Category SECURITY

How to root the Nook Tablet

By Eric Mack Rooting the Nook Tablet expands the slate’s horizons with the addition of the Android Market The Nook Tablet from Barnes and Noble offers meatier specs than Amazon’s Kindle Fire for half the price of an iPad, but the selection of apps on offer for the e-Reader/tablet hybrid is a bit underwhelming. Fortunately, […]

Corporate America Must Fight, and Live With, China Hackers: View

By the Editors Dec 15, 2011 5:00 PM MT  Chinese hackers have redefined the concept of room service: In one recent attack, they infiltrated an Internet service provider to some of the world’s leading hotels, potentially gaining access to millions of confidential messages of traveling executives, as well as to the victims’ corporate networks. The electronic theft of proprietary information […]

Electrical grid needs cybersecurity oversight: study

Published 14 December, 2011 – 07:20 In a recently released report, researchers from the Massachusetts Institute of Technology say that a single federal agency should be tasked with protecting the United States’ electrical grid from cyberattacks; the Obama administration has proposed that DHS assume responsibility for the grid, while Congress has submitted proposals for both […]

The Cyber Security Industrial Complex

Documents point to a huge industry that provides online surveillance tools to governments and police agencies. By David Talbot A claim by Wikileaks that documents it released last week provide evidence of a “secret new industry” of mass surveillance was as breathless as previous pronouncements from Julian Assange’s organization. But the material does provide a stark reminder […]

Sons of Stuxnet

Hackers are learning new lessons from the most sophisticated virus code ever written BY STEVEN CHERRY // WED, DECEMBER 14, 2011 Last year, we did a show about the Stuxnet worm that was one of the most listened to of the year. In fact, it’s one of the most listened-to shows of this year as well. Last week, […]

LAPD to rely solely on computers to fight crime

  In an unprecedented move, for the next three months the Los Angeles Police Department (LAPD) will rely entirely on computer software to decide where to deploy patrol officers; the predictive analytics software examines data from past crimes to determine when and where certain crimes are likely to occur next so police can be on […]

Prison systems vulnerable to cyberattack

At the recent Hackers Halted convention in Miami, researchers John J. Strauchs and his daughter Tiffany Strauchs Rad told the audience how with only $2,500 and some basic equipment, they were able to develop a cyberattack on a simulated prison computer system with potentially catastrophic results Research into possible weaknesses in the U.S. prison system’s […]

New cyber attack targets chemical firms: Symantec

By Jim Finkle Mon Oct 31, 2011 5:38pm EDT (Reuters) – At least 48 chemical and defense companies were victims of a coordinated cyber attack that has been traced to a man in China, according to a new report from security firm Symantec Corp. Computers belonging to these companies were infected with malicious software known as “PoisonIvy,” […]

Stuxnet worm slithers into China, heralds alien invasion

Analysis The infamous Stuxnet worm has reportedly begun spreading in China. The worm, which targets supervisory control and data acquisition (SCADA) systems, has infected “millions of computers” across the country, AFP reports. Local anti-virus outfit Rising International told the official Xinhua news agency that six million individuals and nearly 1,000 corporate accounts across China had been infected […]

New theory: Stuxnet was actually created by … China?

Darned compelling, and darned depressing. Not only because it snatches away our vicarious pride in U.S./Israeli ingenuity, but it feeds into western jitters about Chinese omnicompetence. Why, I’ll bet it was those Shanghai teens who cooked this thing up. During recess. The circumstantial evidence is impressive. Just one question: Why would China do it? China has an intimate […]