Tag Archive for: Exposed

North Korean tactics in cyberwarfare exposed – CNET


NBCNews.com

North Korean tactics in cyberwarfare exposed
CNET
htdcybersec620x350610x344.jpg North Korea's Reconnaissance General Bureau is known for sending agents abroad for training in cyberwarfare. CNET. North Korea's cyberwarfare capabilities are on the rise despite being entrenched in aging infrastructure …
North Korea cyber warfare capabilities exposedZDNet
HP Warns of Growing North Korean Cyber MenaceInfosecurity Magazine
North Korea using foreign bases to launch cyberattacks, says HPPC World India

all 1,049 news articles »

cyber warfare – read more

North Korea cyber warfare capabilities exposed – ZDNet

North Korea cyber warfare capabilities exposed
ZDNet
Screen Shot 2014-09-02 at 09.29.11 Credit: HP. North Korea's cyber warfare capabilities are on the rise despite being entrenched in ageing infrastructure and dampened by a lack of foreign technology. According to a report released by Hewlett-Packard …

cyber warfare – read more

Schneier: Cyber-retaliation like that exposed by Snowden report a bad idea

The NSA program dubbed MonsterMind is dangerous in that it would enable automated retaliation against machines that launch cyber attacks with no human intervention, meaning that such counterattacks could hit innocent parties.

MonsterMind came to light through a Wired magazine interview with former NSA sysadmin Edward Snowden, who stole and publicly released thousands of NSA documents.

+[Also on Network World: Snowden reveals automated NSA cyberwarfare program; 10 disturbing attacks at Black Hat USA 2014]+

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Thousands of Mozilla developers’ e-mail addresses, password hashes exposed

E-mail addresses and cryptographically protected passwords for thousands of Mozilla developers were exposed through a database glitch that may have been exploited by hackers, Mozilla officials warned Friday.

About 76,000 e-mail addresses and 4,000 password hashes were left on a publicly accessible server for about 30 days beginning June 23, according to a blog post. There is no indication the data was accessed, but Mozilla officials investigating the disclosure can’t rule out the possibility. Hackers who might have managed to crack the hashes wouldn’t be able to use the passwords to access Mozilla Developer Network accounts, but they may be able to access other user accounts secured with the same cracked passcode. The glitch was touched off when a data “sanitization” process failed, causing the addresses and hashes to be dumped to a publicly accessible server.

“We are known for our commitment to privacy and security, and we are deeply sorry for any inconvenience or concern this incident may cause you,” Stormy Peters, director of developer relations, and Joe Stevensen, operations security manager, wrote. They continued:

Read on Ars Technica | Comments


Ars Technica » Technology Lab