New approach in radical propaganda
20/12/2007 Written by minor
It is no secret, that radicals and terrorists are using different approaches to get new members and supporters. One of them is also Web and radical websites and forums. Such websites provide content, that is intended to spread the ideas among visitors.
Creators of this content are mostly anonymous persons, but now the visitors have a possibility to place questions to real person, for some — their icon: Ayman al-Zawahiri, Guardian informed. Media arm of al-Qaida — Al-Sahab said, that Zawahiri would answer the questions as much as he is able.
Data theft triple rise
11/12/2007 Written by minor
It is well known to all of us — data theft or data loss is one of the nightmares. This year stories brought embarrassing incident in UK, 25 million people, their personal and bank details are at risk thanks two disks in mail. Given fact that UK has around 60 millions of citizens, more than every 3rd is affected by this.
Number is impressive, but it is not the only incident that happened this year. USA Today reported, that more than 162 millions of records has been stolen this year. When comparing to year 2006, when “only” more than 49.7 millions were stolen, this indicates clearly the aim of the attackers — private and business data.
Cyber attack on U.S. nuclear lab
10/12/2007 Written by minor
Few weeks ago we informed about rise of Chinese cyberwarriors. Now, another attack against U.S. government’s nuclear weapons laboratories may have originated in China, NY Times informed. Attack was reported last week in confidential memorandum distributed to public and private security officials issued bu U.S. Department of
Homeland Security.
Memorandum included list of web and Internet addresses linked to locations in China. Oak Ridge National Laboratory in Tennessee disclosed, that classified informations were not compromised. Full extent of the intrusion is still under investigation.
Google owns us?
28/11/2007 Written by minor
Google is real giant. We have now Google powered search, email, office applications, blogs, satelite maps… We would like to not make any commercial to these services, everybody can make his decision and use it at own risk.
Of course, every activity you do on Google is logged — your searches, emails, even documents you open using Google Docs are saved. And, don’t forget — all this can be used one day against you. Maybe a bit paranoid view, but, considering latest initiative from Google house, we should really take care about our privacy.
Interview with Dan Egerstad
22/11/2007 Written by minor
Few days ago we informed about raid in house of Dan Egerstad. Now he agreed with brief interview, where we tried to get his point of view on the issue.
Could you please explain, how did you come to the idea of creating exit TOR nodes and intercepting traffic?
I wanted to know how many people were encrypting their mails and needed some figures for a lecture I was holding. Setting up a ToR node to analyze mail-traffic was an easy way to get some numbers. Right before shutting this automated process down I by accident saw an email that caught my eye and led me to doing this in a bigger way.