blog trackingRealtime Web Statistics Japan Archives | Page 2 Of 3 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 2

Posts Tagged ‘Japan’

Marcus Winbush from Texas live in Japan

He’s name is Marcus Winbush he’s from Texas But he is in the navy so live in Japan He said he’s 38 Got device and has a one son…I’m not sure if he is not MR.married or not….but he was acting like a nice guy…and told me to be his GF cuz he is looking […]

View full post on Select From Our Menu

Shunsuke William George Ogura , Shunsuke Ogura, Tokyo, Japan

He gives false résumé on Facebook and lures women to meet in person and will purpose you soon. He will hand you a fake business card saying he is a doctor. He will say that he owns an expensive condo in Azabu area. BUT the truth is he is a scam artist! Read More….

View full post on Select From Our Menu

PSN Latest News – April 23rd Japan BBC Anonymous Sony PS3 Downtime Outage Maintenance

Just a small collection of interesting news updates that I have found on the web. The only news from Sony official is that there is no news at the moment! Please don’t hate guys, I’m just trying to compile the best of what I have found to make your lives a little easier and give […]

View full post on The Cyber Wars

China names Japan and US as top cyberattackers

China is on the receiving end of a growing volume of cyberattacks with Japan and the US the biggest culprits, the country’s National Computer Network Emergency Response Technical Team (CNCERT/CC) has announced.

The number of infected computers it had detected reached 8.9 million in 2011, up from 5 million a year earlier it said, many infected with data-stealing Trojans.

It also said that 10,593 Chinese websites were being “controlled” by 11,851 foreign IP addresses, with a total of 1,116 websites, including 404 Government sites, defaced from outside the country.

Pointedly, the report blamed Japan for 22.8 percent of these attacks, just ahead of the US on 20.4 percent, with South Korea third on 7.1 percent. The other 50 percent of attacks were not broken down.

“This shows that Chinese websites still face a serious problem from being maliciously attacked by foreign hackers or IP addresses,” CNCERT’s Wang Minghua was reported as saying during a news conference.

The very public announcement is a reminder that while China is usually the country being accused of industrial-scale cyberhacking, such activities work in both directions. Attacking other countries eventually brings back the same treatment upon your own systems, or perhaps China has been a victim all along but has simply chosen not to publicise this fact.

The moment cyberwarfare crossed from being a mostly technical worry to a geo-political one was a speech given by in early 2010 by US Secretary of State Hillary Clinton in the aftermath of the notorious Aurora hacking attacks on Google and others.

“In an interconnected world an attack on one nation’s networks can be an attack on all. By reinforcing that message we can create norms of behaviour among states and encourage respect for the global networked commons,” Clinton said, mentioning China by name.

The US had long moaned about Chinese cyberbehaviour but never before had a senior member of a US administration made such uncompromising public remarks. Only two years later, the geo-political is now the dominant filter through which anything ‘cyber’ is first considered – including for the Chinese.

The accusation against Japan is especially significant, coming after a period in which China itself was blamed for an extraordinary sequence of attacks against Japanese defence companies and Government.

Article source:

View full post on National Cyber Security » Computer Hacking

Japan develops malware cyberweapon

The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, according to The Daily Yomiuri.

The virus which was developed by Fujitsu for the Japanese government has the ability to trace cyberattack sources beyond the immediate source to all “springboard” computers used in the transmission of the virus “to a high degree of accuracy” for distributed denial-of-service (DDoS) attacks, the report noted. It can also disable the attack and collect relevant information.

Commenting on the project, Motohiro Tsuchiya, professor at Keio University and a member of a government panel on information security policy, said Japan should increase “anti-cyberattack weapons development” by reconsidering the weapon’s legal definition since other countries have launched similar projects. But Graham Cluley, senior technology consultant at Sophos, doesn’t think it’s a good idea. He says a malware cyberweapon uses resources such as disk space, memory and CPU time, which might lead to unexpected side effects.

For more on this story, read Japan develops malware cyberweapon on ZDNet Asia.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Japan Reportedly Building Vigilante Virus Assassin Squad

Japan reportedly has paid Fujitsu $2.3 million to build a self-replicating assassin squad — a computer virus it can set loose in the network to track down and eliminate other viruses.

Japanese newspaper Yomiuri Shimbun reported that the Defense Ministry’s Technical Research and Development Institute began developing the anti-viral virus in 2008. The government agency in charge of weapons development paid the heavy industries firm $2.3 million (178.5 million Yen) to create a virus that can analyze cyberattacks and even identify their source.

PHOTOS: Top 10 Disruptive Technologies of the Last Century

It sounds like an answer to Stuxnet or Duqu — cyberweapons so potent that one security official called them “the hydrogen bomb of cyberwarfare.â€� And the cyberwar is clearly heating up, said Dave Aitel, president and CEO of security firm Immunity Inc.

“Stuxnet was just the beginning,� Aitel told “Self-replicating code is an important part of any national arsenal … the Japanese are just getting started.�

The cyberdefense tool would be able to trace an attack to its source, the paper reported, along the way disabling it and collecting key information. Such a tool is a clear escalation in online warfare, said Jeff Bardin, chief security strategist for Treadstone 71.


“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation,â€� Bardin told “It ups the ante to a new level that may not be sustainable, especially when — not if — the code for the ‘good’ virus gets out.â€�

He argues that such a tool, while perhaps inevitable, may lead us into full cyberwarfare.

“The most virulent … virtual arms will not be used unless there is either an all out cyberwar raging — or someone wishes to start one.â€�

To that end, defense cybertools are a clear necessity for any nation. But are “good viruses� a good idea? A renegade virus running loose, like a ghost in the machine, may be anything from a far-fetched fantasy to a potentially very, very bad idea, others argue.

“An out-of-control ‘good’ virus could spread randomly or unexpectedly from machine to machine, meaning it may be hard to contain,â€� wrote Graham Cluey, senior technology consultant for security firm Sophos.

BLOG: Finally! Mysterious Cipher Code Cracked

“All programs, including viruses, contain bugs that can have unintended and damaging consequences,” he said.

Aitel disagrees, saying the concept of “anti-viral viruses” has already proved successful in early tests.

“Our firm did some early research on self-replicating attack code which we called ‘Nematodes.’ And we found out that it’s not that hard to do this type of program. It’s possible to develop a controllable and effective worm,” he said.

Indeed, tests of Fujitsu’s defensive cyberweapon run in closed networks in Japan confirmed its functionality, The Yomiuri Shimbun reported.

BLOG: Video Hits a Trillion Frames Per Second

Keio University professor Motohiro Tsuchiya, a member of a government panel on information security policy, told the paper that Japan should accelerate anti-cyberattack weapons development immediately, arguing that other countries have already launched similar projects.

Bardin agreed, arguing that all countries will find themselves forced to respond, either with defensive tools or more aggressive cyberweapons.

“Stuxnet took it to another level,� he told

More from FoxNews/SciTech Cyberbomb That Hit Iran Was 1 of 5 Weapons, Researchers Say Iran Admits Nuclear Sites Hit by ‘Duqu’ Cyberweapon Science Fiction-Style Sabotage a Fear in New Hacks

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Japan testing ‘virus’ cyberdefence weapon, reports say

The Japanese authorities have tested a ‘virus’ cyberweapon capable of tracing and disabling computers being used in cyberattacks against the country, a newspaper in the country has reported.

Quoting anonymous sources said to be connected to the project, The Yomiuri Shimbun said that Japan’s Defense Ministry’s Technical Research and Development Institute began developing the program three years ago in conjunction with Fujitsu, since when it had been tested on a closed network.

What they’ve ended up with sounds like the first of a type of multipurpose program many experts suspect other countries are also developing, namely one capable of quickly identifying the chain of servers and computers being used in different types of cyberattack scenario.

These would include DDoS attacks, those in which a large number of computers are used to attack a company’s or country’s computing infrastructure, but also subtler attacks designed to steal data.

In either case the program is described as being able to disable an attacking resource, which is probably where the trouble starts from a Japanese legal standpoint.

