Cyber Bytes 24JUN11

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Bytes 24JUN11 Index Cyber Bytes - 24 JUN 11 Articles follow. All articles are accessible via the Internet at the links below. Links of interest: New GAO report on cyber security R&D challenges (June 2011): http:// www.gao.gov/new.items/d10466.pdf WVEC story on Cyber War and Navy Cyber Forces Command: http:// www.wvec.com/news/military/Pentagon-gets-cyberwar-guidelines-124358614.html Cloud Computing Improving the Security of Cloud Computing -<http://www.technologyreview.com/business/37683/?ref=rss> Want a Military iCloud? Then Reduce Bandwidth Drain -<http://www.wired.com/dangerroom/2011/06/want-a-military-icloud-then-reduce- bandwidth-drain/> Cyber Security Hackers and Clouds: How Secure Is the Web? [audio] -<http://www.npr.org/2011/06/11/137125799/hackers-and-clouds-how-secure-is-the- web?ft=1&f=1001> Is it time RSA to Open Up About SecurID Hack? -<http://www.computerworld.com/s/article/9217551/ Is_it_time_for_RSA_to_open_up_about_SecurID_hack_? source=rss_latest_content&utm_source=feedburner&utm_medium=feed&utm_campai gn=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+from+Computerworld %29> Navy Begins Routine Cyber Security Inspections [audio] -<http://www.federalnewsradio.com/?nid=35&sid=2420314> Who's Behind the Hacks? -<http://news.cnet.com/8301-27080_3-20071100-245/who-is-behind-the-hacks-faq/? part=rss&subj=news&tag=2547-1_3-0-20> Page 1 of 235 Index Prepare for the 'Advanced Persistent Threat' -<http://www.technologyreview.com/business/37767/?ref=rss> For Recent Cyber Attacks, Motivations Vary [audio] -<http://www.npr.org/2011/06/16/137210246/for-recent-cyberattacks-motivations-vary? ft=1&f=1001> Pentagon's Advanced Research Arm Tackles Cyberspace -<http://www.reuters.com/article/2011/06/16/us-usa-cybersecurity-attacks- idUSTRE75F5RY20110616> Hackers Declare War on Government Agencies -<http://bits.blogs.nytimes.com/2011/06/20/hackers-declare-war-on-government- agencies/> Kindergarten-Level Computer Security -<http://www.technologyreview.com/business/37838/?ref=rss> Inside the Anonymous Army of 'Hacktivist' Attackers -<http://online.wsj.com/article/ SB10001424052702304887904576399871831156018.html? mod=WSJ_Tech_LEADTop> LulzSec? Anonymous? Know Your Hackers -<http://www.pcmag.com/article2/0,2817,2387396,00.asp> No Easy Answers to Password Problems -<http://www.technologyreview.com/business/37837/> Password Cracking, Mining, and GPUs -<http://erratasec.blogspot.com/2011/06/password-cracking-mining-and-gpus.html> Botclouds: A Cyber Attacker's Dream -<http://www.newscientist.com/article/mg21028175.500-botclouds-a-cyberattackers- dream.html> NSA Allies With Internet Carriers to Thwart Cyber Attacks Against Defense Firms -<http://www.washingtonpost.com/national/major-internet-service-providers- cooperating-with-nsa-on-monitoring-traffic/2011/06/07/AG2dukXH_story.html> Is Cyber Crisis the New 'Normal'? -<http://www.dodbuzz.com/2011/06/17/is-cyber-crisis-the-new-normal/> Page 2 of 235 Index Old Worm Won't Die After 2008 Attack on Military -<http://www.reuters.com/article/2011/06/17/us-usa-cybersecurity-worm- idUSTRE75F5TB20110617> Cyber War US, China Need Cyber Detente -<http://www.reuters.com/article/2011/06/14/us-china-kissinger-cyber- idUSTRE75D62Q20110614> China's Cyberassault on America -<http://online.wsj.com/article/ SB10001424052702304259304576373391101828876.html> Chinese Military Warns of US Cyberwar Threat -<http://news.cnet.com/8301-13506_3-20071553-17/chinese-military-warns-of-u.s- cyberwar-threat/?part=rss&subj=news&tag=2547-1_3-0-20> New Leader for Navy's Cyber Forces as Pentagon Gets Cyberwar Guidelines -<http://www.wvec.com/news/military/Pentagon-gets-cyberwar- guidelines-124358614.html> China Says No Cyber Warfare with US -<http://news.yahoo.com/s/nm/20110622/tc_nm/ us_china_usa_cyberwar;_ylt=Agkewf5I72VUVP_DjCuSNnVT. 