber had been hit by a virus, with passwords and other information possibly compromised.

But Saito said the email server of the upper house had not succumbed to any virus and security had been tightened on all machines used by lawmakers there.

Local media reported last month that politicians' computers and a lower house server had contracted a "Trojan horse" virus containing a program that allowed a China-based server to steal passwords and other information.

It was not clear who was behind the attack, the reports said, adding it was possible the China-based server could have been controlled from a third country.

In June, Internet giant Google said a cyber-spying campaign originating in China had targeted the Gmail accounts of senior US officials, military personnel, journalists and Chinese political activists.

China angrily denies that it is orchestrating any online attacks on foreign government agencies and companies.

Japan is already probing a series of recent attacks on computer systems at defence contractor Mitsubishi Heavy, which reportedly could have resulted in the theft of information on military aircraft and nuclear power plants.

Computers at several of Japan's overseas diplomatic missions have also been targeted by hackers, Japanese media said last week.



.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
British aide accuses China, Russia over cyber attacks
London (AFP) Oct 31, 2011
A British government advisor accused China and Russia on Monday of being behind cyber attacks on other states, ahead of a major London conference designed to agree some global rules on cyberspace. Pauline Neville-Jones, Prime Minister David Cameron's special representative to business on cyber security, told BBC radio there was a real threat posed by people trying to obtain Britain's nationa ... read more


CYBER WARS
Genome-scale Network of Rice Genes to Speed the Development of Biofuel Crops

Lincoln Increases Trucking Fleet to Expand Regional Biofuels Service

Animal Farm Powers Village by Alfagy

US Biofuel Production Increase: Fact or Wishful Thinking

CYBER WARS
Is that a robot in your suitcase?

Look, no hands -- robot uses gecko power to climb walls

Japan's Toyota unveils nursing robots

Robotic bug gets wings, sheds light on evolution of flight

CYBER WARS
Mortenson Construction Builds Its Fifth Wind Facility In Illinois

Chinese Wind Market To Overtake Germany by 2018, Second Only to the UK

Huhne slams green energy 'naysayers'

Wind farm development can be powerful, as long as proper design is implemented

CYBER WARS
Volkswagen takes last hurdle in acquisition of MAN

Toyota, Nissan extend Thai flood production halts

S. Korea's Kia Motors to build new plant in China

Seeking Relief From The Parking Wars

CYBER WARS
Vietnam diplomat warns of war in South China Sea

Report: Ill Chavez given two years to live

US says may miss year-end decision on Canada pipeline

Dim prospects for Obama's Plan B in gulf

CYBER WARS
Graphene grows better on certain copper crystals

New method of growing high-quality graphene promising for next-gen technology

Giant flakes make graphene oxide gel

Amorphous diamond, a new super-hard form of carbon created under ultrahigh pressure

CYBER WARS
First renewable energy exchange opens in Amsterdam

Energy grid for ASEAN nations?

Pakistan mulls importing electricity from India

Japanese urged to wrap up warm to save winter power

CYBER WARS
DR Congo seeks to keep its huge green lung breathing

Forests not keeping pace with climate change

Niger capital's 'green lung' facing suffocation

Savannas, forests in a battle of the biomes


.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement