Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:not likely to happen (Score 3, Insightful) 269

They do, for the most part, and for most of the agencies (DOD, FBI, CIA, DHS, etc...). They have redundant network capabilities served both by wired and wireless means (micro-wave and satellite transmission capabilities). The "business" apps at those agencies do not necessarily have a private network. The terminals that serve you the internet at a great many of these agencies also have access to these other applications that interact with the "shadow" networks. Also, the same network providers that provide you and me with our "pipe" (AT&T, Verizon, Quest, etc...) also provide the "pipes" to the other, "shadow" networks. Should the systems at those installations become targets for malicious assault, then it could shut down entire sectors of the economy. The NASDAQ is one such "highly available" system that could be harmed, even though they have their own network. The financial networks that carry SWIFT, Cirrus, Visa, and ATM transactions would be susceptible even though they are on private networks. I'm not sure how turning "off" the internet will help. Wouldn't removing access to the internet have the same effect as a DDOS attack? The outcomes are the same aren't they (i.e. loss of connectivity)? The real goal of cyber attack is either one or both of the following:

Gain Access

Deny Access

If I were a cyber-assassin bent on disabling large networks for the purpose of disrupting an economy, I now would have two tactics available to me. I could launch my DDOS against a financial network or sufficiently large commercial target and hope to disrupt their capabilities. The other tactic would be to launch the assault and wait for the "kill" switch to be engaged. The outcome in both of those scenarios is favorable to the attacker.

Security

Online Videos May Conduct Viruses 195

Technical Writing Geek writes "A report on threats via the Internet released by a Georgia Tech research center indicates online video may be a new avenue of attack. As the popularity of flash media continues to explode, hackers may be targeting embedded video players and more traditional video downloads with worms and virii. 'One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube ... Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.'"

Slashdot Top Deals

"Life sucks, but it's better than the alternative." -- Peter da Silva

Working...