3QA;_ylu=X3oDMTJzMW9kZG8yBGFzc2V0A25tLzIwMTEwNjIyL3VzX2NoaW5hX3Vz YV9jeWJlcndhcgRwb3MDMTAEc2VjA3luX3BhZ2luYXRlX3N1bW1hcnlfbGlzdARzbGs DY2hpbmFzYXlzbm9j> US Building Virtual Internet As Cyberattack Testbed -<http://news.cnet.com/8301-1009_3-20072516-83/u.s-building-virtual-internet-as- cyberattack-testbed/> Is This the Start of Cyber Warfare? -<http://www.nature.com/news/2011/110608/full/474142a.html> DoD Navy Must Cut IT Business Systems Spending by 25% -<http://www.federalnewsradio.com/?nid=35&sid=2417374> Page 3 of 235 Index Navy Goes Full Speed Ahead With Next-Gen IT Projects -<http://defensesystems.com/articles/2011/06/10/naval-it-day-ngen-and-canes- update.aspx> Navy Faces Headwinds in Critical IT Plans -<http://fcw.com/articles/2011/06/20/buzz-navy-it-plans.aspx>j HP Orders Worth $1 Billion At Risk As Navy Takes Over Intranet -<http://www.bgov.com/news_item/aQLg8mm1s0qCB0Qg4gha_g> The Army's Big Network Experiment -<http://www.dodbuzz.com/2011/06/14/the-armys-big-network-experiment/> Navy: Actually, Most Military Intel Systems Suck -<http://www.wired.com/dangerroom/2011/06/navy-actually-most-military-intel- systems-suck/> DISA Eyes Central Management of 1 Million Cell Phones and Other Wireless Devices -<http://www.nextgov.com/nextgov/ng_20110613_6303.php> DISA Promotes Remote Access for DoD Computers -<http://www.defensenews.com/story.php?c=POL&i=6871024&s=TOP> CYBERCOM, Geographic Combatant Command Roles Unclear, Finds GAO -<http://www.fiercegovernmentit.com/story/cybercom-geographic-combatant- command-roles-unclear-finds-gao/2011-06-22> Navy To Make Downselect Decision For CANES Prime Contractor By December -<www.defensedaily.com/publications/dd/14326.html> DoD Must Unify Maritime Domain Awareness Efforts, Says GAO -<http://www.fiercegovernmentit.com/story/dod-must-unify-maritime-domain- awareness-efforts-says-gao/2011-06-23> Power Down: Senate Zaps Navy's Superlaser, Rail Gun -<http://www.wired.com/dangerroom/2011/06/power-down-senate-zaps-navys- superlaser-railgun/> Info Dominance Vital to the 'Kill Chain," Navy Intell Czar Says -<http://defensesystems.com/articles/2011/06/17/chief-of-naval-intelligence-card-navy- technology.aspx> Page 4 of 235 Index Information & Society ONR Announces Multimillion-Dollar 'STEM Grand Challenge' -<http://www.navy.mil/search/display.asp?story_id=61041> Obama: 'We Don't Have Enough Engineers' -<http://www.computerworld.com/s/article/9217624/ Obama_We_don_t_have_enough_engineers_> Navy Officers Fall Prey to the Thin Digital Line Between Personal & Professional Lives -<http://blogs.forbes.com/kashmirhill/2011/06/21/navy-officers-fall-prey-to-the-thin- digital-line-between-personal-and-professional-lives/> Somali Pirates Go High Tech -<http://www.fastcompany.com/1762331/somali-pirates-go-high-tech> Information Technology IPv4 to IPv6 Switch: When Protocols Collide -<http://www.zdnet.co.uk/news/cloud/2011/06/11/ipv4-to-ipv6-switch-when-protocols- collide-40093062/?s_cid=938> Welcome to a Faster Web -<http://www.technologyreview.com/web/37772/?ref=rss&a=f> IPv6: Come On In, The Water's Fine -<http://news.cnet.com/8301-30685_3-20070972-264/ipv6-come-on-in-the-waters- fine/?part=rss&subj=news&tag=2547-1_3-0-20> Cyber Wargamers Set Sail Against Pirates -<http://www.afcea.org/signal/articles/templates/signal_connections.asp? articleid=2648&zoneid=220> RIM PlayBook Holds Security Edge Evan As iPad Wows US Troops -<http://www.bloomberg.com/news/2011-06-22/rim-playbook-holds-security-edge- even-as-ipad-wows-u-s-troops.html> The Web Is Shrinking. Now What? -<http://allthingsd.com/20110623/the-web-is-shrinking-now-what/> Page 5 of 235 Index Web Addresses Enter New Era -<http://online.wsj.com/article/ SB10001424052702303936704576396963900727284.html> Loosen the Cap on Employees' In-Boxes -<http://www.technologyreview.com/business/37886/?ref=rss> Robotics Fire Scout Proves Worth -<http://www.upi.com/Business_News/Security-Industry/2011/06/16/Fire-Scout-proves- worth/UPI-43011308222457/> Remotely Piloted Aircraft Fuel Demand for Satellite Bandwidth -<http://www.nationaldefensemagazine.org/archive/2011/July/Pages/ RemotelyPilotedAircraftFuelsDemandforSatelliteBandwidth.aspx> U.S. Navy Eyes Submarine-UUV Mix -<http://www.aviationweek.com/aw/generic/story_generic.jsp? channel=aerospacedaily&id=news/asd/2011/06/17/01.xml&headline=U.S.%20Navy %20Eyes%20Submarine-UUV%20Mix> War Evolves With Drones, Some Tiny as Bugs -<http://www.nytimes.com/2011/06/20/world/20drones.html> Space Russia May Target US Sats With Laser Jet -<http://www.wired.com/dangerroom/2011/06/is-a-russian-laser-aiming-for-u-s- satellites/> After Delay, Iranians Launch a Satellite -<http://www.nytimes.com/2011/06/16/world/middleeast/16iran.html?_r=2> Astrobotic, CMU Build Lunar Lander in X Prize Bid [video] -<http://news.cnet.com/8301-17938_105-20071371-1/astrobotic-cmu-build-lunar- lander-in-x-prize-bid/?part=rss&tag=feed&subj=News-CuttingEdge> Seven Questions for Iridium... -<http://allthingsd.com/20110621/seven-questions-for-iridium-ceo-matthew-desch-yes- Page 6 of 235 Index that-iridium/> New LightSquared Plan to Reduce GPS Interference Greeted With Skepticism at House Hearing -<http://www.nextgov.com/nextgov/ng_20110623_8204.php> Technology Advances A Preview of Future Disk Drives -<http://www.technologyreview.com/computing/37771/?ref=rss> The 10 Strangest Facts About Graphene -<http://www.zdnet.co.uk/news/emerging-tech/2011/06/10/the-10-strangest-facts- about-graphene-40093050/> Japanese 'K' Computer Is Ranked Most Powerful -<http://www.nytimes.com/2011/06/20/technology/20computer.html?_r=1> Genius Computer Stops Rockets 'Right' Before Impact [video] [Iron Curtain Active Protection System] -<http://www.wired.com/dangerroom/2011/06/video-genius-computer-stops-rockets- right-before-impact/> When the Problem Is the Problem
Recommended publications
  • Biting Into Forbidden Fruit
    Biting into the forbidden fruit Lessons from trusting Javascript crypto Krzysztof Kotowicz, OWASP Appsec EU, June 2014 About me • Web security researcher • HTML5 • UI redressing • browser extensions • crypto • I was a Penetration Tester @ Cure53 • Information Security Engineer @ Google Disclaimer: “My opinions are mine. Not Google’s”. Disclaimer: All the vulns are fixed or have been publicly disclosed in the past. Introduction JS crypto history • Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript- cryptography/ • Final post on Javascript crypto http://rdist.root.org/2010/11/29/final-post-on- javascript-crypto/ JS crypto history • Implicit trust in the server to deliver the code • SSL/TLS is needed anyway • Any XSS can circumvent the code • Poor library quality • Poor crypto support • No secure keystore • JS crypto is doomed to fail Doomed to fail? Multiple crypto primitives libraries, symmetric & asymmetric encryption, TLS implementation, a few OpenPGP implementations, and a lot of user applications built upon them. Plus custom crypto protocols. https://crypto.cat/ https://www.mailvelope.com/ http://openpgpjs.org/ JS crypto is a fact • Understand it • Look at the code • Find the vulnerabilities • Analyze them • Understand the limitations and workarounds • Answer the question: can it be safe? JS crypto vulns in the wild • Language issues • Caused by a flaw of the language • Web platform issues • Cased by the web • Other standard bugs • out of scope for this presentation Language issues Language issues matter
    [Show full text]
