Mind Matters Natural and Artificial Intelligence News and Analysis

Tagcybersecurity

cyber-network-data-flow-open-source-3d-illustration-of-digital-hi-tech-particles-stockpack-adobe-stock
Cyber network, data flow, open source. 3D illustration of digital hi-tech particles

The Backdoor to Control the Internet

We almost lost the Internet last week, but open-source developers saved the day.

Few people are aware, but over the last several days, a perceptive developer foiled a multi-year plot to install a remote backdoor into, well, the entire Internet. Two years ago, a programmer known as Jia Tan (JiaT75) started helping out with a lesser-known compression library, known as xz. For those who don’t know, software today is not a monolithic entity. Every piece of software you use it built from a collection of tools, known as libraries, that make programming easier. For instance, most programmers never have to write the specifics of a sorting algorithm, because, somewhere, there is a library which performs sorting for them. This leaves programmers to focus on higher-level tasks, like actually making the software do what the users want. However, these Read More ›

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.

Spies and Lies: China’s Cyberespionage Is on an Unprecedented Level

Chinese cybertheft is an ever-increasing threat.
Intelligence agencies are clear that the problem is not the Chinese people or Chinese citizens living in other countries. The problem is the Chinese government. Read More ›
online-security-technology-stockpack-adobe-stock
Online Security Technology

What’s Wrong With Cybersecurity Technology?

Know your enemy: The target isn’t networks, computers, or users; they are pathways to the target —gaining control of data

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here. He starts with “Root Cause Analysis 101” Now we’ll apply the lessons learned in yesterday’s discussion to cybersecurity: Lesson Learned 1: A pattern of multiple types of recurring related failures indicates the presence of an unidentified root cause. In cybersecurity, is there a pattern of multiple types of recurring failures that appear to be related? Yes! A cybersecurity failure occurs whenever a cyberattacker gains control of data and then:  1) views or plays it, 2) steals copies of it, 3) ransoms it, 5) impedes its flow, 5) corrupts it, or 6) destroys it. The lesson learned is that the Read More ›

Chinese hacker. Laptop with binary computer code and china flag on the screen. Internet and network security.

U.S. and Allies Formally Accuse China of Exchange Server Hack

This isn’t the first time the Chinese-backed hacker group has infiltrated organizations

On Monday, July 19, three cybersecurity announcements were made: In response to the massive Microsoft Exchange Server hack, the U.S., U.K., Canada, Australia, New Zealand, Norway, Japan, the E.U., and NATO formally accused the Chinese government of engaging in harmful cyberactivity. The U.S. Department of Justice published its indictment of four Chinese hackers associated with the Chinese government, known as APT40. The FBI, CSIS, and the NSA published a cybersecurity advisory cataloging the fifty tactics, techniques, and procedures used by Chinese state-sponsored hackers. Then, on Tuesday, the CSIA and the FBI published a report on state-sponsored international hacking groups that included accusations that the Chinese state-backed hackers infiltrated thirteen oil and natural gas pipeline operators between 2011 and 2013. In Read More ›