Some cool direct from china images:
Cyberattacks 2012 (April 23, 2013 8:17 PDT) …item 2.. New class of industrial-scale super-phishing emails (4th March 2013 09:31 GMT) …item 3b.. WarGames – WOPR — ‘CPE1704TKS’ (1983) …
Image by marsmet547
"In numerous techniques, DDoS has grow to be the weapon of option for multiple types of attackers, from political activists to criminals, and potentially even nation-states," Akamai stated.
.
……..*****All images are copyrighted by their respective authors ……..
.
… marsmet547 photo … Black text on white background …
m.flickr.com/#/photographs/93623724@N08/8677103901/
Thursday, April three, 2014
.
.
.
……………………………………………………………………………………………………………………………………………………………………..
.
……item 1)…. Cyberattacks triple in 2012, Akamai says …
… CNET News … news.cnet.com/ …
China remains the largest culprit, with 41 percent of fourth-quarter observed attack traffic originating in the nation, up from 33 % in the third quarter.
.
……………………
img code photo … Cyberattacks 2012
asset0.cbsistatic.com/cnwk.1d/i/tim/2013/04/23/Akamai_610…
Akamai’s state of the Internet report found that distributed denial of service attacks tripled in 2012.
(Credit: Akamai)
……………………
.
by Shara Tibken April 23, 2013 eight:17 AM PDT
news.cnet.com/8301-1009_three-57580920-83/cyberattacks-triple…
Cyberwarfare incidences jumped sharply in 2012, Akamai mentioned, with the quantity of distributed denial of service attacks far more than tripling from the earlier year.
Akamai, a single of the world’s biggest globally distributed networks, said its buyers reported being targeted by 768 DDoS attacks final year, much more than 3 occasions as a lot of as in 2011. The company’s State of the Web report released Tuesday also located that far more than a third of these attacks targeted the commerce sector, whilst another 20 percent targeted enterprise buyers.
Associated stories:
… Akamai: A third of cyberattacks come from China
… Which states have the greatest broadband?
… How the Spamhaus DDoS attack could have been prevented
"In numerous methods, DDoS has turn out to be the weapon of choice for multiple varieties of attackers, from political activists to criminals, and potentially even nation-states," Akamai said.
Akamai noted that, at this point in time, it really is only counting attacks that were serious enough to need human interaction to combat them. Lower-level attacks, which are mitigated automatically with tiny or no interaction from Akamai or its buyers, are not incorporated in the total.
China remained the largest culprit of cyberattacks, Akamai mentioned. In the fourth quarter alone, 41 percent of observed attack site visitors originated in that country, up from 33 percent in the third quarter. The share of attacks from the U.S. slid slightly to 10 % in the fourth quarter from 13 percent in the third quarter.
"Looking at the complete year, China has clearly had the most variability (and growth) across the leading countries/regions, originating roughly 16 [%] of observed attack traffic throughout the 1st half of 2012, doubling into the third quarter, and increasing additional in the fourth quarter," Akamai stated.
The firm noted it does not have enough insight to explain why the quantity of Chinese attacks soared so a lot.
.
…………………………..
img code photo … Most cyberattacks come from China.
asset2.cbsistatic.com/cnwk.1d/i/tim/2013/04/23/Attack_tra…
Most cyberattacks come from China.
(Credit: Akamai)
…………………………..
.
Meanwhile, Akamai also identified that nearly 700 million distinctive IP addresses connected to its network in the fourth quarter, up 2.4 % sequentially.
It also found that the worldwide typical connection speed elevated five percent sequentially to two.9 Mbps, and the international typical peak connection speed grew 4.6 percent to 16.6 Mbps. Year-more than-year, the peak speed jumped 35 percent.
The boost came even as much more folks accessed the Net by way of mobile devices. Akamai noted that mobile data visitors doubled from the fourth quarter of 2011 to the fourth quarter of 2012, and grew 28 % amongst the third and fourth quarter of 2012.
Subjects:Cybercrime, Safety, Corporate and legal, Vulnerabilities and attacks Tags:Akamai, cyberattack, China, DDoS
.
About Shara Tibken
Shara Tibken is a senior writer for CNET focused on Samsung and other customer tech news. She previously wrote for Dow Jones Newswires and the Wall Street Journal. She’s a native Midwesterner who nonetheless prefers "pop" over "soda."
.
.
.
……………………………………………………………………………………………………………………………………………………………………….
.
…..item 2)…. New class of industrial-scale super-phishing emails threatens biz …
… The Register … www.theregister.co.uk/ …
Bulk messages are very targeted and able to slip previous defences
By John Leyden • Get a lot more from this author
Posted in Security, 4th March 2013 09:31 GMT
Cost-free whitepaper – Hands on with Hyper-V three. and virtual machine movement
www.theregister.co.uk/2013/03/04/longlining_phishing/
Security watchers are warning of a surge of hugely convincing spear-phishing emails sent in bulk.
Far more than 1 in 10 recipients of these so-known as longlining* messages click on links to compromised sites due to the fact the phishing e-mail look utterly plausible, according to cloud-based security services firm Proofpoint.
The combination of tailored emails and mass volume indicates that cyber-criminals can expense-efficiently send ten,000 or even one hundred,000 person spear-phishing messages, all potentially capable of bypassing conventional safety defences. This strategy greatly improves odds of achievement and the capability to exploit zero-day safety vulnerabilities in victims’ PCs, Proofpoint warns.
