Week 9 Link Dump

Spy agencies in the UK, Australia and the US have internally banned using Lenovo PCs because of remote access vulnerabilities that were discovered during testing:

http://thenextweb.com/asia/2013/07/26/spy-agencies-reportedly-have-a-long-standing-ban-on-lenovo-pcs-due-to-back-door-vulnerabilities/

List of all major IP address blocks allocated for each country:

http://www.nirsoft.net/countryip/

Researchers with IOActive say they can shut down a plant from up to 40 miles away by attacking industrial sensors:

https://www.computerworld.com/s/article/9241109/Oil_gas_field_sensors_vulnerable_to_attack_via_radio_waves

The PRISM revelations are also making it harder for US companies to get new business abroad:

http://arstechnica.com/tech-policy/2013/07/prism-revelations-result-in-lost-business-for-us-cloud-companies/

A British-based computer scientist has been banned from publishing an academic paper revealing the secret codes used to start luxury cars including Porsches, Audis, Bentleys and Lamborghinis:

http://www.guardian.co.uk/technology/2013/jul/26/scientist-banned-revealing-codes-cars

The pornography filtering system praised by David Cameron is controlled by the controversial Chinese company Huawei:

http://www.bbc.co.uk/news/technology-23452097

A security firm says it has identified the first known malicious use of Android’s “master key” vulnerability:

http://www.bbc.co.uk/news/technology-23431281

A leading Chinese hacker who used to attack American targets in the name of patriotism is now sharing his skills with Western multinational firms:

http://au.news.yahoo.com/technology/news/article/-/18104751/chinese-hacker-who-once-targeted-the-us-switches-sides-to-help-defend-western-companies/

How can you protect yourself from online snooping? Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website with tools and practical advice that will help protect your communications and data:

http://gijn.org/2013/07/22/an-online-survival-kit-from-reporters-without-borders/

This first report builds a model to scope the direct losses from cybercrime and cyber espionage:

https://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4.pdf

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top