Tag Archives: defense

Mystery Hacker Steals Australian Defense Data

A mystery hacker who was given the alias of a TV soap opera character has stolen sensitive information about Australia’s multi-billion dollar warplane and navy projects. Intelligence officials say the break was significant, although the Australian government insists that only low-level data was taken. The identity of the cyber criminal is not known.

The virtual break-in saw cyber thieves take illustrations of a major Australian naval project. About 30GB of data was stolen. Details about new fighter planes, submarines and Australia’s largest warships were also compromised. The breach began in July last year, but the Australian Signals Directorate, a domestic spy agency, was not alerted until November. Intelligence officials say the hack, which targeted a private defence contractor in South Australia state, was – in their words – ‘extensive’ and ‘extreme.’

But the government is insisting there was no threat to national security.

Australia’s Defence Industry Minister, Christopher Pyne, says

Read more at: https://www.voanews.com/a/mystery-hacker-steals-australian-defense-data/4070280.html

Mystery Hacker Steals Australian Defense Data – VOA News

A mystery hacker who was given the alias of a TV soap opera character has stolen sensitive information about Australia’s multi-billion dollar warplane and navy projects. Intelligence officials say the break was significant, although the Australian government insists that only low-level data was taken. The identity of the cyber criminal is not known.

The virtual break-in saw cyber thieves take illustrations of a major Australian naval project. About 30GB of data was stolen. Details about new fighter planes, submarines and Australia’s largest warships were also compromised. The breach began in July last year, but the Australian Signals Directorate, a domestic spy agency, was not alerted until November. Intelligence officials say the hack, which targeted a private defence contractor in South Australia state, was – in their words – ‘extensive’ and ‘extreme.’

But the government is insisting there was no threat to national security.

Australia’s Defence Industry Minister, Christopher Pyne, says

Read more at: https://www.voanews.com/a/mystery-hacker-steals-australian-defense-data/4070280.html

Australian Government Discloses Breach of Defense Supplier’s Computer

 

According to the Australian government, hackers infiltrated certain defense contractor’s PC in 2016. Before launching the yearly threat report of the Australian Cyber Security Center scheduled for October 10, Dan Tehan Assistant Minister for Cyber Security couldn’t confirm the individual’s name behind the hack.

 

Managing to reach the Information Technology network, the intruders remained there for long as they stole vast volumes of data belonging to the defense supplier. When in November 2016, the Australian Cyber Security Center of the federal government became aware of the incident it assisted in halting the attack.

 

Tehan explained that the hacker could be a state-sponsored online thief or a normal cyber-criminal, either way the individual’s behavior prompted serious action. The minister said nothing could be fully confirmed, a usual hazard in this field of cyber-crime. He couldn’t also state the length of time the intruders stayed on the computer. However, according to him, the IT

Read more at: http://www.spamfighter.com/News-21173-Australian-Government-Discloses-Breach-of-Defense-Suppliers-Computer.htm

Trump-Russia Hysteria Holding Back Sensible Cyber Defense

The surface web consists of the stuff you see every day through your browser on your Internet connection, yet it only represents about 1 percent of what’s going on in the true world-wide web. Beyond the surface web lies the deep web. The deep web consists of content that cannot be found or accessed via your common surface web search engines and is intended to keep search crawlers out.

This where most of the cyber-criminals hang out in forums, obtain exploit kits and tools for hacking and trade credit card data, fake IDs, weapons, drugs and other banned substances on a variety of black markets in exchange for some form of BitCoin.

To give you a sense of scale, it is estimated that for every billion pages indexed on the surface web, there are 900 billion on the deep web.

But if you go below the deep web, you will find an even

Read more at: http://www.lifezette.com/polizette/mark-warners-strategy-of-hope-and-denial/

Building a Digital Defense Against Cyber Bullies

Downloadable file: TT – Cyber Bullies – RUSSIAN Written
Downloadable file: TT – Cyber Bullies – RUSSIAN Audio
Downloadable file: TT – Cyber Bullies – SPANISH Written
Downloadable file: TT – Cyber Bullies – SPANISH Audio
Downloadable file: TT – Cyber Bullies – ENGLISH Audio

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: building a digital defense to protect your kids from cyber bullying.

Last week we talked about cell phone safety with some important tips on keeping your kids’ devices locked down and privacy settings high.

But no matter how much care you take, that phone can serve as an open door to cyber bullies.

Here are some basic phone tips to keep your child safe:

* Talk early and often to your students about the dangers that they may find on the other end of the line. If your child is old

Read more at: https://www.fbi.gov/contact-us/field-offices/portland/news/press-releases/building-a-digital-defense-against-cyber-bullies

FBI Tech Tuesday: Building a Digital Defense Against Sextortion Scams

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: building a digital defense against sextortion scams.

Last week, we talked about romance scams—how a fraudster convinces you that your long-distance relationship is real. He then manipulates you into sending money.

Sextortion cases involve something much darker. In addition to asking for money, an extortionist will likely demand that you provide sexual favors or that you send him explicit photos or videos of yourself.

So how does it all start? The fraudster may be an old boyfriend, or, more likely, a distant acquaintance or stranger. He possesses something very private—photos or information that would embarrass you if he releases them. If you don’t comply with his demands, he says, then your family, friends, and classmates will know your deepest secrets.

How did he get the information to blackmail you? In some cases, he recorded or obtained recordings of sexually explicit content that the victim

Read more at: https://www.fbi.gov/contact-us/field-offices/portland/news/press-releases/fbi-tech-tuesday-building-a-digital-defense-against-sextortion-scams

The Best Defense: Cyber security for small businesses and entrepreneurs

The U.S. Democratic Party. Disney. Netflix. Britain’s National Health Service.
These are just a few of the companies to make headlines recently for having been the victims of major cyber security attacks. Their stories received international attention in part due to the surprise that companies of their magnitude, despite all their infrastructure, were still vulnerable to hackers, and serve as a good reminder that cyber security is a constant battle for any business anywhere.

Cyber crime is a growing and ever-changing problem worldwide. From email phishing and spam to online fraud and theft, and ransomware to major data breaches, the cyber threats to individuals and businesses seem to increase by the day. In fact, IBM Corp Chairman, CEO and President Ginni Rometty has called cyber crime the greatest threat to every company in the world, and previous FBI Director James Comey called the internet “the most dangerous parking lot imaginable.”

Juniper research

Read more at: http://www.utahbusiness.com/best-defense-cyber-security-small-businesses-entrepreneurs/

The Best Defense: Cyber security for small businesses and …

The U.S. Democratic Party. Disney. Netflix. Britain’s National Health Service.
These are just a few of the companies to make headlines recently for having been the victims of major cyber security attacks. Their stories received international attention in part due to the surprise that companies of their magnitude, despite all their infrastructure, were still vulnerable to hackers, and serve as a good reminder that cyber security is a constant battle for any business anywhere.

Cyber crime is a growing and ever-changing problem worldwide. From email phishing and spam to online fraud and theft, and ransomware to major data breaches, the cyber threats to individuals and businesses seem to increase by the day. In fact, IBM Corp Chairman, CEO and President Ginni Rometty has called cyber crime the greatest threat to every company in the world, and previous FBI Director James Comey called the internet “the most dangerous parking lot imaginable.”

Juniper research

Read more at: http://www.utahbusiness.com/best-defense-cyber-security-small-businesses-entrepreneurs/

House panel begins marking up its $696 billion defense bill

NDAA MARATHON MARKUP: Grab your energy drinks. Rep. Mac Thornberry and his House Armed Services Committee begin a marathon markup of the 2018 National Defense Authorization Act this morning. The mammoth bill already includes nearly $631 billion in base defense spending and $65 billion for overseas operations, about $29 billion more than Trump’s proposal to buy additional aircraft, ships and troops. But committee debate over the legislation will happen today as members vote on scores of amendments during an annual markup session that lasts into the wee hours of the morning.

At the same time, Sen. John McCain and the Senate Armed Services Committee also appeared likely to complete their version of the NDAA bill today after a whirlwind series of closed hearings that began Monday. That could put Congress’ two visions of defense policy for the coming fiscal year on the table before the July 4 break. McCain,

Read more at: http://www.washingtonexaminer.com/house-panel-begins-marking-up-its-696-billion-defense-bill/article/2176691