Friday, March 22, 2013

Hacking highlights dangers to Seoul of North's cyber-warriors

By Ju-min Park

SEOUL (Reuters) - A hacking attack that brought down three South Korean broadcasters and two major banks has been identified by most commentators as North Korea flexing its muscles as military tensions on the divided peninsula sky-rocket.

Officials in Seoul traced Wednesday's breach to a server in China, a country that has been used by North Korean hackers in the past. That reinforces the vulnerability of South Korea, the world's most wired economy, to unconventional warfare.

China's Foreign Ministry said that hacking attacks were a "global problem", anonymous and cross-border.

"Hackers often use the IP addresses of other countries to carry out their attacks," ministry spokesman Hong Lei told reporters.

One government official in Seoul directly blamed Pyongyang, although police and the country's computer crime agency said it would take months to firmly establish responsibility.

Jang Se-yul, a former North Korean soldier who went to a military college in Pyongyang to groom hackers and who defected to the South in 2008, estimates the North has some 3,000 troops, including 600 professional hackers, in its cyber-unit.

Jang's alma mater, the Mirim University, is now called the University of Automation. It was set up in the late 1980s to help North Korea's military automation and has a special class in professional hacking.

The North's professional "cyber-warriors" enjoy perks such as luxury apartments for their role in what Pyongyang has defined as a new front in its "war" against the South, Jang told Reuters.

"I don't think they will stop at a temporary malfunction. North Korea can easily bring down another country in a cyber-warfare attack," Jang said.

Like much about North Korea, its true cyber capabilities are hard to determine. The vast majority of North Koreans have no access to the Internet or own a computer, a policy the regime of Kim Jong-un strictly enforces to limit outside influence.

The nominee to be the next South Korean intelligence chief told MPs recently the North was suspected of being behind most of the 70,000 cyber-attacks on the country's public institutions over the past five years, local TV channel YTN reported.

North Korea recently threatened the United States with a nuclear attack and said it would bomb South Korea in response to what it says are "hostile" war games in the South by Washington and Seoul.

Threats to bomb the mainland United States are empty rhetoric as Pyongyang does not have the capacity to do so and its outdated armed forces would lose any all-out war with South Korea and Washington, military experts say.

That makes hacking an attractive, and cheaper, option.

"North Korea can't invest in fighter jets or warships, but they have put all their resources into raising hackers. Qualified talent matters to cyber warfare, not technology," said Lee Dong-hoon, an information security expert at Korea University in Seoul.

However much of North Korea's limited funds go into its nuclear and ballistic missile programs.

LIMITED ATTACK

Wednesday's attack hit the network servers of television broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank. South Korea's military raised its alert levels in response.

About 32,000 computers at the organizations were affected, according to the South's state-run Korea Internet Security Agency, adding it would take up to five days to fully restore their functions.

It took the banks hours to restore banking services. Damage to the servers of the TV networks was believed to be more severe, although broadcasts were not affected.

South Korea's military, its core power infrastructure and ports and airports were unaffected.

Investigations of past hacking of South Korean organizations have led to Pyongyang.

"There can be many inferences based on the fact that the IP address is based in China," said the South Korean communication commission's head of network policy, Park Jae-moon. "We've left open all possibilities and are trying to identify the hackers."

North Korea has in the past targeted South Korea's conservative newspapers, banks and government institutions.

The biggest hacking effort attributed to Pyongyang was a 10-day denial of service attack in 2011 that antivirus firm McAfee, part of Intel Corp, dubbed "Ten Days of Rain". It said that attack was a bid to probe the South's computer defenses in the event of a real conflict.

However, the hacking attack on Wednesday doesn't appear to be state sponsored, security vendor Sophos said, noting the malicious software it detected was not sophisticated.

"It's hard to jump to the immediate conclusion that this was necessarily evidence of a cyber-warfare attack coming from North Korea," said Graham Cluley, senior technology consultant at Sophos.

North Korea last week said it had been a victim of cyber-attacks, blaming the United States and threatening retaliation.

"North Korea is able to carry out much bigger attacks than this incident such as stopping broadcasts or erasing all financial data that could panic South Korea," Lee of Korea University said.

