{"id":15332,"date":"2014-08-20T14:37:51","date_gmt":"2014-08-20T04:37:51","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15332"},"modified":"2014-09-10T13:00:12","modified_gmt":"2014-09-10T03:00:12","slug":"cyber-wrap-40","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>As tensions rise on the streets of Ferguson, Missouri over the shooting of Michael Brown, activists have taken their protests to the cyber sphere in a variety of ways. News reports<\/a> have linked \u2018hacktivist\u2019 group Anonymous with a distributed denial of service (DDoS) attack on the websites and email servers of the town\u2019s administrators which also took down the IP phone system and left most of the city\u2019s government officials working via text message. The attack was executed following a video post by the group on YouTube that threatened to take down \u2018every web-based asset of your departments and governments offline\u2019. The group also released personal information of members of the Ferguson Police Department.<\/p>\n In his recent speech at the University of Canberra, Major General Stephen Day expressed concerns<\/a> that state governments\u2019 safeguards against computed-based attacks were \u2018patchy and variable\u2019, an issue he associated with a lack of depth in the understanding of the threat at the upper echelons of the state government system. MAJGEN Day, who heads up the Cyber Security Operations Centre in the Australian Signals Directorate, noted that at this level, a change of minister or senior bureaucrat \u2018can have an extraordinary impact on the understanding in a state government in terms of the cyber threat.’<\/p>\n Scientists at the Technische Universitat Munchen (TUM)\u00a0have released software<\/a> that thwarts port-scanning reconnaissance hacks by the Hacienda program used by the \u2018Five Eyes\u2019 intelligence coalition. Researchers responsible for the software claim that their program provides a higher degree of protection than the existing token technology upon which it is based.<\/p>\n US hospital operator Community Health Systems (CHS) believes that<\/a> Chinese hackers successfully accessed the personal\u2014but not medical\u2014data of 4.5 million patients from the past five years. The stolen data included all the information necessary for identity theft and resulted in CHS activating its liability insurance to assist the affected patients protect themselves from this possibility. In April 2014, the FBI warned<\/a> that \u2018the healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors\u2019. The latest hack follows on from attacks targeting the three largest medical device manufacturers in the US, reported earlier in 2014<\/a>.<\/p>\n