In contrast to standard mass-mailing phishing lures, the ‘hooks’ (e-mail messages) are highly variable rather than all identical. The body content also contains numerous mutations of an embedded URL, which points to an innocuous site to start with but is then booby-trapped some time after the e mail is sent. Attackers can distribute thousands of e-mail-borne malicious URL ‘hooks’ in a matter of hours, according to Proofpoint.
The firm stated that it has observed, documented and countered dozens of longlining attacks globally more than the final six months. Victims are lured into going to "drive-by downloads" websites that generally exploit browser, PDF and Java safety vulnerabilities to install "rootkits" on vulnerable PCs.
No user action is essential beyond clicking on the emailed URL and going to a malicious website. In a lot of instances program compromises were triggered when staff accessed corporate e-mail accounts from home or on the road and sometimes utilizing mobile devices.
One wave originating from Russia last October included 135,000 emails sent to much more than 80 organizations in a three-hour period. To avoid detection, the attacker utilised around 28,000 distinct IP addresses for its sending agents, 35,000 distinct ‘sender’ aliases, and far more than twenty legitimate sites compromised to host drive-by downloads and zero-day-exploiting malware.
Simply because of the different agents, sender aliases, URLs, topic lines and physique content, no single targeted organisation saw far more than 3 emails with the exact same traits. All these traits meant the attack would fail to register as something more than background noise and stood an superb likelihood of generating it previous classic signature and reputation-based anti-spam defences and secure gateway appliances as a result.
In an additional attack, approximately 28,800 messages were sent in numerous one particular-hour bursts to a lot more than 200 enterprises. The campaign consisted of 813 special compromised URLs sent from 2,181 different sending IPs. Once more, every organization saw no more than 3 messages with identical content.
By utilizing a distributed cloud of previously compromised machines and procedure automation to generate higher variance, attackers have been capable to combine the stealth tactics and malicious payloads of spear-phishing with massively parallel delivery.
"With longlining, cyber-criminals are combining the stealth and effectiveness of spear phishing with the speed and scale of traditional phishing and virus attacks," said David Knight, executive vice president of solution management for Proofpoint.
Proofpoint has published a whitepaper on longline phishing attacks which can be identified here (registration essential). ®
— Bootnote
* Longlining is named following the industrial fishing practice of deploying miles-lengthy fishing lines with thousands of individual hooks.
Free whitepaper – Hands on with Hyper-V three. and virtual machine movement
Read Far more Phishing Email Security Proofpoint
.
.
.
………………………………………………………………………………………………………………………………………………………………………
.
…..item 3a)… WarGames … From Wikipedia, the cost-free encyclopedia …
This post is about the 1983 film. For the 2001 film, see War Game (film). For other makes use of, see War Game (disambiguation).
en.wikipedia.org/wiki/WarGames
WarGames is a 1983 American Cold War science-fiction film written by Lawrence Lasker and Walter F. Parkes and directed by John Badham. The film stars Matthew Broderick, Dabney Coleman, John Wood, and Ally Sheedy.
The film follows David Lightman (Broderick), a young hacker who unwittingly accesses WOPR, a United States military supercomputer programmed to predict possible outcomes of nuclear war. Lightman gets WOPR to run a nuclear war simulation, initially believing it to be a computer game. The simulation causes a national nuclear missile scare and practically begins Planet War III.
The film was a box office accomplishment, costing US million, and grossing ,567,667 following 5 months in the United States and Canada. The film was nominated for 3 Academy Awards. A sequel, WarGames: The Dead Code, was released direct to DVD on July 29, 2008.
.
.
.
……………………………………………………………………………………………………………………………………………………………………..
.
…..item 3b)…. youtube video … That scene from War Games … four:06 minutes …
Launch Code CPE1704TKS
Approach: India Pakistan War – Winner: None
Technique: Mediterranean War – Winner: None
Greeting Professor Falken …
Hello …
A Strange Game. … The Only Winning Move Is Not To Play. …
How About A Good Game Of Chess? …
www.youtube.com/watch?v=NHWjlCaIrQo
Greg Granito
Uploaded on Feb 16, 2007
This is the "lesson" scene from the film War Games. Where we understand that the only way to win in Nuclear War is not to play.
Category
Film & Animation
License
Normal YouTube License
.
WOPR
WOPR (pronounced "Whopper") is a fictional military supercomputer featured in the film WarGames and its sequel. It is an acronym for War Operation Strategy Response. Director John Badham invented the name "WOPR" when he believed the NORAD SIOP (Single Integrated Operational Strategy) was "boring, and told you nothing at all". "WOPR" according to the director plays off of the Whopper hamburger and a fuzzy image of some thing going whop.
— Purpose
W.O.P.R. is a kind of artificial intelligence, programmed to play many technique and war games, including one known as Global Thermonuclear War, the purpose becoming to allow itself to optimally respond to any possible enemy nuclear attack. Unbeknownst to its military users, W.O.P.R. was programmed with a level of sentience by its inventor, and when prompted it responds to the name Joshua, the name of its creator’s deceased son.
In the 2008 direct-to-video sequel WarGames: The Dead Code W.O.P.R. was retired and replaced with R.I.P.L.E.Y., a new artificial intelligence supercomputer. W.O.P.R. was employed to run a hydroelectric dam in Canada but R.I.P.L.E.Y. sent an unmanned predator drone to destroy the old W.O.P.R..
.
.
.
………………………………………………………………………………………………………………………………………………….
.
.
.
.
View from Shanghai Planet Financial Center – IMG_0064-0072_72dpi
Image by kevindean
View [searching south west] from Shanghai Planet Monetary Center Jin Mao Tower –
9 pictures stitched collectively [22.5mp] [327mb functioning file]
any use of this image have to credit kevin dean and direct a hyperlink to: www.betaart.com