Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US spymaster warns over low-level cyber attacks
by Staff Writers
Washington (AFP) Feb 26, 2015


Twitter boosts effort to stop spoofing, data leaks
San Francisco (AFP) Feb 26, 2015 - Twitter said Thursday it was ramping up efforts to crack down on impersonation on the messaging platform as well as the leaking of personal, private data.

The announcement came as an update to Twitter's online safety push announced in December.

"We streamlined the process of reporting harassment on Twitter recently; now we're making similar improvements around reporting other content issues including impersonation, self-harm and the sharing of private and confidential information," Twitter vice president Tina Bhatnagar said in a blog post.

"These changes will begin rolling out today and should reach all users in the coming weeks."

Bhatnagar said Twitter is devoting more resources to curbing harassment and other safety issues.

"Overall, we now review five times as many user reports as we did previously, and we have tripled the size of the support team focused on handling abuse reports," she said.

"We are also beginning to add several new enforcement actions for use against accounts that violate our rules. These new actions will not be visible to the vast majority of rule-abiding Twitter users -- but they give us new options for acting against the accounts that don't follow the rules and serve to discourage behavior that goes against our policies."

Twitter, which has been growing more slowly than rival social networks, has been making effort to boost confidence and engagement in the one-to-many messaging platform.

The number of active monthly users of the San Francisco-based firm grew to 288 million at the end of the past quarter-- just four million more than in the previous quarter.

A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said on Thursday.

US officials for years have warned of a possible "cyber Pearl Harbor" that could shut down financial networks, poison water supplies or switch off power grids.

But Clapper told lawmakers that American spy agencies were more focused on lower-profile but persistent assaults that could have a damaging effect over time.

"Rather than a 'cyber Armageddon' scenario that debilitates the entire US infrastructure, we envision something different," Clapper told the Senate Armed Services Committee.

"We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security," he said.

The past year had seen "destructive cyber attacks" for the first time on US soil carried out by other countries, Clapper said.

He cited North Korea's alleged hacking of Sony Pictures in November and an Iranian attack a year ago against the Las Vegas Sands Casino Corporation.

Pyongyang was accused of targeting Sony over a comedy film that portrayed the fictional assassination of North Korea's leader. And Iran went after Sands purportedly because the company's CEO, billionaire Sheldon Adelson, is known as a hawkish supporter of Israel.

Foreign "actors" are conducting reconnaissance and gaining digital access to US infrastructure systems, so they can launch a cyber attack if necessary in the future, he said.

Russia and China had particularly sophisticated cyber capabilities, according to the director of national intelligence.

Russia is creating its own cyber command that will be able to orchestrate propaganda and insert malware into adversaries' computer systems, he said.

Countries such as Iran and North Korea have "lesser technical capabilities but possibly more disruptive intent," he said.

Clapper acknowledged America had "offensive capabilities" in cyberspace but offered no details.

But he said there were questions about how to use such weapons and what sort of doctrine would govern digital operations.

"I think the issue, though, is what is the policy? What is it that would achieve cyber deterrence? And that is an issue that, at the policy level, we're still, frankly, wrestling with," he said.

The United States and Israel were reportedly behind an elaborate cyber attack on Iran's nuclear program in 2010 that damaged hundreds of centrifuges. Dubbed "Olympic Games," the operation employed the Stuxnet computer worm that was introduced through an infected USB flash drive, according to the New York Times.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Cyber thugs taking data hostage
San Francisco (AFP) Feb 26, 2015
Marriage therapist Valerie Goss turned on her computer one day and found that all of her data was being held hostage. Malicious code referred to as "ransomware" had encrypted her files and locked them away. Cyber criminals demanded $500 in hard-to-trace virtual currency Bitcoin to give her the key. The ransom would jump to $1,000 in Bitcoin if Goss took more than a day to pay. "I felt sh ... read more


CYBER WARS
Application of laser microprobe technology to Apollo samples refines lunar impact history

NASA releases video of the far side of the Moon

US Issuing Licenses for Mineral Mining on Moon

LRO finds lunar hydrogen more abundant on Moon's pole-facing slopes

CYBER WARS
How Can We Protect Mars From Earth, While Searching For Life

The Search For Volcanic Eruptions On Mars Reaches The Next Level

Using Curiosity to Search for Life

Curiosity Self-Portrait at 'Mojave' Site on Mount Sharp

CYBER WARS
Water pools in US astronaut's helmet after spacewalk

Korean tech start-ups offer life beyond Samsung

Fast visas and dim sum: Spain seeks to attract Chinese tourists

Industry: Risk aversion costs more than 'fast failure'

CYBER WARS
Argentina welcomes first Chinese satellite tracking station outside China

More Astronauts for China

China launches the FY-2 08 meteorological satellite successfully

China's Long March puts satellite in orbit on 200th launch

CYBER WARS
Russia to use International Space Station till 2024

NASA preparing to reassemble International Space Station

Spacewalking 'cable guys' wrap up work outside station

Space Station 3-D Printed Items, Seedlings Return in the Belly of a Dragon

CYBER WARS
Next Launch of Heavy Angara-5 Rocket Due Next Year

SES Announces Two Launch Agreements With SpaceX

Soyuz Installed at Baikonur, Expected to Launch Wednesday

Leaders share messages, priorities at AFA Symposium

CYBER WARS
Planets Can Alter Each Other's Climates over Eons

The mystery of cosmic oceans and dunes

Laser 'ruler' holds promise for hunting exoplanets

Scientists predict earth-like planets around most stars

CYBER WARS
MUOS - a Vital Next Step for Narrowband Satellite Communications

Japan's NTT to buy German data centre operator: report

Moving molecule writes letters

New filter could advance terahertz data transmission




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.