Posted on 11/20/2008 4:43:58 PM PST by Sammy67
Edited on 11/20/2008 4:48:23 PM PST by Admin Moderator. [history]
Thursday, November 20, 2008 The Pentagon has suffered from a cyber attack so alarming that it has taken the unprecedented step of banning the use of external hardware devices, such as flash drives and DVD's, FOX News has learned.
The attack came in the form of a global virus or worm that is spreading rapidly throughout a number of military networks.
(Excerpt) Read more at foxnews.com ...
Ohhhhh, I can see the big MacAttack coming down the road with lights and sirens on...
;-)
I would recommend eComStation
www.ecomstation.com
Ping.
The *real* problem is homogeneity of OSes. The *only* answer is heterogeneity.
Some Windows, some Macs, some Linux, some OS/2 ...
Throughout history monocultures have come crashing down with crushing consequences. Yet we never seem to learn.
bump...
Seems to me like it would be pretty simple to block a group of IP addresses to stop an attack. Unless someone brought something inside, then it might be more difficult to isolate, but not impossible to stop.
Once the system is compromised and your internal servers become the attack vector, you’re screwed.
Integrity-178B from Green Hills Software is the only EAL6+ certified operating system. But it's not suited to desktop or server use, more real-time embedded. Aside from that, the highest OS-related thing I know of in use is IBM's z partitioning system for mainframes (LPAR isolation), at EAL5.
At last estimate it would cost $10 billion to rewrite Linux. Count at least a decade and ten times the money to make a modern EAL7 desktop/server OS kernel since every single element of it must be formally designed and verified using mathematical models and proofs. I'm not even sure it can be done for a whole OS. The guy who can pull it off is a god among OS designers. I only know of one piece of software that has achieved EAL7, and it's a specialized network program.
Possible. Not only is China a great source of attacks, it's also a great source of open proxies for others around the world to use for attacks.
ILOVEYOU, a.k.a., VBS/Loveletter, a.k.a., Love Bug.
It was first because they worked for weeks in advance to find and exploit a bug and first publicly used it at the conference. The bug was there, but the relative time to hack was meaningless.
We're being attacked by Canada?
The conference you are referring to was CANSEC WEST (Canadian Security Conference West) and the Mac was indeed taken over first... and it took only two minutes to accomplish. However, the security consultant who did it, Charles Miller, is an ex-NSA computer expert whose team of himself and two other ex-NSA computer experts worked THREE WEEKS to find the security vulnerability and construct a means of exploiting it.
They did NOT use a "known vulnerability" (except that it was known to them because they had discovered it in the preceding three weeks) in OS X, but rather a vulnerability in JAVA. Miller stated that his exploit would have worked on any of the three OSes in the challenge as well. He just wanted the MacBook Air, which was the prize if he compromised it.
None of the three machines failed during the first day when the attack had to work via an external attack. The winning exploit only worked after the first day of the contest when the rules were relaxed and user participation was allowed. The exploit worked because the referees were required to navigate to a prepared site and click on a link or download a file and install it.
Incidentally, the team that broached the Windows Vista machine did it in under six hours with no prior preparation...
Nope... California.
From Seven Steps to a Caliphate:
“The Fourth Phase. Between 2010 and 2013, Hussein writes that al-Qaida will aim to bring about the collapse of the hated Arabic governments. The estimate is that “the creeping loss of the regimes’ power will lead to a steady growth in strength within al-Qaida.” At the same time attacks will be carried out against oil suppliers and the US economy will be targeted using cyber terrorism.
How does it present itself? Black screen or what?
My screen has been fading in and out since yesterday.
But maybe that’s another problem.
I run McAfee every day, but I guess some worms and viruses still get through.
They'd be better off banning the use of Windows.
That is a very profound statement, and true statement. DoD already has moved toward Apple servers. They should adopt Mac desktops and laptops also. Our troops deserve the best.
Not only that, but they must interface with contractors and others, even within DoD, who prefer to send copies of presentations and such on thumb drives, rather than going to the trouble of burning CD-ROMS. But of course a worm or Trojan could ride back to the DoD internal net on a CD/DVD ROM just as easily as on a flash drive.
These guys are likely on them like white on rice.
True.
Apple is JUST as hackable
False. A bump-proof, pick- and drill-resistant, boron alloy steel MUL-T-LOCK is less "hackable" than a Wal-Mart Master Lock. They're both padlocks, and both can conceivably be compromised, but one is just designed and built better to make it harder to compromise. That there are far fewer of them on the market is irrelevant.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.