http://citp.princeton.edu/memory/
http://blog.wired.com/27bstroke6/2008/0 … s-dis.html
Category: Security Page 3 of 5
Came across something rather strange today. I received my first spam message to my westerfunk.net account after quite a long time. So I decided to check out where it originated from in the mailserver logs. Well it was a Google IP (yes, I ran a WHOIS on the IP to make sure), and the reverse address was hu-out-0506.google.com. Looking into the headers of the email, I observed further down that the originating IP from the spammer to Google’s servers was 87.223.185.13. This IP is in Spain apparently. Could it be spammers are now figuring out a way to use Google to start sending spam now via Google servers? I hope not … here are the [edited] headers.
Apparently, February 10 is their day of action … so they say at least … I’m starting to wonder now if this is a giant marketing campaign for some company?
Allegedly these are hackers, that is, not sure how this has been verified …
Update @ 2:07 pm
Well apparently, they are already working on it … http://www.foxnews.com/story/0,2933,325586,00.html
(Original): http://www.forbes.com/2007/08/22/scada- … print.html
(Archived): http://www.westerfunk.net/archives/secu … 0Backbone/
There are many fronts in which it seems we are falling behind on security. This article highlights the possibility of a nuclear power plant getting hacked with the result being major power outages within the region of the plant that is attacked.
http://www.westerfunk.net/archives/secu … 0Pentagon/
It may be a good idea at this point, unfortunately, to disconnect all government networks from the internet, creating a sort of closed-circuit networked system, maybe creating a trusted and untrusted network? The government has made strides it seems over the past few years to secure its networks and computer systems by not allowing local users to install hardware such as thumb drives (or software on some systems), making users use Firefox to browse the internet instead of IE, utilizing domain level lock downs which make it more difficult for outsiders to even locally penetrate systems at a users workstation (let alone remote attackers), securing their firewalls to not allow certain traffic in or out, and using packet inspection to watch for suspicious activity. However, China seems to always be one step ahead of us, with this as a case in point.
Also:
http://www.westerfunk.net/archives/secu … yberspace/