Week 7 Link Dump

Members of the notorious LulzSec hacking gang have been sent to jail:

http://nakedsecurity.sophos.com/2013/05/16/jail-lulzsec-hacking-gang/

Who was Avunit? LulzSec chatroom logs obtained and published by the Guardian in June 2011 show that there was a sixth member:

http://www.guardian.co.uk/technology/2013/may/16/lulzsec-unanswered-questions

A man who used his IT expertise to launch cyber-attacks on the websites of Oxford and Cambridge universities has been jailed for two year:

http://www.guardian.co.uk/technology/2013/may/16/jailed-attacks-oxford-cambridge-websites

It has emerged that more than 25,000 cyber-attacks were carried out against Essex County Council in the past year:

http://www.bbc.co.uk/news/uk-england-essex-22564652

Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs that the general population does not realize are possible:

http://www.reuters.com/article/2013/05/15/us-cyber-summit-flaws-idUSBRE94E11B20130515

Google is integrating Gmail with Google Wallet so that users can send payments as a mail attachment, even if the recipient doesn’t have a Gmail address:

https://www.networkworld.com/news/2013/051613-google-wallet-makes-payments-possible-269828.html

Over 150,000 computers, most of them belonging to Australian users, have been infected with this malware since 2012 and were added to a botnet that Group-IB researchers have dubbed “Kangaroo” or “Kangoo,” after a kangaroo logo used on the command-and-control server’s interface:

https://www.networkworld.com/news/2013/051513-researchers-uncover-large-cyberfraud-operation-269791.html

Are Cyber-Weapons Effective? – Assessing Stuxnet’s Impact on the Iranian Enrichment Programme:

http://www.tandfonline.com/doi/full/10.1080/03071847.2013.787735

What might the “post-APT” threat landscape look like? Some ideas for anticipating the future:

http://blog.zeltser.com/post/50497161014/anticipating-cyber-threats-beyond-apt

For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered “root” access over machines:

http://arstechnica.com/security/2013/05/critical-linux-vulnerability-imperils-users-even-after-silent-fix/

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top