Cyberpro December 4, 2008
Total Page:16
File Type:pdf, Size:1020Kb
Volume 1, Edition 15 CyberPro December 4, 2008 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Senior Analyst newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any ------------------------------ misuse or unauthorized use of the newsletter and its contents will result CyberPro Research in removal from the distribution list and/or possible administrative, civil, Analyst and/or criminal action. Kathryn Stephens The views, opinions, and/or findings and recommendations contained in this summary are those of the authors and should not be construed as an official position, policy, or decision of the United States Government, CyberPro Archive U.S. Department of Defense, or National Security Cyberspace Institute. To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Larry McKee , ph. (757) 871-3578, regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume 1, Edition 15 CyberPro December 4, 2008 Keeping Cyberspace Professionals Informed TABLE OF CONTENTS Table of Contents .................................................................................................................. 2 Cyberspace – Big Picture ........................................................................................................ 4 America Needs Offensive ‘Cyberwar’ Technology ................................................................................... 4 U.S. faces cyber threat from China........................................................................................................... 4 Information Operation Threats Strike Public Sector ................................................................................. 5 Experts tackle guidance to stop cyberattacks .......................................................................................... 5 Federal, Commercial Worlds Contribute to Cyberdefense ....................................................................... 6 FBI warns of holiday cyber scams ............................................................................................................ 6 Evolving Cybersecurity Faces a New Dawn ............................................................................................. 6 Has FISMA improved IT security? Maybe ................................................................................................ 6 Self-signed certificates undermine network security ................................................................................ 7 Malware is Getting Smarter, CA Warns .................................................................................................... 7 Nightmare Before Christmas: Researchers Warn Of Holiday Shopping Threats ..................................... 7 Apple: Mac Users Should Get Antivirus Software .................................................................................... 7 Mobile Handsets Becoming A 'Smoking Gun' .......................................................................................... 8 Is there no end to the AutoRun madness? ............................................................................................... 8 SanDisk Offers McAfee Anti-Malware Technology in Secure USB Flash Drives ..................................... 8 Phishing attacks boosted by smarter malware ......................................................................................... 8 PineApp Unveils Mail Encryption Software .............................................................................................. 9 Cyberspace – International .................................................................................................... 9 Estonian ISP cuts off control servers for Srizbi botnet ............................................................................. 9 World Bank Removes Chief Information Officer Following Cyber Attacks ............................................... 9 China Stealing U.S. Computer Data, Says Commission .......................................................................... 9 Feuding India, Pakistani hackers deface web sites ................................................................................ 10 Iran Admits That Its Computers Were Bugged ....................................................................................... 10 British government's identity card plan begins ....................................................................................... 10 Dictators Prefer Botnets .......................................................................................................................... 11 Cyberspace – Mumbai Terrorist Attacks ............................................................................... 11 Google Earth used by terrorists in India attacks ..................................................................................... 11 Cyber terrorism also grips India .............................................................................................................. 12 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 2 Volume 1, Edition 15 CyberPro December 4, 2008 Keeping Cyberspace Professionals Informed Cyberspace Research ........................................................................................................... 12 Invention: Secret message finder ........................................................................................................... 12 Anti-virus no defence against botnets, says vendor ............................................................................... 12 Researchers argue over spam levels ..................................................................................................... 12 U.S. Army Goes Bot Hunting .................................................................................................................. 13 Cyber Shopping Hits Plateau .................................................................................................................. 13 Financial Services Industry Needs To Better Educate Employees About Security: ENISA ................... 13 NTT America Presents Network Security White Paper .......................................................................... 13 Cyberspace – President-Elect Obama ................................................................................... 14 5 Must-Do Cyber Security Steps for Obama .......................................................................................... 14 Challenges await Obama in bid to build up federal IT security .............................................................. 14 What Obama’s CTO Should Do.............................................................................................................. 15 Cybereye – IT Czar Could Improve Cyber Security ............................................................................... 15 Cyberspace – Department of Defense (DoD) ........................................................................ 15 Who Protects The Internet? .................................................................................................................... 15 Leaked Army Files Highlight Dangers of Peer-To-Peer ......................................................................... 15 Military Looking Abroad for Source of Cyber Attack on Pentagon ......................................................... 16 Cyber wars .............................................................................................................................................. 16 Playing Nice with Others ......................................................................................................................... 16 Cyberspace Hacks, Tactics, and Defense ............................................................................... 17 Spammers regaining control over Srizbi botnet ...................................................................................... 17 New Windows worm builds massive botnet ........................................................................................... 17 Script Fragmentation Attack Could Allow Hackers to Dodge Anti-virus Detection ................................. 17 CBS website bitten by iFrame hack ........................................................................................................ 17 Gmail Hack: A Route to Domain Theft? ................................................................................................. 18 Victoria Secret competition gets hacked ................................................................................................ 18 Experts douse Sinowal Trojan hype ....................................................................................................... 18 Botnet master sees himself as next Bill Gates ......................................................................................