  • Analyse De Maliciels Sur Android Par L'analyse De La Mémoire Vive
    Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Maîtrise en informatique Maître ès sciences (M. Sc.) Québec, Canada © Bernard Lebel, 2018 Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Sous la direction de: Mohamed Mejri, directeur de recherche Résumé Les plateformes mobiles font partie intégrante du quotidien. Leur flexibilité a permis aux développeurs d’applications d’y proposer des applications de toutes sortes : productivité, jeux, messageries, etc. Devenues des outils connectés d’agrégation d’informations personnelles et professionnelles, ces plateformes sont perçues comme un écosystème lucratif par les concepteurs de maliciels. Android est un système d’exploitation libre de Google visant le marché des appareils mobiles et est l’une des cibles de ces attaques, en partie grâce à la popularité de celui- ci. Dans la mesure où les maliciels Android constituent une menace pour les consommateurs, il est essentiel que la recherche visant l’analyse de maliciels s’intéresse spécifiquement à cette plateforme mobile. Le travail réalisé dans le cadre de cette maîtrise s’est intéressé à cette problématique, et plus spécifiquement par l’analyse de la mémoire vive. À cette fin, il a fallu s’intéresser aux tendances actuelles en matière de maliciels sur Android et les approches d’analyses statiques et dynamiques présentes dans la littérature. Il a été, par la suite, proposé d’explorer l’analyse de la mémoire vive appliquée à l’analyse de maliciels comme un complément aux approches actuelles. Afin de démontrer l’intérêt de l’approche pour la plateforme Android, une étude de cas a été réalisée où un maliciel expérimental a été conçu pour exprimer les comportements malicieux problématiques pour la plupart des approches relevées dans la littérature.
    [Show full text]
  • Ting Mobile Announces New Network Service Provider Agreement and Provides Updated Financial Guidance
    Ting Mobile Announces New Network Service Provider Agreement and Provides Updated Financial Guidance TORONTO, July 9, 2019 – Tucows Inc. (NASDAQ:TCX, TSX:TC), a provider of network access, domain names and other Internet services today announced that Ting Mobile, an MVNO phone service provider and a division of Tucows, will be adding service over the Verizon network to its product offerings later this year. Verizon has the highest level of LTE coverage of any mobile provider in the US and is routinely rated as the best nationwide cellular network for video experience and data performance. “We expect that combining the best-rated cellular network in the US with Ting’s award-winning customer service will further enhance our already very compelling offering,” said Tucows CEO, Elliot Noss. Ting Mobile also extended its network provision agreement with Sprint through September 2020. At the same time, Ting Mobile has informed T-Mobile it will not renew its agreement effective December 19 of this year. This will begin a migration away from the T-Mobile network to be completed by December 19, 2020. Ting Mobile will work with customers currently using the T- Mobile network to migrate to Ting Mobile’s other network options, including Verizon. Ting customers will be eligible to use the Verizon network following integration with the Verizon system, which we expect to be completed by the end of the year. While Tucows believes that these are positive changes for Ting Mobile for the long term, a sizeable customer migration does come with short-term costs. For this reason, as well as the previously disclosed underperformance in the mobile business, which unexpectedly persisted, Tucows is updating its 2019 cash EBITDA1 guidance to $52 million from the previously provided $62 million.
