- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged internet
Islamists Call For Death Of Bloggers
Posted by Brian in News, Threat Watch on 4/Mar/2013 08:24
This was posted to Slashdot on Feb. 25th:
“Days after the killing of leftist blogger Thaba Baba, mosques throughout Bangladesh called for a popular uprising to demand the killing of other bloggers who had held a rally calling for the death of Jama’at-e-Islami leaders convicted of war crimes. This happens in an atmosphere of ongoing tension between Left and Right, with the leftist government threatening to outlaw rightist parties while the right uses violence to quiet selected enemies.”
Data Mining Surveillance Software Secretly Built By Raytheon
Posted by Brian in News, Threat Watch on 15/Feb/2013 08:30
From The Sydney Morning Herald:
Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients. But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing “trillions of entities” from cyberspace.
Cyber Crime Ring Dismantled
Posted by Brian in News, Threat Watch on 15/Dec/2012 08:16
The FBI and its international law enforcement partners have dismantled an international cyber crime ring linked to the Butterfly Botnet, which steals computer users’ credit card, bank account, and other personal identifiable information. Details
Google Accidentally Transmits Self-Destruct Code to Army of Chrome Browsers
Posted by Gary in Comms, Threat Watch on 11/Dec/2012 12:33
From: Wired Enterprise
Google’s Gmail service went down for about 20 minutes on Monday. That was annoying, but not exactly unprecedented. These sorts of outages happen all the time. What was strange is that the Gmail outage coincided with widespread reports that Google’s Chrome browser was also crashing.
Late Monday, Google engineer Tim Steele confirmed what developers had been suspecting. The crashes were affecting Chrome users who were using another Google web service known as Sync, and that Sync and other Google services — presumably Gmail too — were clobbered Monday when Google misconfigured its load-balancing servers.
Israel Cyber Security Summit
From Defense Update:
Since the creation of cyberspace and the internet Israeli security experts and scientists have positioned the country at the forefront of cyber defense, developing everything from the basic building blocks of network security, data encryption and information protection to integrated system providing monitoring, simulation and rapid response in the event of cyber attacks. The Israeli government has recently established a national cyber center, with the goals to coordinate the research, development, legislation and preparedness among the academy, private and public sector, to enhance the protection and minimize vulnerability of the country’s commercial, industrial and public sector to hacking, cyber crime and cyber attacks.
DefenseAuctions.com
Could this site be the eBay of gun sales? Here’s hoping its successful.
Computer Virus: Reveton Ransomware
Posted by Brian in News, Threat Watch on 13/Aug/2012 13:01
A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week
New Malware Goes After Financial Information
Posted by Brian in Comms, News, Threat Watch on 10/Aug/2012 16:56
CNET reports on the new Gauss malware tool:
Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.
Iranian hackers obtain fraudulent HTTPS certificates
Posted by Gary in Comms, News, Threat Watch on 28/Mar/2011 18:38
From: EFF
Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get?
On March 15th, an HTTPS/TLS Certificate Authority (CA) was tricked into issuing fraudulent certificates that posed a dire risk to Internet security. Based on currently available information, the incident got close to – but was not quite – an Internet-wide security meltdown. These events show why we urgently need to start reinforcing the system that is currently used to authenticate and identify secure websites and email systems.
China and its Double-edged Cyber-sword
Posted by Brian in Comms, Threat Watch on 10/Dec/2010 09:25
China and its Double-edged Cyber-sword is republished with permission of STRATFOR.
By Sean Noonan
A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.
China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.
One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »
The Great Radio Spectrum Famine
Mobile broadband is consuming the available radio spectrum. Serving up more won’t be easy.
Read the full article here…
http://spectrum.ieee.org/telecom/wireless/the-great-radio-spectrum-famine/1
Electronic Frontier Foundation Needs Your Support!
Dear Friend of Digital Freedom,
In 1990, the Electronic Frontier Foundation (EFF) took an unprecedented stand for technology users’ civil liberties by suing the Secret Service for seizing and damaging Steve Jackson Games’ computers. Twenty years later, EFF remains passionately engaged in protecting civil liberties at the forefront of technology. In 2010, EFF rose to meet new challenges and secured new freedoms for users everywhere.
In 2010:
EFF made it possible – for the first time in history – for artists and educators to excerpt from DVDs without fear of breaking the law;
EFF defended political bloggers and peer-to-peer users from copyright “trolls” bullying them into bogus legal settlements;
EFF conducted groundbreaking research on privacy and security, and used the findings to lobby for improved user protections; and
EFF collaborated with local groups throughout the world to advance privacy and free expression through technology.
These victories were only possible thanks to donations from individuals like you. Charity Navigator, a leading evaluator of non-profit efficiency, has given EFF its highest rating — we make each and every contribution count in the fight for freedom on the electronic frontier.
Choose to support digital freedom and secure your civil liberties today with a year-end gift to EFF.