"..."If we knew how bad things were, how many corners were cut before the oil spill, we would have demanded action on part of industry as well as the government. We know we face exactly that kind of crisis in the context of cyber security," said Baker...."
Reference: www.cnn.com .
Google Stops Censorship, Making Block by China Likely "...Obama administration is “disappointed” that Google couldn’t reach an agreement with the Chinese government to keep operating Google.cn, said Mike Hammer, a spokesman for the National Security Council...."
Reference: www.businessweek.com .
Anatomy Of A Modern Hack
"...Phase 1, Reconnaissance: Attackers will watch and take notes on who in an organization they need to target, from administrative assistants to executives. Much of this information is gleaned from public Web sites. Phase 2, The Initial Breach: They will use spear-phishing ..."
Reference: www.informationweek.com
.
The following is an article about APT attacks. Are your networks and systems compromised? You can rest assured it is highly likely they are. Read the article below and start focusing on the issues now. This is the time to be proactive and The Missile Defense Briefing is your best source for following these threats. Keep informed and begin to educate yourself now. It is no longer enough to simply educate yourself in your field, you must educate on these threats. Tip: Follow the articles we reference and research the information we cite. Stay on top of your game ...others are! The following is an excerpt from the security company MANDIANT:
"The APT isn’t just a government problem; it isn’t just a defense contractor problem; and it isn’t just a military problem. The APT is everyone’s problem. No target is too small, or too obscure, or too well defended. None is too large, too well‐known, or too vulnerable. It’s not spy‐versus‐spy espionage. It’s spy‐versus‐everyone."
Report Details Hacks Targeting Google, Others
"...APT attackers, however, aim to establish a long-term occupying force inside a company’s perimeter. Last year, for example, an unidentified defense contractor discovered 100 compromised systems on its network, and found that the intruders had been inside since at least 2007. ..."
Reference: www.wired.com
Further Research:
.