Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hacker threats rise, with defenders lacking: report
by Staff Writers
San Francisco (AFP) Jan 16, 2014


NSA scoops up millions of text messages a day: report
London (AFP) Jan 16, 2014 - The US National Security Agency has collected almost 200 million mobile phone text messages a day from around the world, a report said Thursday, in the latest revelations from the Edward Snowden files.

The Guardian newspaper and Britain's Channel 4 News reported that the NSA used the messages to extract data on the location, contact networks and credit card details of mobile users.

British spies were given access by the NSA to search the collected "metadata" -- information about the text messages but not the actual contents -- of British citizens, according to the report.

The secret files say the programme, codenamed Dishfire, collects "pretty much everything it can", the Guardian and Channel 4 News reported.

Dishfire works by collecting and analysing automated text messages such as missed call alerts or texts sent to inform users about international roaming charges, the news organisations said.

It was also able to work out phone users' credit card numbers using texts from banks.

They cited an internal NSA presentation from 2011 on the programme and papers from Britain's electronic eavesdropping facility GCHQ.

There was no immediate reaction from the NSA.

GCHQ said it worked within British law.

"All of GCHQ's work is carried out in accordance with the strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate and that there is rigorous oversight," it said in a statement.

The report comes a day before US President Barack Obama is due to give a long-awaited speech proposing curbs on NSA phone and Internet data dragnets exposed by fugitive intelligence contractor Snowden.

Snowden remains in exile in Russia, where he has been granted temporary asylum.

The president discussed the details of Friday's speech during a telephone call with British Prime Minister David Cameron on Thursday, according to Cameron's Downing Street office.

During the discussion, the two leaders "welcomed the unique intelligence sharing relationship between their two countries," according to the statement.

A Cisco security report released on Thursday showed that hacker threats reached "startling levels" last year and that the world is suffering from a shortage of skilled computer defenders.

Cracks in defenses and weapons for attacks rose to the highest levels since tracking began in 2000, while there was a worldwide shortage of nearly a million skilled security professionals to protect networks and machines, according to the annual Cisco report.

"To truly protect against all of these possible attacks, defenders must understand the attackers, their motivations and their methods before, during and after an attack," said Cisco Threat Response Intelligence chief security officer John Stewart.

"Although the Cisco Annual Security Report paints a grim picture of the current state of cyber security, there is hope for restoring trust in people, institutions and technologies - and that starts with empowering defenders with real-world knowledge about expanding attack surfaces."

Technology and tactics used by online criminals have outpaced the ability of security professionals to defend against those threats, according to Cisco.

The problem is compounded by the fact that most organizations lack staff or systems to detect and counter hacker attacks quickly, the report concluded.

Hacker tactics include tricking people into revealing passwords or other sensitive information with ruses referred to as "social engineering" and taking advantage of trust relied on for financial, government or social activities online.

A sampling of 30 of the world's largest Fortune 500 companies showed that websites booby-trapped with malicious code were visited from each of their networks, according to the report.

Distributed denial of service attacks in which websites are overwhelmed by simultaneous requests were said to have increased in volume and severity.

Java continued to be the programming language most frequently exploited by cyber criminals, according to Cisco.

Meanwhile, 99 percent of all mobile viruses targeted devices powered by Google-backed Android software, with a typical tactic being to hide it in applications available for download at unofficial online marketplaces, the report indicated.

Cisco also reported "remarkable growth" in malware targeting the agriculture and mining industries, while seeing a continued rise in the energy, oil and gas sectors.

Silicon Valley-based Cisco Systems specializes in computer networking.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
NSA taps offline computers with secret bug: report
Washington (AFP) Jan 15, 2014
The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday. The New York Times reported that the NSA has implanted software on 100,000 computers around the world to be able to conduct surveillance, and which gives the spy agency "a digital highway" for launching cybe ... read more


CYBER WARS
Internet Radio Provides Musical Space-Weather Reports from NASA's LRO Mission

Moon rover, lander wake after lunar night

India to launch second mission to moon by 2017

Wake Up Yutu

CYBER WARS
Ten-Years Roving About On Mars

Mars Orbiter Images Rover and Tracks in Gale Crater

Who Wants to Go to Mars - One Way?

More than 1,000 chosen for one-way Mars reality-TV mission

CYBER WARS
Suit up for Skinsuit

Kids coached to pitch world-changing ideas

Space-faring countries discuss cooperation in US

Ground control to Major Tang

CYBER WARS
Official: China's space policy open to world

China launches communications satellite for Bolivia

China's moon rover continues lunar survey after photographing lander

China's Yutu "naps", awakens and explores

CYBER WARS
Cygnus Work Under Way, Normal Station Operations Continue

Spaceflight, Nanoracks Partnership Launch CubeSat Customers Towards Historic ISS Deployment

Orbital's cargo ship arrives at space station

Obama Administration Extends ISS Until at Least 2024

CYBER WARS
Vega Flight VV03 And Ariane Flight VA218

Competiveness, quality and launcher family evolution are the keywords for Arianespace in 2014 and beyond

Orbital Sciences launches second mission to space station

Cygnus Heads to Space for First Station Resupply Mission

CYBER WARS
NASA's Kepler Provides Insights on Enigmatic Planets

Powerful Planet Finder Turns Its Eye to the Sky

New kind of planet or failed star? Astrophysicists discover category-defying celestial object

SF State astronomers discover new planet in Pisces constellation

CYBER WARS
Potential Future Data Storage at Domain Boundaries

Quantum physics could make secure, single-use computer memories possible

Bio-inspired glue keeps hearts securely sealed

ORNL-UT researchers invent 'sideways' approach to 2-D hybrid materials




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement