blog trackingRealtime Web Statistics Japan Archives | Page 2 Of 3 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 2

Posts Tagged ‘Japan’

Japan Says to Hackers, Kick us as Hard as you can in Cyber security drill before Olympics
 Japan plans to gather 50+ cyber security experts at emergency response center in Tokyo and minimum 150 security experts outside the emergency response center to defend against a simulated attacked on japan’s 21 state ministries and agencies along with 10 industry associates, said Ikuo Misumi, a hacking expert at Japan’s state-run National Information Security Centre.
Cabinet Minister in charge of IT policy Mr. Ichita Yamamoto said “”It’s not that we haven’t put effort into cybersecurity, but we are certainly behind the U.S.,”

Japan’s cyber security is managed by National Police Agency and four ministries, including those for defense and industry.
Tuesday’s drill is the first time that Japan has worked together across government and business to counter the threat of hackers, Misumi said.

The test will help break down various “silos that currently exist in Japan”, said William Saito, a U.S.-born tech entrepreneur recruited to advise the government.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Volunteers Crowdsource Radiation Monitoring to Map Potential Risk on Every Street in Japan

Volunteers Crowdsource Radiation Monitoring to Map Potential Risk on Every Street in Japan: Safecast is a network of volunteers who came together to map radiation levels throughout Japan after the Fukushima Diiachi nuclear power plant disaster in 2011. View full post on Your Anon News Read More….

View full post on The Cyber Wars

Marcus Winbush from Texas live in Japan

He’s name is Marcus Winbush he’s from Texas But he is in the navy so live in Japan He said he’s 38 Got device and has a one son…I’m not sure if he is not MR.married or not….but he was acting like a nice guy…and told me to be his GF cuz he is looking […]

View full post on Select From Our Menu

Shunsuke William George Ogura , Shunsuke Ogura, Tokyo, Japan

He gives false résumé on Facebook and lures women to meet in person and will purpose you soon. He will hand you a fake business card saying he is a doctor. He will say that he owns an expensive condo in Azabu area. BUT the truth is he is a scam artist! Read More….

View full post on Select From Our Menu

PSN Latest News – April 23rd Japan BBC Anonymous Sony PS3 Downtime Outage Maintenance

Just a small collection of interesting news updates that I have found on the web. The only news from Sony official is that there is no news at the moment! Please don’t hate guys, I’m just trying to compile the best of what I have found to make your lives a little easier and give […]

View full post on The Cyber Wars

China names Japan and US as top cyberattackers

China is on the receiving end of a growing volume of cyberattacks with Japan and the US the biggest culprits, the country’s National Computer Network Emergency Response Technical Team (CNCERT/CC) has announced.

The number of infected computers it had detected reached 8.9 million in 2011, up from 5 million a year earlier it said, many infected with data-stealing Trojans.

It also said that 10,593 Chinese websites were being “controlled” by 11,851 foreign IP addresses, with a total of 1,116 websites, including 404 Government sites, defaced from outside the country.

Pointedly, the report blamed Japan for 22.8 percent of these attacks, just ahead of the US on 20.4 percent, with South Korea third on 7.1 percent. The other 50 percent of attacks were not broken down.

“This shows that Chinese websites still face a serious problem from being maliciously attacked by foreign hackers or IP addresses,” CNCERT’s Wang Minghua was reported as saying during a news conference.

The very public announcement is a reminder that while China is usually the country being accused of industrial-scale cyberhacking, such activities work in both directions. Attacking other countries eventually brings back the same treatment upon your own systems, or perhaps China has been a victim all along but has simply chosen not to publicise this fact.

The moment cyberwarfare crossed from being a mostly technical worry to a geo-political one was a speech given by in early 2010 by US Secretary of State Hillary Clinton in the aftermath of the notorious Aurora hacking attacks on Google and others.

“In an interconnected world an attack on one nation’s networks can be an attack on all. By reinforcing that message we can create norms of behaviour among states and encourage respect for the global networked commons,” Clinton said, mentioning China by name.

The US had long moaned about Chinese cyberbehaviour but never before had a senior member of a US administration made such uncompromising public remarks. Only two years later, the geo-political is now the dominant filter through which anything ‘cyber’ is first considered – including for the Chinese.

The accusation against Japan is especially significant, coming after a period in which China itself was blamed for an extraordinary sequence of attacks against Japanese defence companies and Government.

Article source:

View full post on National Cyber Security » Computer Hacking

Japan develops malware cyberweapon

The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, according to The Daily Yomiuri.

The virus which was developed by Fujitsu for the Japanese government has the ability to trace cyberattack sources beyond the immediate source to all “springboard” computers used in the transmission of the virus “to a high degree of accuracy” for distributed denial-of-service (DDoS) attacks, the report noted. It can also disable the attack and collect relevant information.

Commenting on the project, Motohiro Tsuchiya, professor at Keio University and a member of a government panel on information security policy, said Japan should increase “anti-cyberattack weapons development” by reconsidering the weapon’s legal definition since other countries have launched similar projects. But Graham Cluley, senior technology consultant at Sophos, doesn’t think it’s a good idea. He says a malware cyberweapon uses resources such as disk space, memory and CPU time, which might lead to unexpected side effects.

For more on this story, read Japan develops malware cyberweapon on ZDNet Asia.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Japan Reportedly Building Vigilante Virus Assassin Squad

Japan reportedly has paid Fujitsu $2.3 million to build a self-replicating assassin squad — a computer virus it can set loose in the network to track down and eliminate other viruses.