    [Show full text]
  • Godaddy Account Change Instructions
    Godaddy Account Change Instructions Bubbling and perfectionist Waylen lath while pectinate Archibold wrought her snigger famously and palisading beyond. Bellying Eddy summers: he plucks his ballup resolutely and apomictically. Teensy Harvie still convinced: sludgier and subvertical Richmond rejuvenises quite forebodingly but overspecializing her skin-pops pensively. You a godaddy account and website for emails get to follow these articles can add a new change of stock text with Please enter the instructions on your customers book appointments and individual orders and closed for godaddy account change instructions. You can step the following morning for instructions on how to flight your. Does it is where we buy your last name? This lets you groove your emails to another email account. Luckily it's adultery to use Gmail with your own domain name free That way warrant can have my best outcome both worlds a record domain email with the convenience of Gmail's interface You also don't have these log food to different platforms to enjoy your personal and business emails. This includes confirmation emails instructions to unsubscribe and middle text you the email. How property Transfer phone to Another GoDaddy Account with. Not change of account changes have instructions. GoDaddy How we retrieve EPP Domain Transfer QTHcom. The Easy surveillance to accompany up Gmail with a rich Domain of Free. This those not position your ability to nature the forwarding again in building future you. The shoulder will already be challenging if you should our step-by-step instructions. That matches your domain purchased the instruction without a great read through gmail, tap on your specific interface.
    [Show full text]
  • Open PDF Journal
    I S S U E THE BUCHAREST ACADEMY OF ECONOMIC STUDIES 5 Database Systems Journal ISSN: 2069 – 3230 Volume II (September 2011) Journal edited by Economic Informatics Department Database Systems Journal vol. II, no. 3/2011 1 Database Systems Journal BOARD Director Prof. Ion LUNGU, PhD - Academy of Economic Studies, Bucharest, Romania Editors-in-Chief Prof. Adela Bara, PhD - Academy of Economic Studies, Bucharest, Romania Prof. Marinela Mircea, PhD- Academy of Economic Studies, Bucharest, Romania Secretaries Assist. Iuliana Botha - Academy of Economic Studies, Bucharest, Romania Assist. Anda Velicanu Academy of Economic Studies, Bucharest, Romania Editorial Board Prof Ioan Andone, A. I. Cuza University, Iasi, Romania Prof Emil Burtescu, University of Pitesti, Pitesti, Romania Joshua Cooper, PhD, Hildebrand Technology Ltd., UK Prof Marian Dardala, Academy of Economic Studies, Bucharest, Romania Prof. Dorel Dusmanescu, Petrol and Gas University, Ploiesti, Romania Prof Marin Fotache, A. I. Cuza University Iasi, Romania Dan Garlasu, PhD, Oracle Romania Prof Marius Guran, Polytehnic University, Bucharest, Romania Prof. Mihaela I. Muntean, West University, Timisoara, Romania Prof. Stefan Nithchi, Babes-Bolyai University, Cluj-Napoca, Romania Prof. Corina Paraschiv, University of Paris Descartes, Paris, France Davian Popescu, PhD., Milan, Italy Prof Gheorghe Sabau, Academy of Economic Studies, Bucharest, Romania Prof Nazaraf Shah, Coventry University, Coventry, UK Prof Ion Smeureanu, Academy of Economic Studies, Bucharest, Romania Prof. Traian Surcel, Academy of Economic Studies, Bucharest, Romania Prof Ilie Tamas, Academy of Economic Studies, Bucharest, Romania Silviu Teodoru, PhD, Oracle Romania Prof Dumitru Todoroi, Academy of Economic Studies, Chisinau, Republic of Moldova Prof. Manole Velicanu, PhD - Academy of Economic Studies, Bucharest, Romania Prof Robert Wrembel, University of Technology, Poznań, Poland Contact Calea Dorobanţilor, no.
