Recent Reports Outline Our Lack Of Security
Folks, I really didn’t want to bring these to you during a Holiday period.
Honest.
So I’m only going to show you the headlines and provide the links so that you can delve further into this alarming state of affairs, if you so choose. This is important stuff, so I encourage you to.
“China is actively conducting cyber espionage as a warfare strategy and has targeted U.S. government and commercial computers, according to a new report from the U.S.-China Economic and Security Review Commission.
“China’s current cyber operations capability is so advanced, it can engage in forms of cyber warfare so sophisticated that the United States may be unable to counteract or even detect the efforts,” according to the annual report (PDF) delivered to Congress on Thursday. “
From: Report: U.S. vulnerable to Chinese cyber espionage
(If you read it, you’ll see “can engage in” should really read “is engaging in”.. but, that might ruffle some feathers.)
And..
• Bank accounts were the most commonly advertised item for sale on underground economy servers.
• Symantec observed an average of 61,940 active bot-infected computers per day in the second half of 2007.
• The United States had the most bot-infected computers, accounting for 14 percent of the worldwide
total, a slight increase from 13 percent in first half of 2007.
• The education sector accounted for 24 percent of data breaches that could lead to identity theft, more than any other sector.
• Government was the top sector for identities exposed, accounting for 60 percent of the total, a
significant increase from 12 percent in the first half of 2007.
• Theft or loss of computer or other data-storage medium was the cause of the most data breaches that could lead to identity theft during this reporting period, accounting for 57 percent of the total.
Source: Symantec Global Internet Security Threat Report
Trends for July–December 07 (to read the report, click here.)
Today’s free link: Caution– Trend Micro’s Housecall Spoofed.
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
I am firmly on this team. But, be honest. If you were a terrorist, wouldn’t you do the same thing?? I certainly do not support or condone terrorists or terrorism. However, it is here. Our best defense is knowledge – not fear.
LikeLike
Well, what the first report is discussing is not terrorism or cyber-terrorism, but undeclared cyber-warfare conducted by the same government that builds all our tech products.
There is very good reason to be fearful, and if fear is the motivating factor for us — computer users, law enforcement agencies, the Feds, and the tech industry — to wake up and smell the coffee, and start changing how we conduct business, than I am all for it.
LikeLike
There is no doubt that there is power in knowledge.
Unfortunately, it has been, and continues to be demonstrated, that a typical computer user has very limited knowledge as to the critical dangers the Internet presents to their personal security, and safety. Business, is hardly any better.
Like you Paul, I contend, that if fear is what it takes to resolve this situation – I’m all for it.
BM
LikeLike
TechPaul,
To help readers visualize where the most cyber-threats are being generated from, please visit:
http://www.threatexpert.com
The writing is on the wall and is a very serious matter.
Rick
LikeLike
Isn’t undeclared warfare = terrorism?
LikeLike
Ah! Love it! A challenge of language!
I doff my cap to you, sir.
There is an element of randomness, or non-cohesiveness, usually associated with “terrorism”, as well as the fact that terrorism has a different goal (usually) than pure warfare does.
Terrorism’s goal is to cause instability by striking fear.
Warfare’s goal is the capture (or defense) of territory.
Right?
LikeLike
Semantics. Ah, yes.
If I were running the war, I would use terrorism to create instability to make the capture of territory and resources easier and quicker. Not so random, but with quiet purpose.
Good thing I’m not in charge…
LikeLike
The classic use of terror as an element of war.
(Such as clog the roads with fleeing civilians, so reinforcements and supplies can’t reach the frontlines.)
Sun Tzu. 6th Century B.C.
LikeLike