Japanese newspaper Yomiuri Shimbun reported that the Defense Ministry’s Technical Research and Development Institute began developing the anti-viral virus in 2008. The government agency in charge of weapons development paid the heavy industries firm $2.3 million (178.5 million Yen) to create a virus that can analyze cyberattacks and even identify their source.

PHOTOS: Top 10 Disruptive Technologies of the Last Century

It sounds like an answer to Stuxnet or Duqu — cyberweapons so potent that one security official called them “the hydrogen bomb of cyberwarfare.â€� And the cyberwar is clearly heating up, said Dave Aitel, president and CEO of security firm Immunity Inc.

“Stuxnet was just the beginning,� Aitel told “Self-replicating code is an important part of any national arsenal … the Japanese are just getting started.�

The cyberdefense tool would be able to trace an attack to its source, the paper reported, along the way disabling it and collecting key information. Such a tool is a clear escalation in online warfare, said Jeff Bardin, chief security strategist for Treadstone 71.


“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation,â€� Bardin told “It ups the ante to a new level that may not be sustainable, especially when — not if — the code for the ‘good’ virus gets out.â€�

He argues that such a tool, while perhaps inevitable, may lead us into full cyberwarfare.

“The most virulent … virtual arms will not be used unless there is either an all out cyberwar raging — or someone wishes to start one.â€�

To that end, defense cybertools are a clear necessity for any nation. But are “good viruses� a good idea? A renegade virus running loose, like a ghost in the machine, may be anything from a far-fetched fantasy to a potentially very, very bad idea, others argue.

“An out-of-control ‘good’ virus could spread randomly or unexpectedly from machine to machine, meaning it may be hard to contain,â€� wrote Graham Cluey, senior technology consultant for security firm Sophos.

BLOG: Finally! Mysterious Cipher Code Cracked

“All programs, including viruses, contain bugs that can have unintended and damaging consequences,” he said.

Aitel disagrees, saying the concept of “anti-viral viruses” has already proved successful in early tests.

“Our firm did some early research on self-replicating attack code which we called ‘Nematodes.’ And we found out that it’s not that hard to do this type of program. It’s possible to develop a controllable and effective worm,” he said.

Indeed, tests of Fujitsu’s defensive cyberweapon run in closed networks in Japan confirmed its functionality, The Yomiuri Shimbun reported.

BLOG: Video Hits a Trillion Frames Per Second

Keio University professor Motohiro Tsuchiya, a member of a government panel on information security policy, told the paper that Japan should accelerate anti-cyberattack weapons development immediately, arguing that other countries have already launched similar projects.

Bardin agreed, arguing that all countries will find themselves forced to respond, either with defensive tools or more aggressive cyberweapons.

“Stuxnet took it to another level,� he told

More from FoxNews/SciTech Cyberbomb That Hit Iran Was 1 of 5 Weapons, Researchers Say Iran Admits Nuclear Sites Hit by ‘Duqu’ Cyberweapon Science Fiction-Style Sabotage a Fear in New Hacks

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Japan testing ‘virus’ cyberdefence weapon, reports say

The Japanese authorities have tested a ‘virus’ cyberweapon capable of tracing and disabling computers being used in cyberattacks against the country, a newspaper in the country has reported.

Quoting anonymous sources said to be connected to the project, The Yomiuri Shimbun said that Japan’s Defense Ministry’s Technical Research and Development Institute began developing the program three years ago in conjunction with Fujitsu, since when it had been tested on a closed network.

What they’ve ended up with sounds like the first of a type of multipurpose program many experts suspect other countries are also developing, namely one capable of quickly identifying the chain of servers and computers being used in different types of cyberattack scenario.

These would include DDoS attacks, those in which a large number of computers are used to attack a company’s or country’s computing infrastructure, but also subtler attacks designed to steal data.

In either case the program is described as being able to disable an attacking resource, which is probably where the trouble starts from a Japanese legal standpoint.

The country has strict laws on producing programs that could be construed as malware let alone wielding them in a cyberwar context that inevitably blurs the distinction between defence and attack.

It is generally assumed that all countries (especially the US and its allies that had previously taken a benign view of the Internet) are developing programs for cyber-defence and offence. These are almost never talked about beyond a few veiled references in speeches by senior politicians.

This has begun to change very slowly in the aftermath of 2010’s Stuxnet affair, a program believed on the basis of circumstantial evidence to have been created with the sole purpose of attacking Iran’s nuclear program.

Japan’s willingness to drop hints about its plans might have something to do with a recent spate of attacks on the country’s Government infrastructure. These include attacks on the country’s defence contractors, its politicians, and leading industrial sectors.

Article source:

View full post on National Cyber Security » Computer Hacking

Japan tasks Fujitsu with creating search-and-destroy cyber-weapon

Zombie boss hunter developed in lab Fujitsu has been commissioned to develop ‘seek and destroy’ malware, reportedly designed to track and disable the sources of cyber-attacks.…

View full post on hacking tools — Yahoo! News Search Results

View full post on National Cyber Security

Page 2 of 3«123»

My Twitter

  • RT @GregoryDEvans: NCC Group buys US cyber security firm for up to $18.75m
    about 26 mins ago
  • RT @GregoryDEvans: No Room for Heroes and Rock Stars in Education – Leadership 360 – Education Week
    about 58 mins ago
  • RT @GregoryDEvans: No Room for Heroes and Rock Stars in Education – Leadership 360 – Education Week #security #hack…
    about 1 hour ago
  • RT @GregoryDEvans: Cyber Incident Response Analyst / Security Watch Officer 3/4 #security #hacker #HTCS
    about 6 hours ago
  • RT @GregoryDEvans: Cyber Incident Response Analyst / Security Watch Officer 3/4
    about 6 hours ago By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans