Monte Carlo Posted March 19, 2013 Share Posted March 19, 2013 Loving this but is it real? http://www.sicherheitstacho.eu/ 1 Link to comment Share on other sites More sharing options...
PK htiw klaw eriF Posted March 19, 2013 Share Posted March 19, 2013 Loving this but is it real?Russians spending their days attacking people electronically? Very likely. 1 "Akiva Goldsman and Alex Kurtzman run the 21st century version of MK ULTRA." - majestic "you're a damned filthy lying robot and you deserve to die and burn in hell." - Bartimaeus "Without individual thinking you can't notice the plot holes." - InsaneCommander "Just feed off the suffering of gamers." - Malcador "You are calling my taste crap." -Hurlshort "thankfully it seems like the creators like Hungary less this time around." - Sarex "Don't forget the wakame, dumbass" -Keyrock "Are you trolling or just being inadvertently nonsensical?' -Pidesco "we have already been forced to admit you are at least human" - uuuhhii "I refuse to buy from non-woke businesses" - HoonDing "feral camels are now considered a pest" - Gorth "Melkathi is known to be an overly critical grumpy person" - Melkathi "Oddly enough Sanderson was a lot more direct despite being a Mormon" - Zoraptor "I found it greatly disturbing to scroll through my cartoon's halfing selection of genitalias." - Wormerine "I love cheese despite the pain and carnage." - ShadySands Link to comment Share on other sites More sharing options...
Gorgon Posted March 20, 2013 Share Posted March 20, 2013 Could be legislation and logistics, that it's easier to set up in Russia if you want to run a hacking campaign. Russian hackers are cheap and talented and very much for hire. Na na na na na na ... greg358 from Darksouls 3 PVP is a CHEATER. That is all. Link to comment Share on other sites More sharing options...
Gorth Posted March 20, 2013 Share Posted March 20, 2013 It's those you don't notice that worries me. 2 “He who joyfully marches to music in rank and file has already earned my contempt. He has been given a large brain by mistake, since for him the spinal cord would surely suffice.” - Albert Einstein Link to comment Share on other sites More sharing options...
Raithe Posted March 20, 2013 Share Posted March 20, 2013 Well the past few years has a lot of the international police pretty much saying that a ridiculously large percentage of all organised cyber-crime is in some way backed by the assorted Bratva and Vory groups from Eastern Europe / Russia way. It's kind of quirky how it breaks down. Cyber-Espionage tends to be China, Cyber-Crime (ala Botnet's, ID theft, credit card fraud etc) tends to the Bratva and Vory if we're talking the big, organised crime. "Cuius testiculos habeas, habeas cardia et cerebellum." Link to comment Share on other sites More sharing options...
Meshugger Posted March 21, 2013 Share Posted March 21, 2013 "Some men see things as they are and say why?""I dream things that never were and say why not?"- George Bernard Shaw"Hope in reality is the worst of all evils because it prolongs the torments of man."- Friedrich Nietzsche "The amount of energy necessary to refute bull**** is an order of magnitude bigger than to produce it." - Some guy Link to comment Share on other sites More sharing options...
Raithe Posted March 21, 2013 Share Posted March 21, 2013 In another semi-tangent.. Reuters - US Cyberplans call for more routine scanning of private web traffic The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of thecountry's private, civilian-run infrastructure. As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Websurfing scanned as a precaution against cyber attacks. Under last month's White House executive order on cybersecurity, the scans will be driven by classified information provided by U.S. intelligence agencies - including data from the National Security Agency (NSA) - on new or especially serious espionage threats and other hacking attempts. U.S. spy chiefs said on March 12 that cyber attacks havesupplanted terrorism as the top threat to the country. The Department of Homeland Security will gather the secret data and pass it to a small group of telecommunication companies and cybersecurity providers that have employees holding security clearances, government and industry officials said. Those companies will then offer to process email and other Internet transmissions for criticalinfrastructure customers that choose to participate in the program. By using DHS as the middleman, the Obama administration hopes to bring the formidable overseas intelligence-gathering of the NSA closer to ordinary U.S. residents without triggering an outcry from privacy advocates who have long been leery of the spy agency's eavesdropping. The telecom companies will not report back to the government on what they see, except in aggregate statistics, a senior DHS official said in an interview granted on condition he not beidentified. "That allows us to provide more sensitive information," the official said. "We will provide the information to the security service providers that they need to perform this function." Procedures are to be established within six months of the order. The administration is separately seeking legislation that would give incentives to private companies, including communications carriers, to disclose more to the government. NSA Director General Keith Alexander said last week that NSA did not want personal data but Internet service providers could inform the government about malicious software they find and the Internet Protocol addresses they were sent to and from. "There is a way to do this that ensures civil liberties and privacy and does ensure the protection of the country," Alexander told a congressional hearing. SENSITIVE INFORMATION SHARING In the past, Internet traffic-scanning efforts were mainly limited to government networks and Defense Department contractors, which have long been targets of foreign espionage. But as fears grow of a destructive cyber attack on core, non-military assets, and more sweeping security legislation remained stalled, the Obama administration opted to widen the program. Last month's presidential order calls for commercial providers of "enhanced cybersecurity services" to extend their offerings to critical infrastructure companies. What constitutes criticalinfrastructure is still being refined, but it would include utilities, banks and transportation such as trains and highways. Under the program, critical infrastructure companies will pay the providers, which will use the classified information to block attacks before they reach the customers. The classifiedinformation involves suspect web addresses, strings of characters, email sender names and the like. Not all the cybersecurity providers will be telecom companies, though AT&T Inc is one. Raytheon Co said this month it had agreed with DHS to become a provider, and a spokesman said that customers could route their traffic to Raytheon after receiving it from their communications company. As the new set-up takes shape, DHS officials and industry executives said some security equipment makers were working on hardware that could take classified rules about blocking traffic and act on them without the operator being able to reverse-engineer the codes. That way, people wouldn't need a security clearance to use the equipment. DEEP PACKET INSPECTION? The issue of scanning everything headed to a utility or a bank still has civil liberties implications, even if each company is a voluntary participant. Lee Tien, a senior staff attorney with the nonprofit Electronic Frontier Foundation, said that the executive order did not weaken existing privacy laws, but any time a machine acting on classified information is processing private communications, it raises questions about the possibility of secret extra functions that are unlikely to be answered definitively. "You have to wonder what else that box does," Tien said. One technique for examining email and other electronic packets en route, called deep packet inspection, has stirred controversy for years, and some cybersecurity providers said they would not be using that. In deep packet inspection, communication companies or others with network access can examine all the elements of a transmission, including thecontent of emails. "The signatures provided by DHS do not require deep packet inspection," said Steve Hawkins, vice president at Raytheon's Intelligence and Information Systems division, referring further questions to DHS. The DHS official said the government is still in conversations with the telecom operators on the issue. The official said the government had no plans to roll out any such form of government-guided close examination of Internet traffic into the communications companies serving the general public "Cuius testiculos habeas, habeas cardia et cerebellum." Link to comment Share on other sites More sharing options...
JFSOCC Posted March 21, 2013 Share Posted March 21, 2013 So we give up more and more of our privacy in the name of security. I won't stand for it. Remember: Argue the point, not the person. Remain polite and constructive. Friendly forums have friendly debate. There's no shame in being wrong. If you don't have something to add, don't post for the sake of it. And don't be afraid to post thoughts you are uncertain about, that's what discussion is for.---Pet threads, everyone has them. I love imagining Gods, Monsters, Factions and Weapons. Link to comment Share on other sites More sharing options...
Meshugger Posted March 24, 2013 Share Posted March 24, 2013 (edited) I do not think that by sitting will make it any better either. Edited March 24, 2013 by Meshugger 1 "Some men see things as they are and say why?""I dream things that never were and say why not?"- George Bernard Shaw"Hope in reality is the worst of all evils because it prolongs the torments of man."- Friedrich Nietzsche "The amount of energy necessary to refute bull**** is an order of magnitude bigger than to produce it." - Some guy Link to comment Share on other sites More sharing options...
babaganoosh13 Posted March 26, 2013 Share Posted March 26, 2013 Places like Google, Yahoo, PayPal, banks ect. should have this simple security feature: If someone is trying to access an account from a different hemisphere, don't let them on unless they arranged it ahead of time. Perhaps with a check box in security features. I'm just sayin'. You see, ever since the whole Doritos Locos Tacos thing, Taco Bell thinks they can do whatever they want. Link to comment Share on other sites More sharing options...
NOK222 Posted March 26, 2013 Share Posted March 26, 2013 Could be real, could be not, I see this as mass hysteria in order to infringe on our rights. Ka-ka-ka-ka-Cocaine! Link to comment Share on other sites More sharing options...
Walsingham Posted March 28, 2013 Share Posted March 28, 2013 At 2 and a half million attacks from Russia alone (according to that link) I'd say it's a serious issue. I believe that "ze barbarians" are one of many reasons why we're witnessing the death throes of the net as we've got used to it. Free traffic brings free exploitation. Fundamentally, and because these is a free-wheeling forum, I'll ask a test question: What does UK PLC gain by exposing our 'net to Russia? Besides Oby, of course. 1 "It wasn't lies. It was just... bull****"." -Elwood Blues tarna's dead; processing... complete. Disappointed by Universe. RIP Hades/Sand/etc. Here's hoping your next alt has a harp. Link to comment Share on other sites More sharing options...
Gorth Posted March 29, 2013 Share Posted March 29, 2013 At 2 and a half million attacks from Russia alone (according to that link) I'd say it's a serious issue. I believe that "ze barbarians" are one of many reasons why we're witnessing the death throes of the net as we've got used to it. Free traffic brings free exploitation. Fundamentally, and because these is a free-wheeling forum, I'll ask a test question: What does UK PLC gain by exposing our 'net to Russia? Besides Oby, of course. Free porn, cheap viagra and second hand AK-47's? “He who joyfully marches to music in rank and file has already earned my contempt. He has been given a large brain by mistake, since for him the spinal cord would surely suffice.” - Albert Einstein Link to comment Share on other sites More sharing options...
obyknven Posted March 29, 2013 Share Posted March 29, 2013 Russian hacker the best. http://www.bbc.co.uk/news/technology-21954636 Global internet slows after 'biggest attack in history' Link to comment Share on other sites More sharing options...
LadyCrimson Posted March 29, 2013 Share Posted March 29, 2013 Haven't noticed any slowdowns anywhere myself. I must not surf that part of the internet. “Things are as they are. Looking out into the universe at night, we make no comparisons between right and wrong stars, nor between well and badly arranged constellations.” – Alan Watts Link to comment Share on other sites More sharing options...
Gfted1 Posted March 29, 2013 Share Posted March 29, 2013 Me either. Would have never known anything happened if I didnt read about it. "I'm your biggest fan, Ill follow you until you love me, Papa" Link to comment Share on other sites More sharing options...
Walsingham Posted March 30, 2013 Share Posted March 30, 2013 Russian hacker the best. http://www.bbc.co.uk/news/technology-21954636 Global internet slows after 'biggest attack in history' Russian cholera also best. "It wasn't lies. It was just... bull****"." -Elwood Blues tarna's dead; processing... complete. Disappointed by Universe. RIP Hades/Sand/etc. Here's hoping your next alt has a harp. Link to comment Share on other sites More sharing options...
obyknven Posted April 7, 2013 Share Posted April 7, 2013 Anonymous do it again http://youtu.be/lVeVSr2Iu6I OpIsrael PDF of 35,000 Alleged Mossad Agentshttp://cryptome.org/2013/03/mossad-opisrael.pdfOpIsrael XLSX of 35,000 Alleged Mossad Agentshttp://cryptome.org/2013/03/mossad-opisrael.zip Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now