Blog Posts Tagged with "IP Address"
June 15, 2012 Added by:gaToMaLo r. amores
In the ToR-.onion network, the client asks to use a website's services, then starts a handshake at a rendezvous point (onion relay) - not at the server/IP. They're never on the site/server when in OnionLand, can’t do a WhoIs and get an IP and cannot find a geo-location. If they can’t find you, they can't hack you...
June 12, 2012 Added by:Headlines
"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."
May 20, 2012 Added by:Theresa Payton
We recently learned Skype has known about a bug that shows your IP address, which can let someone track you and your account down to the city level. How long have they known about it? According to one group - for 18 months. Sometimes online services providers just don’t care...
May 17, 2012 Added by:Electronic Frontier Foundation
At issue is whether the Office of the United States Trade Representative (USTR) had authority to enter into the controversial IP enforcement agreement on behalf of the United States when the Deputy U.S. Trade Ambassador signed ACTA in October 2011...
March 24, 2012 Added by:Dan Dieterle
Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...
March 05, 2012 Added by:J. Oquendo
Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...
January 23, 2012 Added by:Electronic Frontier Foundation
Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...
October 17, 2011 Added by:Craig S Wright
Done correctly, IPv6 can make for extremely secure networks. By using Group Policy and a number of other tools with Linux or Mac it is possible to make a secure mobile network. It is more difficult under IPv4 due to the constraints on the protocol and the nature of DHCP (against DHCPv6)...
August 29, 2011 Added by:J. Oquendo
Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...
August 18, 2011 Added by:J. Oquendo
The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."
June 07, 2011 Added by:Headlines
"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."
April 28, 2011 Added by:Headlines
In an unprecedented move, the Department of Justice has sought a preliminary injunction in U.S. District Court that will allow the agency to issue instructions to systems infected by the Coreflood botnet that will cause the malware to delete itself...
April 11, 2011 Added by:Stefan Fouant
Practical conservation may never be needed given the trillions of addresses available in IPv6, but maybe in the very distant future it could very well be due to some of these recommendations being put in place today. After all, 640K did turn out to be a rather small number didn't it?
April 08, 2011 Added by:Headlines
Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...
March 07, 2011 Added by:Headlines
A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...
February 28, 2011 Added by:Headlines
"Over the next few months, it will become increasingly difficult for mobile and broadband carriers with fast-growing networks to acquire the blocks of contiguous IPv4 address space that they need to build out their networks. Some carriers are predicting massive IPv4 address shortages this year..."
What PCI Requirements Apply to Us: Tacking a... Sarah James on 10-21-2014
Why Are We Failing at Software Security?... Sarah James on 10-21-2014
Join the Security Intelligence Network on Li... Leo nardz on 10-21-2014