Cyber Security

DanPickUp

Well-Known Member
It's the new form of voyeurism, the government avatar :D
Well, I guess we finally have to take it like that: https://www.youtube.com/watch?v=VPkh8lxnxmQ , do protect our data and OS when and how ever possible and also accept that not all what is done from those people is wrong.

In fact, WW2 would have been impossible to win with out that secret companies. Even cold war was won because of the knowledge they brought in. Only problem: In todays world the mix of spying on individuals mixed with economic interest and political interest has now gone much to far. In many places the laws are broken regularly and that should not be.

DanPickUp
 

Einstein

Well-Known Member
Very correct, its has gone too far. till a point when it can be dangerous for them self. by the way to be specific USA won D-Day battle because their intelligence was able to break the enigma code, which nazis were using then to communicate between their generals.

usa were spying on japan at the time when they were their friends before pearl harbor as japs were also using enigma machine at ww2 to communicate with their axis friends, This is the main reason how easily USA has defeated them in post pearl harbor pacific battles.

history has taught them not to trust anyone, that is why CIA, NSA, have world's best mathematicians and programmers to help them in code breaking. good thing is not google and yahoo are working to make a new encryption which will take NSA atleast 20 years to crack to read our emails.
 

DanPickUp

Well-Known Member
Very correct, its has gone too far. till a point when it can be dangerous for them self. by the way to be specific USA won D-Day battle because their intelligence was able to break the enigma code, which nazis were using then to communicate between their generals.

usa were spying on japan at the time when they were their friends before pearl harbor as japs were also using enigma machine at ww2 to communicate with their axis friends, This is the main reason how easily USA has defeated them in post pearl harbor pacific battles.

history has taught them not to trust anyone, that is why CIA, NSA, have world's best mathematicians and programmers to help them in code breaking. good thing is not google and yahoo are working to make a new encryption which will take NSA atleast 20 years to crack to read our emails.
Hi

Here a little add to that subject: World War II From Space. Gives a new inside look at WW II, the deep connection between USA and Britain, how Russia was supported and acted and beside all that and more some little information about the intelligence services and how they where involved in it. It is a bit an out of the box topic compare to the thread title and surely worth the time to spend watching it after market hours.

https://www.youtube.com/watch?v=VolG7V3-4hw
 
Last edited:

DanPickUp

Well-Known Member
Some thing for the weekend. And remember: When ever it is spoken "We", ask your self who is "We". In many cases I felt that I am not "We", specially when that word is used from the officials which just want and wish that every thing is mentally pushed under the table, so they can move on with there illegal things they hidden do on all of us because of: You know, the .................... :lol::rofl: Yes, all humans on earth are ....................:annoyed::mad:

http://www.theguardian.com/world/in...es-surveillance-revelations-decoded#section/1
 

DanPickUp

Well-Known Member
A Strategy for Surveillance Powers

This five-page document, written in 2012, is essentially a National Security Agency mission statement with broad goals, including a desire to push for changes in the law to provide the agency with expanded surveillance powers. It was written before Edward J. Snowden’s leaks, so it provides a glimpse at the thinking of agency officials before Mr. Snowden upset their political calculus.

Interesting to read that they see the law as a problem to do what they do and even feel that the law should be changed to there will. It also gives a deeper inside look about them and how they really think. Very alarming. Here the document to that:

http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html?_r=0

And here an other interesting one: NSA infected 50,000 computer networks with malicious software

The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

http://www.nrc.nl/wp-content/uploads/2013/11/nsa1024.jpg

Have a nice Sunday / DanPickUp
 

Einstein

Well-Known Member
More Infection of CryptoLocker in news..

US Police Department Pays $750 Bitcoin Ransom to Cybercriminals

http://www.ibtimes.co.uk/articles/5...are-police-department-pays-bitcoin-ransom.htm

To be specific there is no prevention for this ransomeware yet, as it is not yet known how this program is spreading, as this have very unusual pattern as per some IT experts.

Still users can download CryptoPrevent, which is not 100% but still prevents such attacks.. Link: http://www.foolishit.com/vb6-projects/cryptoprevent/
Or Anti-CryptoLocker (recommended) http://download.bitdefender.com/removal_tools/BDAntiCryptoLocker_Release.exe
 
Last edited:

DanPickUp

Well-Known Member
Hi

Christmas time is coming and all want to make money, even Cybercriminals. The newest Trojan is called: Neverquest ( „Trojan-Banker.Win32/64Neverquest“). As many use online banking to buy Christmas presents, those Trojan is created to possible bring the Cybercriminals access to your bank account to steal money from it and even speculate with it. So be very sure that your antivirus software, your browser and your OS is up today when using any on line banking in the future. If you use online banking then you should read on the understand how the Trojan works:

A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, according to malware researchers from Kaspersky Lab who dubbed it Trojan-Banker.Win32/64.Neverquest.

"By mid-November Kaspersky Lab had recorded several thousand attempted Neverquest infections all around the world," said Sergey Golovanov, malware researcher at Kaspersky Lab, Tuesday in a blog post. "This threat is relatively new, and cybercriminals still aren't using it to its full capacity. In light of Neverquest's self-replication capabilities, the number of users attacked could increase considerably over a short period of time."


Here two links with detailed information about the Trojan and how he works:

http://www.computerworld.com/s/arti...n_threatens_online_banking_users?pageNumber=1

http://www.pcworld.com/article/2067...-to-online-banking-users-researchers-say.html

Take care / DanPickUp
 

Einstein

Well-Known Member
"The Trojan known as Neverquest is said by its creators to be capable of breaking into "any bank in any country".- I seriously doubt that. its not a child game to do this, you need NSA in your group to do that, lol. Its just a keylogger which also uses VNC monitoring software, which is a very simple program but can ruin a person's life.....

"The virus works by creating "cuckoo" pages in Internet Explorer and Firefox that record all data entered from 28 websites targeted by the criminals. One target is an investment fund that allows not only the transfer of money but actually playing the stock market using the stolen credentials."

the worst part is that you can PURCHASE code of such programs from underground russian cyber criminals for few thousand dollars..
 

Einstein

Well-Known Member
The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought

http://www.businessinsider.in/The-S...n-Previously-Thought/articleshow/26113763.cms

  • Stuxnet, a joint U.S.-Israel project, is known for reportedly destroying roughly a fifth of Iran's nuclear centrifuges by causing them to spin out of control.
  • Langer adds that the worm also subtly increased the pressure on spinning centrifuges while showing the control room that everything appeared normal by replaying the plant's protection system values while the attack occurred.

He notes that the coding was "so far-out, it leads one to wonder whether its creators might have been on drugs."

This is the most sophisticated worm i have ever saw in my life, This is just an example what organized computer hacking can result into..!!
 

Similar threads