Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Recent Reports Outline Our Lack Of Security

Folks, I really didn’t want to bring these to you during a Holiday period.

Honest.

So I’m only going to show you the headlines and provide the links so that you can delve further into this alarming state of affairs, if you so choose. This is important stuff, so I encourage you to.

“China is actively conducting cyber espionage as a warfare strategy and has targeted U.S. government and commercial computers, according to a new report from the U.S.-China Economic and Security Review Commission.

“China’s current cyber operations capability is so advanced, it can engage in forms of cyber warfare so sophisticated that the United States may be unable to counteract or even detect the efforts,” according to the annual report (PDF) delivered to Congress on Thursday. “

From: Report: U.S. vulnerable to Chinese cyber espionage
(If you read it, you’ll see “can engage in” should really read “is engaging in”.. but, that might ruffle some feathers.)

And..

• Bank accounts were the most commonly advertised item for sale on underground economy servers.
• Symantec observed an average of 61,940 active bot-infected computers per day in the second half of 2007.
• The United States had the most bot-infected computers, accounting for 14 percent of the worldwide
total, a slight increase from 13 percent in first half of 2007.
• The education sector accounted for 24 percent of data breaches that could lead to identity theft, more than any other sector.
• Government was the top sector for identities exposed, accounting for 60 percent of the total, a
significant increase from 12 percent in the first half of 2007.
• Theft or loss of computer or other data-storage medium was the cause of the most data breaches that could lead to identity theft during this reporting period, accounting for 57 percent of the total.

Source: Symantec Global Internet Security Threat Report
Trends for July–December 07 (to read the report, click here.)

Today’s free link: Caution– Trend Micro’s Housecall Spoofed.

Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix

Share this post :

November 25, 2008 - Posted by | advice, News, security, tech

8 Comments »

  1. I am firmly on this team. But, be honest. If you were a terrorist, wouldn’t you do the same thing?? I certainly do not support or condone terrorists or terrorism. However, it is here. Our best defense is knowledge – not fear.

    Like

    Comment by mykysue | November 25, 2008 | Reply

  2. Well, what the first report is discussing is not terrorism or cyber-terrorism, but undeclared cyber-warfare conducted by the same government that builds all our tech products.
    There is very good reason to be fearful, and if fear is the motivating factor for us — computer users, law enforcement agencies, the Feds, and the tech industry — to wake up and smell the coffee, and start changing how we conduct business, than I am all for it.

    Like

    Comment by techpaul | November 25, 2008 | Reply

  3. There is no doubt that there is power in knowledge.

    Unfortunately, it has been, and continues to be demonstrated, that a typical computer user has very limited knowledge as to the critical dangers the Internet presents to their personal security, and safety. Business, is hardly any better.

    Like you Paul, I contend, that if fear is what it takes to resolve this situation – I’m all for it.

    BM

    Like

    Comment by Bill Mullins | November 25, 2008 | Reply

  4. TechPaul,

    To help readers visualize where the most cyber-threats are being generated from, please visit:

    http://www.threatexpert.com

    The writing is on the wall and is a very serious matter.

    Rick

    Like

    Comment by whatsonmypc | November 25, 2008 | Reply

  5. Isn’t undeclared warfare = terrorism?

    Like

    Comment by mykysue | November 29, 2008 | Reply

  6. Ah! Love it! A challenge of language!
    I doff my cap to you, sir.

    There is an element of randomness, or non-cohesiveness, usually associated with “terrorism”, as well as the fact that terrorism has a different goal (usually) than pure warfare does.
    Terrorism’s goal is to cause instability by striking fear.
    Warfare’s goal is the capture (or defense) of territory.

    Right?

    Like

    Comment by techpaul | November 29, 2008 | Reply

  7. Semantics. Ah, yes.

    If I were running the war, I would use terrorism to create instability to make the capture of territory and resources easier and quicker. Not so random, but with quiet purpose.

    Good thing I’m not in charge…

    Like

    Comment by mykysue | December 2, 2008 | Reply

  8. The classic use of terror as an element of war.
    (Such as clog the roads with fleeing civilians, so reinforcements and supplies can’t reach the frontlines.)

    Sun Tzu. 6th Century B.C.

    Like

    Comment by techpaul | December 2, 2008 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: