. Space Travel News .




.
CYBER WARS
Cybercrime gurus warn of disguised threats
by Staff Writers
San Diego (UPI) Nov 1, 2011

disclaimer: image is for illustration purposes only

Often criticized for thriving on threat perceptions, the security industry is close to admitting that its foes in a burgeoning global gangland of cybercrime are getting more clever, multimedia savvy and becoming masters of disguise.

Some of the security industry's biggest minds will gather Nov. 7-9 at San Diego for a conference dripping with acronyms, computer jargon and geek-speak. The conference is the jamboree of APWG -- Anti-Phishing Working Group to those not initiated into the mysteries of cybercrime terminology.

Phishing, originally coined with a nod to fishing of the marine variety, is the dark craft of identity theft that has mutated into numerous sinister and highly dangerous forms of cybercrime since APWG came into being in 2003.

APWG was formed that year -- two years after the terrorist attacks on the United States on Sept. 11, 2001 -- in response to Internet-based threats from various sources, some directly linked to terrorism, others originating in malicious hacking and still others traced to computer experts serving the interests of organized crime by phishing for financial gain.

Phishing is hugely expensive to get rid of and has cost governments and corporations tens of millions of dollars as they try to clean systems of malware -- usually after an attack. Only recently have governments and corporate entities begun spending more on preventive measures.

APWG said the upcoming conference's agenda "reveals a disturbing trend in the organization of cybercrime gangs' enterprises: a growing mastery of disguise, camouflage and deft, penetrating impersonation of trusted technologies, persons and institutions."

One major threat often mentioned but not sufficiently publicized is fake antivirus software. Just when you think you are doing the right thing to clean up your system you are actually infecting it more, sometimes beyond repair, APWG experts point out.

Fake antivirus software is so widespread that it has spawned an underground economy of its own.

Targeted crimeware and social engineering attacks focus deep inside corporations large and small. Targeted crimeware threats are growing in potency and evasive capacities.

Skeptics who cited the security industry pronouncements as scare tactics to boost sales are among people, including hesitant decision-makers, who are being converted to the threat perception scenarios presented at technology conferences such as next week's APWG.

A keynote address by Eugene H. Spafford, professor of computer sciences at Purdue University, will review new technologies and systems being used to protect Internet works and data resources.

Cynics in the computer industry say the preventive technologies are as good as the last malware -- they need to keep pace with new criminal software being unleashed on the Internet and other systems offline.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries




New cyber attack on Japan parliament
Tokyo (AFP) Nov 2, 2011 - Japan's parliament has come under cyber attack again, apparently from the same emails linked to a China-based server that have already hit several lawmakers' computers, an official said Wednesday.

Malicious emails were found on computers used in the upper chamber of the Japanese parliament, a government spokesman said.

"The upper house office has confirmed that seven suspicious emails, the same ones that were sent to the lower house, were found" in computers in the upper house, Deputy Chief Cabinet Secretary Isao Saito said.

A report last week said that computers in the lower chamber had been hit by a virus, with passwords and other information possibly compromised.

But Saito said the email server of the upper house had not succumbed to any virus and security had been tightened on all machines used by lawmakers there.

Local media reported last month that politicians' computers and a lower house server had contracted a "Trojan horse" virus containing a program that allowed a China-based server to steal passwords and other information.

It was not clear who was behind the attack, the reports said, adding it was possible the China-based server could have been controlled from a third country.

In June, Internet giant Google said a cyber-spying campaign originating in China had targeted the Gmail accounts of senior US officials, military personnel, journalists and Chinese political activists.

China angrily denies that it is orchestrating any online attacks on foreign government agencies and companies.

Japan is already probing a series of recent attacks on computer systems at defence contractor Mitsubishi Heavy, which reportedly could have resulted in the theft of information on military aircraft and nuclear power plants.

Computers at several of Japan's overseas diplomatic missions have also been targeted by hackers, Japanese media said last week.



.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
British aide accuses China, Russia over cyber attacks
London (AFP) Oct 31, 2011
A British government advisor accused China and Russia on Monday of being behind cyber attacks on other states, ahead of a major London conference designed to agree some global rules on cyberspace. Pauline Neville-Jones, Prime Minister David Cameron's special representative to business on cyber security, told BBC radio there was a real threat posed by people trying to obtain Britain's nationa ... read more


CYBER WARS
Vega getting ready for exploitation

MSU satellite orbits the Earth after early morning launch

NASA Launches Multi-Talented Earth-Observing Satellite

The Arianespace launcher family comes together in French Guiana

CYBER WARS
Moscow's Mars volunteers to 'land' after 520 days

Mars500 crew prepare to open the hatch

Opportunity Continues to Drive North

Opportunity Past 21 Miles of Driving! Will Spend Winter at Cape York

CYBER WARS
Lunar Probe to search for water on Moon

Subtly Shaded Map of Moon Reveals Titanium Treasure Troves

NASA's Moon Twins Going Their Own Way

Titanium treasure found on Moon

CYBER WARS
Starlight study shows Pluto's chilly twin

New Horizons App Now Available

Dwarf planet may not be bigger than Pluto

Series of bumps sent Uranus into its sideways spin

CYBER WARS
Three New Planets and a Mystery Object Discovered Outside Our Solar System

Dwarf planet sized up accurately as it blocks light of faint star

Herschel Finds Oceans of Water in Disk of Nearby Star

UH Astronomer Finds Planet in the Process of Forming

CYBER WARS
UK space surveillance system takes birthday snap of only satellite ever launched by a UK rocket

Virgin Galactic Selects First Commercial Astronaut Pilot From Competition

The Spark Of A New Era Was A Blast For Rocket Science

Caltech Event Marks 75th Anniversary of JPL Rocket Tests

CYBER WARS
Flying to rendezvous with Tiangong-1

For Chinese orbiter, the chase is on

Aerospace officials confident in space docking despite degree of difficulty

China's first manual space docking hopefully 2012

CYBER WARS
Asteroid Lutetia Revealed In Stunning Detail

The Lutetia asteroid - a prehistoric relic

NASA in Final Preparations for Nov 8 Asteroid Flyby

Rosetta reveals the science and mystery of Asteroid Lutetia


.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement