In the latest INSECURE magazine, there is a cool story (on page 51) about wireless password and how to break into a network with poor protection. He just tramples the poor network and servers with of-the-shelf tool from backtrack 🙂
I might add that there are a lot of very cool reads in the earlier issues also.
In hindsight, there was something very predictable about the Syrians cutting the internet. I suppose that one of the fundamental rules in most conflicts is to cut the enemy communications. It happened in Libya, Egypt and perhaps other places during their revolutions.
It should also remind everybody that the worldwide internet is actually a lot of connected networks that governments can shut down if they see fit. In the US, they have been discussing it a lot, and it appears that Obama got himself a nice red kill switch.
A cyber shooting range is something DARPA has been working on – it is big and expensive. I stumbled on “cybercity“, which basically is a model city where you can crack the systems and derail trains and induce power failures.
And it was all built for less than $1 million.
Perhaps we should get one for our students 🙂
hey – I’m reblogging!
Wired magazine have had some nice articles about password and the lack of security they provide. One of their journalist had a bad day …
The initial article and a follow-up. Fairly long articles , but definitely good reads. One of the conclusions are that you should enable two factor authentication on your gmail account.
I just stumbled upon a document from ENISA about “proactive detection of security incidents”. It had to be relevant 🙂
It is a document about honeypots, what they do, how they work, and – very interesting – a list of software. It is 183 pages, so I have not read it in detail (yet).
You can find it here. Definitely recommended reading.
Apparently, the US are having issues with certain Chinese manufacturers of smart phones (link)
Chinese telecom company Huawei poses a security threat to the United States and should be barred from US contracts and acquisitions, a yearlong congressional investigation has concluded.
If this is a technical trade hindrance trick, I find it extreme. On the other hand, if it is true, well… that would be bad new in general since it is easily extrapolated to most networked devices.
I just found this post about how to get a job working with IT security. It might be relevant for student who are to go job hunting in the near future.
Besides he is referring to writing blogs as we are too, so I conclude that he is a smart guy 🙂
I just goes to show that you must make an effort yourself and do private copies or, at least, do backups in multiple locations. Poor guy.