(Additional reporting by Jack Kim, Narae Kim, Hyunjoo Jin, Joyce Lee, Se Young Lee in Seoul and Ben Blanchard in Beijing; Editing by David Chance and Nick Macfie)

Source: http://news.yahoo.com/cyber-attack-south-korea-originated-chinese-ip-regulator-012915599--sector.html

beverly hilton hotel whitney houston found dead

Thursday, March 14, 2013

BitTorrent Live now in open beta, brings live webcasting to the masses

BitTorrent Live now in open beta, brings live webcasting to the internet masses

Last November, BitTorrent put out a call to all "qualified broadcasters," seeking to build out a solid based for Live, its new P2P streaming protocol. Now, just four months later, the company's opening the beta service up to all users, giving a real-time platform to anyone with a webcam, a pulse and a broadcasting dream. The live streaming service works mainly the same way traditional BitTorrent does, utilizing BitTorrent clients throughout its user base to deliver a more solid and "resilient... stream." Effectively, the more people sign up for BitTorrent's virtual soapbox, the better quality your broadcast will be. So, if you've got a decent internet connection and a burning urge to express yourself, hit up the source and start sharing live.

Filed under: ,

Comments

Via: The Next Web

Source: The Official BitTorrent Blog, BitTorrent Live

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/kzeynJDE9Sg/

soul train don cornelius rod parsley barry sanders jr

Wednesday, March 13, 2013

How To Come Across The Best Voip Softphone | CrazyRawstar.com

Posted by Olha9d59s on March 13th, 2013 04:22 AM | business??

Your ads will be inserted here by

Easy Ads.

Please go to the plugin admin page to paste your ad code.

Communications: Cell Cell Cellphone Sms Article Group
Ideal on line courting websites in the usa and Canada has turn into a person of the most popular approaches of link with new individuals not only regionally but also from across the nation.
apply for a loan Fushun Wang, who life continue to have to pack the residence each and every time the teacher looked at drawers 6 abandoned mobile telephones, ten waste batteries and storage room piled in the outdated personal computer, keyboard, speakers on the fret. Talking of the e-waste, Wang appeared pretty helpless, she married 10 many years, and her spouse two or a few yrs for an typical mobile cellphone, out of a number of outdated mobile phones, batteries, chargers and other accessories. Wang is training chemistry, recognize that everyday toss e-squander hurt to the natural environment, she experimented with to obtain a put recycling of digital squander has never been observed, had to place matters in a drawer.
The phone is also equipped with a 1200 mAh impressive battery which allows customers to communicate for extended hours. The smartphone is by now available in Europe for pre-orders but it has not been released here. It is anticipated to start in India shortly. The estimated Samsung Galaxy Mini 2 in India wiil be hugely cost-effective. The Samsung Galaxy Mini two in India additional maximizing Samsung?s marketplace share in the reasonably priced smartphone group.
The famous English thinker, scientist, statesman, writer and jurist, Francis Bacon Senior experienced reported, ?We cannot command Character besides by obeying her.? That was four hundred yrs ago. No one doubts about his statesmanship or the scientific eyesight. But did he perceive the humiliation that the nature was going to experience in moments to appear?
cash advance With all the boxes ticked, approval can be offered in a couple of hrs. And with checking account information presented, the cash can be transferred within just a couple hrs also. That implies, inside of twelve hrs, a cash advance mortgage can be accessible, and the emergency dealt with.
Hold your responses quick, and enunciate your words very carefully. When other folks can only hear your voice, they cannot choose up on your physique language, but smile when you happen to be talking to increase a good tone to your speech. Numerous people think you must remain targeted by standing up through the interview. You may possibly be questioned to elaborate on some of your answers, so make certain that you can. A single phone call can make or split your job as a business analyst.
Even though a reverse mobile phone lookup is useful to you, you do have to know which services to make use of before you perform a look for. In the function you do a rapid research on-line, you may possibly locate some free of charge reverse cell phone lookup directories or products and services. They are fully worthless with regards to on the lookout for numbers other than landline figures. You might get practically nothing out of them as soon as you call for mobile telephone numbers or other unlisted quantities. You will find as a end result a higher probability that you merely will not track down what you?re striving to obtain.