The country has strict laws on producing programs that could be construed as malware let alone wielding them in a cyberwar context that inevitably blurs the distinction between defence and attack.

It is generally assumed that all countries (especially the US and its allies that had previously taken a benign view of the Internet) are developing programs for cyber-defence and offence. These are almost never talked about beyond a few veiled references in speeches by senior politicians.

This has begun to change very slowly in the aftermath of 2010’s Stuxnet affair, a program believed on the basis of circumstantial evidence to have been created with the sole purpose of attacking Iran’s nuclear program.

Japan’s willingness to drop hints about its plans might have something to do with a recent spate of attacks on the country’s Government infrastructure. These include attacks on the country’s defence contractors, its politicians, and leading industrial sectors.

Article source:

View full post on National Cyber Security » Computer Hacking

Japan tasks Fujitsu with creating search-and-destroy cyber-weapon

Zombie boss hunter developed in lab Fujitsu has been commissioned to develop ‘seek and destroy’ malware, reportedly designed to track and disable the sources of cyber-attacks.…

View full post on hacking tools — Yahoo! News Search Results

View full post on National Cyber Security

Japan working on defensive cyberweapon

Japan’s defence ministry is in the process of developing a computer virus capable of tracking, identifying and disabling sources of cyber-attacks, The Yomiuri Shimbun has learned.

The development of the virtual cyberweapon was launched in 2008. Since then, the weapon has been tested in a closed network environment.

Cyberweapons are said to already be in use in countries such as the United States and China. However, in Japan there is no provision on the use of cyberweapons against external parties in existing legislation on foreign attacks. With this in mind, the defence and foreign ministries have begun legislative consideration regarding the matter, according to sources.

The three-year project was launched in fiscal 2008 to research and test network security analysis equipment production. The defence ministry’s Technical Research and Development Institute, which is in charge of weapons development, outsourced the project’s development to a private company. Fujitsu Ltd won the contract to develop the virus, as well as a system to monitor and analyse cyber-attacks for 178.5 million yen (US$2.32 million).

The most distinctive feature of the new virus is its ability to trace cyber-attack sources. It can identify not only the immediate source of attack, but also all “springboard” computers used to transmit the virus.

The virus also has the ability to disable the attacking programme and collect relevant information.

Test runs in closed networks have helped the ministry to confirm the cyberweapon’s functionality and compile data on cyber-attack patterns.

According to the sources, the programme can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers. In DDoS attacks, hackers send target websites enormous volumes of data, eventually forcing them to shut down.

Cyber-attacks, however, were not included in a 2005 cabinet decision outlining the type of attacks against which the right to self-defence can be exercised.

Under the current situation, there is a high possibility that cyberweapons cannot be used against external parties.

The use of the weapon could be considered a violation of the clause banning virus production under the Criminal Code.

Keio University professor Motohiro Tsuchiya, a member of a government panel on information security policy, said Japan should accelerate anti-cyber-attack weapons development by immediately reconsidering the weapon’s legal definition, as other countries have already launched similar projects.

Tsuchiya said the panel also will discuss the issue.

However, a defence ministry official said the ministry is not considering outside applications for the programme as it was developed for more defensive uses, such as identifying which terminal within the Self-Defense Forces was initially targeted in a cyber-attack.

Fujitsu declined to comment about the programme, citing client confidentiality.

Article source:

View full post on National Cyber Security

Japan developing cyber weapon: report

Japan has been developing a virus that could track down the source of a cyber attack and neutralise its programme, the daily Yomiuri Shimbun reported Sunday.

View full post on cyber attack — Yahoo! News Search Results

View full post on National Cyber Security

Page 2 of 3«123»

My Twitter

  • RT @GregoryDEvans: You can discover more about a person in an….
    about 9 hours ago
  • You can discover more about a person in an…. #dating @gregorydevans
    about 9 hours ago
  • Anelisa’s body found #dating @gregorydevans
    about 9 hours ago
  • I canceled my home Internet — and got more connected to the people around me #dating @gregorydevans
    about 9 hours ago
  • No need looking for ‘the perfect’ man — look for 3 #dating @gregorydevans
    about 10 hours ago By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans