Six years have passed since Zone-H.org appeared first on the Internet. It’s a long time, especially when talking about Internet based entities.
The reason why we decided to open up Zone-H was that we understood at that time the importance of having a mirror archive looking up for what was going on on the Internet and the other famous mirror archives were slowly dying (Safemode, Attrition, Alldas).
At that time, the best mirror archive was Alldas which had 12,500 mirrors archived in its database. Today, Zone-H has nearly 2,600,000 defacements archived in its own database.
Something to be proud of? Yes and no.
What are we proud of, and what aren’t we proud of? The question is itchy…
Every year, Zone-H publishes stats of registered attacks.
In the early months of Zone-H, we received an average of 2.500 notifications per month, last year this average jumped to 37.915 monthly attacks. In order to have better idea of the attacks number, during January 2007, 62.092 attacks were validated, and in the month of June — when a DDoS cyberwar in Russia paralyzed thousands of web sites, Zone-H included — we validated 17.797 defacements. The record occurred in the month of August 2006, with 130.645 registered attacks.
In the past the most attacked operating system was Windows, but many servers were migrated from Windows to Linux…
Bain and Huawei’s $2,2bn first attempt to buy out 3Com has been amended with a second offer, under which the Chinese networking giant and the Investment Fund plan to gain control of the American networking giant, but having “limited access” to 3com’s security products. This amendment has been introduced after the Treasury’s Committee on Foreign Investments launched an investigation aimed to block the deal, fearing possible implications in having a Chinese company so much close to key security products, currently used by the American government’s IT infrastructures. Further skepticism was raised by those who didn’t forget that Huawei’s founder Mr. Ren Zhengfei was also a former Chinese People Liberation Army officer…
London, England, 3rd March 2008 – News that an 18-year-old New Zealand teenager allegedly at the centre of an international cybercrime network has been charged with various hacking crimes on Friday is proof that advances in hacking techniques are moving at an astonishing speed and that millions of users don’t have adequate protection against the latest threats, says Tier-3’s Geoff Sweeney.
Security company Sophos recently released a malware 2007 report .
By reading the whitepaper, we get some interesting confirmations about malware/cracker’s trends much long ago anticipated also by Zone-H.
For the first time ever a report is focusing on traditional security threats as well as on hot topics such state sponsored espionage and cyberwar. Concepts that have been longly anticipated by a few of long-sighted observers, possibly having Zone-H’s members in the front line.
The Sophos whitepaper is truly insightful, and by reading it we have the impression that the bitter bite of the rotten security cake will soon end up in Apple’s mouth. The report in fact, devotes a large section to “Ultra-mobile PCs, iPhones and Wi-Fi devices”. In Sophos’ very graphic horror movie on future threats, the role of main male and female actors are assigned to the Iphone and the Ipod Touch. We’d like to add that they will be probably the best candidates for the golden Oscar statue as in the movie on future cyber threats, Iphone and Ipod’s interpretation couldn’t be more convincing and rich of drama…