Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here |
- Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here
- Comcast.net hacker who redirected Web traffic pleads guilty
- FBI outlines three components of cyber-risk
- Baidu: Registrar 'incredibly' changed our e-mail for hacker
Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here Posted: InfoSec News: Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here: http://www.wired.com/threatlevel/2010/02/microsoft-cryptome/ By Ryan Singel Threat Level Wired.com February 24, 2010 Microsoft has managed to do what a roomful of secretive, three-letter government agencies have wanted to do for years: get the whistleblowing, [...] |
Comcast.net hacker who redirected Web traffic pleads guilty Posted: InfoSec News: Comcast.net hacker who redirected Web traffic pleads guilty: http://philadelphia.bizjournals.com/philadelphia/stories/2010/02/22/daily29.html? By Peter Key Staff Writer Philadelphia Business Journal February 24, 2010 One of the three men charged with hacking into the Web site for Comcast’s Internet customers last year has pleaded guilty, the U.S. [...] |
FBI outlines three components of cyber-risk Posted: InfoSec News: FBI outlines three components of cyber-risk: http://fcw.com/articles/2010/02/24/web-afcea-cyber-panel.aspx By Ben Bain FCW.com Feb 24, 2010 To make better cybersecurity-related decisions a senior FBI official recommends considering a simple algebraic equation—risk = threat x vulnerability x consequence—rather than solely focusing on threat vectors and actors. Each factor is important, Steven Chabinsky, deputy assistant director at the FBI’s Cyber Division, said today. Chabinsky spoke on a panel at the Armed Forces Communications and Electronics Association Homeland Security Conference in Washington. Nation-states that commit espionage, terrorist organizations, individuals interested in using the Internet as an attack tool and criminal syndicates are the types of attackers mostly likely to target computer systems in both the public and private sectors, he said. Threat vectors on which the FBI is focused include remote access and intrusion, supply chain vulnerabilities, proximate or close access threats, and insider access threats, he said. Chabinsky said the risk model is compelling is because risk drops down to zero if any of those three elements or variables is zero. He said the risk model is the first place he goes when he needs to step back strategically. [...] |
Baidu: Registrar 'incredibly' changed our e-mail for hacker Posted: InfoSec News: Baidu: Registrar 'incredibly' changed our e-mail for hacker: http://www.computerworld.com/s/article/9162118/Baidu_Registrar_incredibly_changed_our_e_mail_for_hacker?taxonomyId=17 By Owen Fletcher and Robert McMillan IDG News Service February 24, 2010 A hacker who took down top Chinese search engine Baidu.com last month broke into its account with a U.S. [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment