Radio Shalom 1650AM, Money and Business Show
Samuel Ezerzer
February, 5, 2013
http://samuelezerzer.blogspot.ca/
“Online Security Threats for Customers and how you can protect yourself from a Cyber Attacks with Adam Sculthorpe, Founder of bitVelocity
(226) 821-4443
http://www.radio-shalom.ca/mp3/Programs/1042/MoneyAndBusiness_OnlineSecurity200213.mp3
listen to radio show archive
Cyber attacks that stole information from 141 targets in the US and other countries have been traced to a Chinese military unit in a drab office building in the outskirts of Shanghai, a US security firm alleged Tuesday.
China dismissed the report as ”groundless.”
The report by the Virginia-based Mandiant Corp. is the most explicit suggestion yet by a Western security company that China’s military might be directly linked to a wave of cyber spying against American and other foreign companies and government agencies.
As well Three US news organizations -- The New York Times, The Wall Street Journal and The Washington Post -- say Chinese hackers have infiltrated their company's computers to track their coverage of China. Some experts say this has been an on-going problem for more than five years.
These cyber attacks are different than most because of the danger to individuals.
These newspapers are not alone. Experts think nearly every media outlet has been attacked -- they either don't know it or don't report it. Hacking hits here, too, at the Voice of America.

picture courtesy by the hackers media
Chinese hackers breached the online defenses of the U.S. Chamber of Commerce last year, accessing information about its 3 million members and stealing thousands of e-mails. It was one of the boldest infiltration ever.
Cyber attacks like this one cost the U.S. economy billions every year.
My name is Samuel Ezerzer, your host to the Money & Business show on Radio Shalom, CJRS 1650 AM. Thank you for tuning in live with our Business studios headquarters in Montreal, the financial capital and the home to the greatest hockey team, the Montreal Canadians. We have another great show for you today and as always, you can call if you have any questions, comments, or criticisms on today's topic. Please call us direct at 514 738 4100 ext 200 or email me at moneyandbusinessshow@gmail.com if you have any inquiries. You can also visit our website athttp://www.radio-shalom.ca/ – all our shows are
archived there
Today’s topic of discussion: “Online Security Threats for Customers of Financial Institutions: Buyer Beware”
biography
BitVelocity
Adam is a visionary leader in the IT security world with a career spanning more than 25 years. Adam’s first experiences in security was with the Royal Anglian Regiment of the British Army as a signals specialist and then went on to build an IT career.
In the late 1990’s Adam became the sole UK distributor of the first PC Firewall developed by Signal9 Solutions in Kanata, Ontario and then went to work for TNT Worldwide as their first security specialist. He then went on to work for Internet Security Systems (ISS) as a senior security consultant providing services to numerous financial, government, military and corporate clients including Goldman Sachs, Bank of America, Citi Bank and The London Stock Exchange.
After leaving ISS Adam worked at UBS investment Bank before relocating to Canada. In 2004 he pioneered click fraud detection software and services solutions and his research and client stories were featured in The New Scientist, The New York Times, The Register and on National TV and Radio. Adam is currently Founder of a start up called bitVelocity where he is developing cloud-based web hosting solutions that improve search ranking. Adam is also developing privacy testing solutions and internet encryption software.
small talk
Adam on the weekend , you went over to fix someonees computer because it was acting weird and they asked me to look at it, they thought they had protection but it turned out that Rogers Online Security?
(had failed them and they had been infected by a trojan keylogger and other nasties for probably around 3 years.)
It's called digital espionage.
Chinese hackers breached the online defenses of the U.S. Chamber of Commerce last year, accessing information about its 3 million members and stealing thousands of e-mails. It was one of the boldest infiltrations ever.
Cyber attacks like this one cost the U.S. economy billions every year. On American Morning this morning, "Popular Mechanics" senior news editor Joe Pappalardo talks about the magazine's cover story on hacks from foreign countries and explains what the possible motivations could be behind these attacks.
American companies
https://www.youtube.com/watch?v=TTIfh-z0Cn4
0.27-0.57---1.18-1.33--1.50-2.14----2.27-2.50----3.13-3.38
continuous please
what are chinese hackers or companies looking for in American companies?
http://www.bbc.co.uk/news/world-asia-china-21502088
The BBC's John Sudworth was detained while filming the reported hub of the hacking operation
Continue reading the main story.
A secretive branch of China's military is probably one of the world's "most prolific cyber espionage groups", a US cyber security firm has said.
BBC reporter Mandiant said Unit 61398 was believed to have "systematically stolen hundreds of terabytes of data" from at least 141 organisations around the world.
The White House said it has taken its concerns about cyber-theft to the highest levels of China's government.
How difficult is it to determine the origin or the source of the cyber attack?
notes
The firm said it had traced the hacking activities of APT1 to the site of 12-storey building in the Pudong area of Shanghai. It said that Unit 61398 of the People's Liberation Army "is also located in precisely the same area" and that the actors had similar "missions, capabilities and resources".
Among the findings about APT1 in the report were that it:
-is staffed by hundreds, possibly thousands, of proficient English speakers with advanced computer security and networking skills
-has hacked into 141 companies across 20 industries, 87% based in English-speaking countries, and is able to steal from dozens of networks simultaneously
-has stolen hundreds of terabytes of information including blueprints, business plans, pricing documents, user credentials, emails and contact lists
-stayed inside hacked networks for an average of 356 days, with the longest lasting 1,764 days
-targeted industries identified by China as strategically important under its Five Year Plan for economic growth
Most hacked or targeted companies are
-information technology
-Aerospace industry
-3rd on the list is public administration ?
-energy
-satellite and telecom
-scientific research
http://www.bbc.co.uk/news/world-us-canada-21510193
0.00-0.44---0.57-1.26----1.44-2.24---2.34-3.21
Mandiate said that there is two possible conclusion
1. that the Chinese government behind these attacks
2. Or they are aware of these attacks
Are they looking the other way specially that china has a controlled infrastructure?
segments
https://www.youtube.com/watch?v=xImFkBSjah0
Anonymous #OpIsrael
Greetings Citizens of the world, this is Anonymous. It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries. November 2012 will be a month to remember for the Israeli defense forces and internet security forces. We will strike any and all websites that we deem to be in Israeli Cyberspace in retaliation for the mistreating of people in Gaza and other areas. Anonymous has been watching you, and you have received fair warning of our intent to seize control of your cyberspace in accordance with basic humanitarian rights of free speech and the right to live. As of 9:00 AM Pacific Standard Time, the number of attacked Israeli websites is approximately 10,000. The further assault on the people of Gaza, people of Palestine or any other group will be treated as a violation of the Anonymous Collectives intent to protect the people of the World. Israel, it is in your best interest to cease and desist any further military action or your consequence will become worse with each passing hour. This is a message from Anonymous Op Israel, Danger Hackers, Anonymous Special Operations and the Anonymous Collective of the entire planet. We will treat each additional death as a personal attack on Anonymous and you will be dealt with swiftly and without warning. Our hearts are with the women, children and families that are suffering at this very moment, as a direct result of the Israeli Governments misuse of its military. Brothers and sisters of Anonymous, we urge you to protest the Israeli Government and any associated hostile forces. Now is the time for anonymous to help the people that are hurting. Help the people that are being taken advantage of. Help the ones that are dying and it will further the collective as a whole and we can help bring a peace within the Gaza region to those people that so desperately need it. We call on the Anonymous Collective to hack, deface, docks, hijack, database leak, admin takeover, four oh four and DNS terminate the Israeli Cyberspace by any means necessary.
To the Israeli Government, Anonymous has grown tired of your bullying, and now you will see the result of your actions. Cyber war has been declared on Israel cyber space and you will see exactly what we are capable of. Israel, the angel of death has been called to your cyberspace. We are Anonymous. We are legion. Expect us and Respect us.
personal online security?
What are the most common reasons online attacks are successful against individuals?
What does the malware / trojan virus typically do?
Are some people more vulnerable than others?
What steps should people take to properly protect themselves?


No comments:
Post a Comment