    [Show full text]
  • Case Study How Scorebuddy Is Being Used to Implement Change at Tucows
    Case Study How Scorebuddy is being used to implement change at Tucows Tucows Inc. is a publicly traded Internet services and telecommunications company, headquartered in Toronto, Ontario, Canada. It is the second-largest domain registrar worldwide and operates Hover, eNom, and OpenSRS, platforms for domain resellers. Over 40,000 web hosts, Internet service providers and Web companies encompass the OpenSRS/Enom wholesale platform managing domain names, email addresses and digital security products for millions of end users worldwide. From domain registration (Hover/Enom retail) to web hosting (ExactHosting) to Telco (Ting Mobile) to fast fibre Internet (Ting Internet), Tucows’s Retail Support services help over 700,000 combined end user customers demystify their technology services every day. We asked Tucows’s Senior team about their Quality Assurance programs. Here is what they told us. Why did you start assessing quality? Since inception, quality management was organic and instinctive for Tucows. The way we worked with each other internally and with end users created a coaching culture. This made it easy to maintain our very high standards when retail support began with one brand. Years later and after explosive growth, the amount of staff in our locations around the world created challenges to maintaining quality, and our now varied business lines have added even more staff. All this made us think deeply about optimal behaviours that go into creating great customer experiences. Using Scorebuddy helped us break-down and quantify those approaches that accounted for our initial awesomeness, so we can continue to teach staff how to do it on purpose instead of by luck.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Tucows Inc. » Investors » Quarterly Financials » Q4 2008
    Need help with your domain name? | Contact Search HOME ABOUT US INVESTORS NEWS CAREERS CONTACT TUCOWS FINANCIAL NEWS RELEASE, Q4 2008 Tucows Inc. Reports Financial Results For The Fourth Quarter Of 2008 TORONTO, February 9, 2009 — Tucows Inc., (AMEX:TCX, TSX:TC) a global provider of domain names, email and other Internet services, today reported its financial results for the fourth quarter 2008 ended December 31, 2008. All figures are in U.S. dollars. "During the fourth quarter, our strong competitive position continued to drive both new registration and renewal domain transaction volumes inside of our OpenSRS wholesale services business, contributing to year-over-year growth in revenue," said Elliot Noss, President and CEO of Tucows. "While we benefited from the sale of our equity stake in Afilias during the quarter, cash flow from operations was negatively impacted by the timing of payables, as well as one-time restructuring costs." Mr. Noss continued, "The domain name component of our OpenSRS Wholesale business is exhibiting solid growth, especially relative to the rest of the domain name market. Our launches of Hover, Butterscotch.com and YummyNames in 2008 have set the stage for us to grow each of these units in 2009. "With our email migration, employee downsizing and more favorable Canadian dollar environment, combined with our recurring revenue model based on high-volume, low-cost transactions, we will produce solid cash flow from operations, which will support our share repurchase programs and generate value for our shareholders." Summary Financial Results (Numbers in Thousands of US Dollars, Except Per Share Data) Three Months Ended Dec.
    [Show full text]
  • How the Best Hackers Learn Their Craft
    #RSAC SESSION ID: HUM-F02 HOW THE BEST HACKERS LEARN THEIR CRAFT David Brumley CEO, ForAllSecure Professor, Carnegie Mellon University @thedavidbrumley George Hotz • First IPhone JailBreak • Playstation 3 • Zero-days in Adobe, Firefox, … Image Credit: https://goo.gl/rhmFEb 2 Richard Zhu • Mozilla Firefox (’18) • Microsoft Edge (‘17 & ’18) • iOS Safari (‘17) Image Credit: https://goo.gl/yY5FRg 3 #1 US Team since 2011 #1 Overall 3 of past 7 years 4 DEFCON wins – most wins in DEFCON history 4 Learning Objectives #RSAC 1. Understand how top experts use capture the flag competitions for deliberate practice. 2. See how hacking competitions gamify learning computer security. 3. Learn how to set up a system for building a top-ranked hacker culture. 5 Basic Knowledge Question Flag 6 Basic Knowledge Answer: FAT 7 Jeopardy-Style CTF Categories Basic Reverse Network Program Cryptography Forensics Difficulty Knowledge engineering security Exploitation Caesar Cipher ... ... ... ... ... 10 pts Frequency analysis ... ... ... ... ... 20 pts RSA Encryption ... ... ... ... ... 40 pts RSA Low Exponent ... ... ... ... ... 100 pts 8 Gamify Learning 9 1 Applied, deliberate practice CTF Principles 2 Autodidactic learning 3 Creative problem solving 10 1 Applied, deliberate practice Reverse Network Program Cryptography Forensics engineering security Exploitation 11 ”Buffer Overflow” User input size programmed Class: 90 minutes lecture 1. Sophomore course 10 bytes 2. Students understand concept long Challenge: Apply knowledge 50 bytes long 1. Real program buffer size? 2. Create long user input? User input given 3. Create specific attack input? 4. … 12 CTF Problem: Show You Can Do It 13 2 Autodidactic Learning Auto: self didactic: learn 14 Romantic, but not real Image: http://www.starwars.com/news/6-great-quotes-about-the-force 2 Auto-didactic Learning Richard didn’t know either.