Your ads will be inserted here by

Easy Ads.

Please go to the plugin admin page to paste your ad code.


additional reading Cell telephones may perhaps also distribute infectious disorder. Just one research discovered that pathogenic micro organism had been existing in some sufferers as properly as the medical center employees.
Most of them have paved and very well-maintained streets. But you should also be mindful about the threats of such amenities.

Your ads will be inserted here by

Easy Ads.

Please go to the plugin admin page to paste your ad code.

Source: http://crazyrawstar.com/how-to-come-across-the-best-voip-softphone/

21 jump street illinois primary results acapulco mexico hines ward robert deniro mexico news the talented mr ripley

Thursday, March 7, 2013

Five highly recommended sessions on brain, health, wellness, big ...

Neuroplasticity and Brain Health Talks

Thank you to the 118 sharp minds who have already ordered their $15 tick?ets to cel?e?brate Brain Aware?ness Week by watch?ing the lat?est on neu?ro?plas?tic?ity, brain health and inno?va?tion. We need many?more well-informed ambas?sadors of brain health and cog?ni?tive fit?ness, and are proud to expand the con?ver?sa?tion that took place at the 2012 Sharp?Brains Vir?tual Sum?mit.

Among all the online pre?sen?ta?tions now avail?able (check out full Sum?mit Agenda), let me share the five that impressed me the most. Each one pro?vides an excel?lent entry point into the wealth of infor?ma?tion and insights shared by 40+ speak?ers, so you can select the one most rel?e?vant to your inter?ests, and start watch?ing there. (If you don?t have your pass yet, click here?to order?one).

  • How will Health incor?po?rate Brain??What will it take for the brain to receive as much atten?tion and proac?tive care as the heart does, both as a key organ on its own and as a key enabler of health.
  • How Nation?wide Insur?ance rolled-out a Brain-based Cor?po?rate Well?ness Ini?tia?tive.?An in-depth case study out?lin?ing busi?ness ratio?nale, ven?dor selec?tion, pilot test and roll-out, and return-on-investment.
  • How will the era of Big Data and Global Vir?tual Access trans?form brain health??What are the oppor?tu?ni?ties and chal?lenges to improve stan?dards of brain and men?tal health care in light of emerg?ing?dig?i?tal tools and global access to exper?tise and inte?grated data?bases that enable detec?tion and long-term mon?i?tor?ing through analy?sis of vari?a?tions in genet?ics, brain struc?ture, brain func?tion, and behavior?
  • What paths to mar?ket and busi?ness mod?els will enable the com?mer?cial?iza?tion of research-based inno?va?tion??Three inno?va?tors with com?bined research + busi?ness ?hats? will dis?cuss their respec?tive paths to mar?ket, includ?ing technology/ con?tent licens?ing, strate?gic con?tracts and grants, and ven?ture capital.
  • How to Set Up a Brain Fit?ness Cen?ter to Enhance?Cog?ni?tive Retrain?ing and?Reha?bil?i?ta?tion. Learn the?nuts and bolts of open?ing a rehab-oriented ?brain fit?ness cen?ter?, includ?ing staffing, mea?sure?ment of behavioral/ cog?ni?tive out?comes, selec?tion and roll?out of inter?ven?tions, and inte?gra?tion of center-based with home-based use. Learn the obsta?cles and tips for repli?cat?ing such a cen?ter in a satel?lite location.

?> You can?ORDER A $15 PASS NOW?(reg?u?lar price is $295). Pass hold?ers receive two-month log-in access to the online pre?sen?ta?tions, begin?ning on March 11th.

?

Source: http://www.sharpbrains.com/blog/2013/03/06/five-highly-recommended-sessions-on-brain-health-wellness-big-data-and-brain-fitness-centers/?utm_source=rss&utm_medium=rss&utm_campaign=five-highly-recommended-sessions-on-brain-health-wellness-big-data-and-brain-fitness-centers

Psalm 91