US cyber-combat Top Gun training details emerge

US cyber-combat Top Gun training details emerge


US cyber-combat Top Gun training details emerge

Posted:

InfoSec News: US cyber-combat Top Gun training details emerge: http://www.theregister.co.uk/2010/06/23/us_cyberwar_training/
By Lewis Page The Register 23rd June 2010
Details are emerging of the training programme that will produce the US military's new elite corps of cyberwarfare operatives.
According to a Department of Defense statement, the undergraduate cyber training course for career field 17DX "cyber operations officers" in the US Air Force was launched last week at Keesler airforce base in Mississippi. The course lasts six months.
"We didn't have the pipeline in place to train the new skills needed to operate in the cyberspace domain," says Lieutenant Colonel Scott Solomon of the 333rd Training Squadron. "It's the one domain for which we didn't have an initial skills course.
"For years, we've done fundamental training in telecommunications, radar, radio, long-haul infrastructure, microwave and air traffic control systems, but now most of these things are connected at the Internet protocol level via the Internet," he added. "Our new cyberspace operators are going to be trained to operate looking through the lens at that IP level."
[...]

Another domain adopts added DNS security

Posted:

InfoSec News: Another domain adopts added DNS security: http://gcn.com/articles/2010/06/23/org-dnssec-deployment-062310.aspx
By William Jackson GCN.com June 23, 2010
The Public Interest Registry, which operates the .org generic top-level domain, announced today that it has completed deployment of Domain Name [...]

Internet whizzes recruited to IDF intelligence unit

Posted:

InfoSec News: Internet whizzes recruited to IDF intelligence unit: http://www.ynetnews.com/articles/0,7340,L-3909528,00.html
By Yossi Yehoshua Ynetnews 06.23.10
In each round of recruitments, the IDF aims to single out the most talented future fighters for its elite commando units, cadets' course, field units, and intelligence units. [...]

VeriSign refutes security vulnerability claim

Posted:

InfoSec News: VeriSign refutes security vulnerability claim: http://www.tgdaily.com/security-features/50315-verisign-refutes-security-vulnerability-claim
By Aharon Etengoff TG Daily 22nd Jun 2010
VeriSign has denied claims of an alleged security vulnerability recently identified by Comodo.
According to Comodo CEO Melih Abdulhayoglu, the vulnerability could theoretically allow hackers to access VeriSign customer accounts - including a major financial institution - without proper authentication.
"The vulnerability involves a simple search for a specific keyword, which then leads to a VeriSign account public access page. So, access to these accounts are only a pass phrase away. Think about it: malicious hackers from Russia or China can simply brute force their way past the password. Remember, security is only as good as its weakest link," Abdulhayoglu told TG Daily.
"Unfortunately, VeriSign has not accepted our analysis of the vulnerability. They are not seeing the problem and have told us that (second tier) challenge phrases are surrounded by stringent security and are monitored. But this is certainly not an acceptable policy and that is is the crux of the problem."
[...]

Secrets of Doing Business With the Intelligence Community

Posted:

InfoSec News: Secrets of Doing Business With the Intelligence Community: http://www.afcea.org/signal/signalscape/index.php/2010/06/secret-of-doing-business-with-the-intelligence-community/
By Maryann Lawlor AFCEA Signal Scape 6/23/10
It's sometimes difficult to figure out what's the bigger secret - intelligence or the acquisition processes of the organizations that [...]

Bulgarian Hackers Tangled in Tax Evasion Scams

Posted:

InfoSec News: Bulgarian Hackers Tangled in Tax Evasion Scams: http://www.novinite.com/view_news.php?id=117423
Novinite.com June 23, 2010
Computer hackers in Bulgaria help retailers hide their revenues and deprive the State budget of millions in Value Added Tax (VAT), the Bulgarian daily Standard writes.
The police and the National Revenue Agency (NRA) are probing computer wizs, who were able to break the code of cash registers and manipulate their memory. For a monthly fee from merchants, the hackers can delete a number of transactions or reduce by 10% - 20% the value of each sale.
The scam is difficult to prove since when the revenue agents and the police make a surprise visit, they find the cash register functioning while a check would not show days and hours without registered sales..
The scam is common in big cities, the police say, because stores there have larger turnover. In order to deal with the crime, the revenue agents also use innovative methods such as making purchases from the same store in the course of several days and keeping their receipts. The probe is done a month later and the receipts are compared against the memory of the register. If the purchase had been deleted, NRA begins a full audit of the retailer.

0 comments:

Post a Comment