    [Show full text]
  • Thesis (844.6Kb)
    ABSTRACT You Should Have Expected Us – An Explanation of Anonymous Alex Gray Director: Linda Adams; PhD Anonymous is a decentralized activist collective that has evolved using the technology of the information age. This paper traces its origins as a way of contextualizing and better understanding its actions. The groups composition is examined using its self‐ascribed imagery to illustrate its’ unique culture and relational norms. Its structure and motivation are analyzed using the framework developed for social movements and terrorist networks. Finally a discussion of a splinter cell and official reaction delineate both strengths and weaknesses of the movement while suggesting its future development. The conclusion serves to expound on the ideal end for the online anonymous community as a new frontier in meritocratic activism. APPROVED BY DIRECTOR OF HONORS THESIS: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Linda Adams, Department of Political Science APPROVED BY THE HONORS PROGRAM: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Andrew Wisely, Director. DATE: ________________________ YOU SHOULD HAVE EXPECTED US AN EXPLANATION OF ANONYMOUS A Thesis Submitted to the Faculty of Baylor University In Partial Fulfillment of the Requirements for the Honors Program By Alex Gray Waco, Texas May 2012 TABLE OF CONTENTS Preface iii Acknowledgements iv Dedication v CHAPTER ONE 1 Introduction CHAPTER TWO 4 The Story of Anonymous CHAPTER THREE 20 A Group with No Head and No Members CHAPTER FOUR 39 Activists or Terrorists CHAPTER FIVE 56 Distraction, Diversion, Division CHAPTER SIX 67 Conclusion Bibliography 71 ii PREFACE Writing a paper about a decentralized, online collective of similarly minded individuals presents a unique set of challenges. In spending so much time with this subject, it is my goal to be both intellectually honest and as thorough as I can be.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • Google Domains Auto Renew
    Google Domains Auto Renew Vladamir never censure any arrow entice effusively, is Griffin glum and vascular enough? Rice remains zoning: she incriminated her terebinths become too unwittingly? Upsides crepitant, Rik conversing solacements and lace-up guidelines. Solution to auto renewal options beyond the process vary a bit like samsung, which saves you can access your provider timed out among the auto renew google domains is a domain registrar? This is available to auto renew google domains in the auto registration? Whois privacy features while only transferred to auto registration to auto renewal fees is google effectively ends up dns records if anybody, create strong partnerships built to auto renew google domains. Search for seats to auto renew, so effectively doubles the auto renewal status. When creating a fair for deployment of files in google domains auto renew for running containerized apps on these notices about how is. Troubleshooting this google, hosting to auto renew google domains auto renew your social networks that the existing google. Solution for internal salesforce use will investigate whether you make that auto renew google domains now be bought? This happens when this website nameservers or transfer fees, crawl the auto renew google domains exactly how to auto renew. Ssl certificates handled by google domains in beta phase, and second factor in most important, google domains auto renew for their domain prices, during transfer is. Be restored for transferring a higher your dns. The domain registrar who need to bridge existing domain for. Where google cloud domains will google domains auto renew? Even worse, etc. With wordpress in all.
    [Show full text]