April 11, 2013 |
North Korea recently launched a cyber attack on South Korean TV stations and banks. Iran carried out a cyber campaign against U.S. banking sites. The U.S. and Israel released malware that disabled Iranian nuclear centrifuges. Or did they? There's no doubt someone did all these things, and there are reasons to believe that those suspected are responsible. But because of the way the Internet is designed and the poor general state of computer security, it is extremely difficult to pinpoint an attack's origin.
May 31, 2012 |
MOSCOW - Computer virus experts at Kaspersky Lab, acting with the blessing of the United Nations, were searching for a villain dubbed the Wiper when they came across a much more menacing suspect requiring a new moniker: Flame. The malicious program left experts all but certain that a government sponsor intent on cyber warfare and intelligence gathering was behind some suspicious activity, in part because of the likely cost of such a sophisticated endeavor. "We entered a dark room in search of something and came out with something else in our hands, something different, something huge and sinister," Vitaly Kamlyuk, a senior antivirus expert at Kaspersky Lab, said in an interview Wednesday.
HOME & GARDEN
March 31, 2012 |
Several months ago, at the height of my disillusionment with online dating, I created a "Black Swan" profile for a dating site (My "White Swan" profile was up and running on the same site). I didn't actually name the profiles White Swan and Black Swan, but that's how I thought of them, inspired by the deliciously over-the-top Natalie Portman movie that came out around the same time. The White Swan had been busy dating. In fact, she'd just been dumped by a guy who suddenly realized his Westside neighborhood was 20 miles away from her -- my -- Eastside domicile.
October 23, 2011 |
Earlier this month, researchers discovered a cunning strain of malware, dubbed the Lurid Downloader, that has been systematically and silently stealing data from carefully targeted government computers in 61 countries. The discovery was made by Trend Micro, a Tokyo-based computer security company, which identified the invader as a version of a well-known strain of malware that exploits vulnerabilities in the popular programs Adobe Reader and Microsoft Office. It inserts itself into a computer's core, and then phones home to a remote operator who moves continually from domain to domain on the Internet to avoid detection.
CALIFORNIA | LOCAL
July 20, 2011 |
Kyle Osborn could be called the Jack Bauer of the virtual age. He's defending American interests from a potentially devastating attack. He's doing so hunched over a laptop, armed with peanut butter and jelly and a jug of iced tea. He is a cyber warrior. "The bad guys always have a head start," he said. "The good guys always have to be reactive. " But he's trying to change that. He is a 20-year-old who said he dropped out of college after two years with a year's worth of credit, but he has made a name — and a living — for himself as a good guy for hire, working for a Santa Clara-based cyber defense company.
May 30, 2011
Egged on by French President Nicolas Sarkozy, the leaders of the Group of 8 nations announced Friday that the Internet was too important for governments to leave ungoverned. Cyberspace needs a legal framework that promotes human rights, the rule of law, privacy, security and the protection of intellectual property, they declared, and they pledged to work on one. Good luck with that. The declaration reflects the wrongheaded wish of many foreign leaders to tame the Net, particularly freewheeling Web-based businesses and online speech.