28 October 2014

Post 20, CIS 608
Cyber Attack in White House:






















Suspicious activity was detected on the white house computer network recently. Officials didn't disclosed who was responsible for this attack. This attack was in unclassified network systems, but it makes me wonder if the place like white house is insecure and attackers can get into the systems, I don’t think that other private or government agencies computer systems are secure. During the investigation some of the unclassified systems were issued a temporary outage. If you are interested reading this news, here is the link.


Source: http://news.yahoo.com/suspicious-cyber-activity-white-house-detected-addressed-223554426.html

24 October 2014

Post 19, CIS 608
Adobe Updates Digital edition:







Adobe systems released a new version of the e-book reader application after being accused for spying users information. They got blamed for Adobe collecting information from digital editions users about what they read, who stores libraries in their private library etc. Even though Adobe promised to address this issue and released newer version of Adobe reader. Also, they undated their Adobe privacy Policy about collection and use of data and hopefully it will help to clear some questions of the Adobe users.

21 October 2014

Post 18, CIS 608
Man in the middle attack:













Apple’s iCloud service suffers cyber-attack in China. Some well-trained attackers tried to steel user names, passwords and private information using the man in the middle type of attack. It is well known type of attack where attackers tries to capture the information in between the web and traffic. Some blame that this attack was from Chinese government sponsored attack, but as always Chinese authorities denies the blame. Here is the link of this news in detail. 

Source: http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/21/apples-icloud-service-suffers-cyber-attack-in-china-putting-passwords-in-peril/

19 October 2014

Post 17, CIS 608

Chip and pin technology:






















U.S. present signs an executive order to implement enhanced security measures for credit card transactions. Instead of using credit card number retail companies will be using chip and pin technology. This will help to stop criminals who use stolen credit card numbers. US government was criticized for not being able to adopt this Technology where many European countries already using this method to secure transactions. Here is the link if you are interested reading this news in detail.


Source: http://www.scmagazine.com/executive-order-improves-security-by-promoting-chip-and-pin-technology/article/377994/

14 October 2014

Post 16, CIS 608

Common language for Cyber-Security:





















This article talks about why we should implement common language for Cyber-Security. Government agencies continue to implement new technology, methodology and tools to fight against new major cyber threats. But at the same time, they kind of forget leave the minor cyber threats where the attackers take advantage of and do bigger attacks. Government agencies, public and private companies also use various type of tools to secure information. This creates a problem when we are trying to fight similar types of threats using different tools. Instead of doing this way we should be on the same page using same tools to fight the threats. So basically creating a same language for all organizations and agencies. Virginia state government took the similar approach that strength the cyber security and it gave decision maker a right approach where to focus the most. This article recommends that all state government and federal should implement the same method to stop cyber-attacks. Here is the link of this interesting article.


Source: http://www.govtech.com/security/Can-We-Talk-Creating-a-Common-Language-for-Cybersecurity.html

12 October 2014

Post 15, CIS 608

Possible Cyber Attack















This is some scary news. Hackers aim to pull off cyber-heist worth of $1 billion, CNBC reports. Europe’s top cyber officials reported that hackers are targeting big financial groups or backs. Recent report suggested that Russia-based tech-gangs were planning to do a cyber-attack and steal about $1 billion. Now these cyber attackers mission is to leave the smaller attacks and start doing bigger attacks. If you are interested, here is the link. Thanks.





08 October 2014

Post 14, CIS 608

Young Israeli Cyberwarriors





















I think this is a great idea to build a young cyber warriors. Israeli military recently started a new program to build a next generation cyber warriors while they are still in high school. Instead of hacking, they can utilize these young brain to defend cyber-attacks. Israel is a big cyber victim. Recently, a new attack came from Syria and its mission was to disrupt the electricity and military systems. They were lucky this time that nothing happened and they were able to find out where this attack came from. I hope Israel becomes a good leader of cyber defender and succeeds to defend all type of attacks. Good luck to them. 

Source: http://www.washingtonpost.com/world/young-israeli-cyberwarriors-learn-to-duel-in-the-dark/2014/10/07/e07a9031-1e01-4815-8938-5fab87495e82_story.html

01 October 2014

Post 13, CIS 608
Cyber attackers finally caught:















Finally I got some good news to share. Four hackers arrested for cracking US Army Network. They were able to break the US Army networks and developers of blockbuster video games to steal the software information. This is what you get not keeping your information secure. Now, lesson learnt and hopefully US Army will use extra layer of firewall to make sure this incident will not happen again. Those hackers were able to steal $100 million worth of information, according to the US Justice Department.
Wow, not only they broke the US Army game systems, but also Army’s Apache helicopter pilot training, Xbox One consoles and new games call of duty, modern warfare 3. Assistant attorney general Caldwell said, “Members of this international hacking ring stole trade secret data use in high-tech American products, ranging from software that trains US soldiers to fly Apache helicopter to Xbox games that entertain millions around the world”.
These hackers were from USA, Canada and Australia age range from 18-25. Very intelligent boys, but they used their talent to do cyber-crime. Also, officials seized over $620,000 in cash from these attackers. I hope our young generation uses their brain to do the good things not a crime. This news will help to discourage to people who do cybercrime. Good part of this news – finally criminals were caught.  

Source: http://www.securityweek.com/hackers-arrested-cracking-us-army-network

Week 12

Week 12 - Final Week  Wow, finally I am in my final weeks of grad school. I remember when I had to write a letter explaining why I had a...