[ISN] How a cyberwar was spun by shoddy journalism

http://www.guardian.co.uk/commentisfree/2013/mar/29/cyberwar-spun-shoddy-journalism By Heather Brooke guardian.co.uk 29 March 2013 A veteran Reuters reporter related a piece of advice given by his editor: “It’s not just what you print that makes you an authoritative and trusted source for news, but what you don’t print.” He wasn’t talking about censorship, he was talking about what separates journalism from stenography and propaganda: sceptical scrutiny. The professionalism of the craft isn’t simply learning to write or broadcast what other people tell you. Crucially it is the ability to delve, interrogate and challenge, and checking out stories you’ve discovered through your own curiosity, or robustly testing what other people tell you is true. Scepticism was in short supply this week when breathless claims about the collapse of the internet were published in such reputable publications as the New York Times, the BBC and even technical journal Ars Technica, all falling prey to the hyped-up drama of a DDoS attack against Spamhaus, a group that tracks spammers, and their alleged attacker Cyberbunker, a Dutch hosting company Spamhaus had blacklisted. Ars Technica described the attack as at “a scale that’s threatening to clog up the internet’s core infrastructure and make access to the rest of the internet slow or impossible”. “If a Tier 1 provider fails, that risks breaking the entire internet,” it continued. […] ______________________________________________ Attend #HITB2013AMS April 8th – 11th in Amsterdam. Featuring over 42 international speakers and keynotes by Bob Lord and Edward Schwartz http://conference.hitb.org




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Quick Note / March 2013

Quick note, Lately our current provider is experiencing issues of people reporting InfoSec News mails as spam, one user suspects it might have been a ‘Fat finger’ incident between saving mails and accidentally clicking This is Spam, but we’ve had a few other mails recently, maybe from users confused on how to leave the list? So, in the headers of all outgoing InfoSec News mail are these instructions to unsubscribe from the list… List-Unsubscribe: , isn-request@infosecnews.org?subject=unsubscribe> List-Subscribe: , isn-request@infosecnews.org?subject=subscribe> …and to also subscribe to the list. -=- We’re moving, again, sometime in April we’ll be moving from our current provider to another site, downtime will be minimal as we’re getting better at doing this (Now about four times in the last thirteen years) -=- Lastly, while everything is a work in progress, please check out the services we’re trying to roll out slowly… InfoSec News Jobs: http://jobs.infosecnews.org/ Shop InfoSec News: http://shopinfosecnews.org/ InfoSec News Twitter: https://twitter.com/infosecnews_ InfoSec News Donation: http://www.infosecnews.org/donate.html Thank you for your continued support! Sincerely, William Knowles InfoSec News @infosecnews.org ______________________________________________ Attend #HITB2013AMS April 8th – 11th in Amsterdam. Featuring over 42 international speakers and keynotes by Bob Lord and Edward Schwartz http://conference.hitb.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Evernote account used to deliver instructions to malware

https://www.computerworld.com/s/article/9237949/Evernote_account_used_to_deliver_instructions_to_malware By Jeremy Kirk IDG News Service March 28, 2013 A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a hacked computer. Trend Micro found it tries to connect to Evernote in order to obtain new commands. “The backdoor may also use the Evernote account as a drop-off point for its stolen information,” wrote Nikko Tamana, a Trend Micro threat response engineer. It’s not unheard of for hackers to design malware to abuse legitimate services, either to make the malware more difficult to trace or give it a less suspicious profile. In the past, Twitter and Google Docs have been used by hackers to post instructions for their botnets. […] ______________________________________________ Attend #HITB2013AMS April 8th – 11th in Amsterdam. Featuring over 42 international speakers and keynotes by Bob Lord and Edward Schwartz http://conference.hitb.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail