blog trackingRealtime Web Statistics Japan Archives - Page 2 Of 3 - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 2

Posts Tagged ‘Japan’

PSN Latest News – April 23rd Japan BBC Anonymous Sony PS3 Downtime Outage Maintenance

Just a small collection of interesting news updates that I have found on the web. The only news from Sony official is that there is no news at the moment! Please don’t hate guys, I’m just trying to compile the best of what I have found to make your lives a little easier and give […]

View full post on The Cyber Wars

China names Japan and US as top cyberattackers

China is on the receiving end of a growing volume of cyberattacks with Japan and the US the biggest culprits, the country’s National Computer Network Emergency Response Technical Team (CNCERT/CC) has announced.

The number of infected computers it had detected reached 8.9 million in 2011, up from 5 million a year earlier it said, many infected with data-stealing Trojans.

It also said that 10,593 Chinese websites were being “controlled” by 11,851 foreign IP addresses, with a total of 1,116 websites, including 404 Government sites, defaced from outside the country.

Pointedly, the report blamed Japan for 22.8 percent of these attacks, just ahead of the US on 20.4 percent, with South Korea third on 7.1 percent. The other 50 percent of attacks were not broken down.

“This shows that Chinese websites still face a serious problem from being maliciously attacked by foreign hackers or IP addresses,” CNCERT’s Wang Minghua was reported as saying during a news conference.

The very public announcement is a reminder that while China is usually the country being accused of industrial-scale cyberhacking, such activities work in both directions. Attacking other countries eventually brings back the same treatment upon your own systems, or perhaps China has been a victim all along but has simply chosen not to publicise this fact.

The moment cyberwarfare crossed from being a mostly technical worry to a geo-political one was a speech given by in early 2010 by US Secretary of State Hillary Clinton in the aftermath of the notorious Aurora hacking attacks on Google and others.

“In an interconnected world an attack on one nation’s networks can be an attack on all. By reinforcing that message we can create norms of behaviour among states and encourage respect for the global networked commons,” Clinton said, mentioning China by name.

The US had long moaned about Chinese cyberbehaviour but never before had a senior member of a US administration made such uncompromising public remarks. Only two years later, the geo-political is now the dominant filter through which anything ‘cyber’ is first considered – including for the Chinese.

The accusation against Japan is especially significant, coming after a period in which China itself was blamed for an extraordinary sequence of attacks against Japanese defence companies and Government.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1da5b99a/l/0Lnews0Btechworld0N0Csecurity0C33459990Cchina0Enames0Ejapan0Eus0Eas0Etop0Ecyberattackers0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

Japan develops malware cyberweapon

The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, according to The Daily Yomiuri.

The virus which was developed by Fujitsu for the Japanese government has the ability to trace cyberattack sources beyond the immediate source to all “springboard” computers used in the transmission of the virus “to a high degree of accuracy” for distributed denial-of-service (DDoS) attacks, the report noted. It can also disable the attack and collect relevant information.

Commenting on the project, Motohiro Tsuchiya, professor at Keio University and a member of a government panel on information security policy, said Japan should increase “anti-cyberattack weapons development” by reconsidering the weapon’s legal definition since other countries have launched similar projects. But Graham Cluley, senior technology consultant at Sophos, doesn’t think it’s a good idea. He says a malware cyberweapon uses resources such as disk space, memory and CPU time, which might lead to unexpected side effects.

For more on this story, read Japan develops malware cyberweapon on ZDNet Asia.

Article source: http://www.zdnet.com/news/japan-develops-malware-cyberweapon/6335855

View full post on National Cyber Security » Virus/Malware/Worms

Japan Reportedly Building Vigilante Virus Assassin Squad

Japan reportedly has paid Fujitsu $2.3 million to build a self-replicating assassin squad — a computer virus it can set loose in the network to track down and eliminate other viruses.

Japanese newspaper Yomiuri Shimbun reported that the Defense Ministry’s Technical Research and Development Institute began developing the anti-viral virus in 2008. The government agency in charge of weapons development paid the heavy industries firm $2.3 million (178.5 million Yen) to create a virus that can analyze cyberattacks and even identify their source.

PHOTOS: Top 10 Disruptive Technologies of the Last Century

It sounds like an answer to Stuxnet or Duqu — cyberweapons so potent that one security official called them “the hydrogen bomb of cyberwarfare.â€� And the cyberwar is clearly heating up, said Dave Aitel, president and CEO of security firm Immunity Inc.

“Stuxnet was just the beginning,� Aitel told FoxNews.com. “Self-replicating code is an important part of any national arsenal … the Japanese are just getting started.�

The cyberdefense tool would be able to trace an attack to its source, the paper reported, along the way disabling it and collecting key information. Such a tool is a clear escalation in online warfare, said Jeff Bardin, chief security strategist for Treadstone 71.


DNEWS VIDEO: COOL JOBS: HACKER

“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation,â€� Bardin told FoxNews.com. “It ups the ante to a new level that may not be sustainable, especially when — not if — the code for the ‘good’ virus gets out.â€�

He argues that such a tool, while perhaps inevitable, may lead us into full cyberwarfare.

“The most virulent … virtual arms will not be used unless there is either an all out cyberwar raging — or someone wishes to start one.â€�

To that end, defense cybertools are a clear necessity for any nation. But are “good viruses� a good idea? A renegade virus running loose, like a ghost in the machine, may be anything from a far-fetched fantasy to a potentially very, very bad idea, others argue.

“An out-of-control ‘good’ virus could spread randomly or unexpectedly from machine to machine, meaning it may be hard to contain,â€� wrote Graham Cluey, senior technology consultant for security firm Sophos.

BLOG: Finally! Mysterious Cipher Code Cracked

“All programs, including viruses, contain bugs that can have unintended and damaging consequences,” he said.

Aitel disagrees, saying the concept of “anti-viral viruses” has already proved successful in early tests.

“Our firm did some early research on self-replicating attack code which we called ‘Nematodes.’ And we found out that it’s not that hard to do this type of program. It’s possible to develop a controllable and effective worm,” he said.

Indeed, tests of Fujitsu’s defensive cyberweapon run in closed networks in Japan confirmed its functionality, The Yomiuri Shimbun reported.

BLOG: Video Hits a Trillion Frames Per Second

Keio University professor Motohiro Tsuchiya, a member of a government panel on information security policy, told the paper that Japan should accelerate anti-cyberattack weapons development immediately, arguing that other countries have already launched similar projects.

Bardin agreed, arguing that all countries will find themselves forced to respond, either with defensive tools or more aggressive cyberweapons.

“Stuxnet took it to another level,� he told FoxNews.com.

More from FoxNews/SciTech

FoxNews.com/SciTech: Cyberbomb That Hit Iran Was 1 of 5 Weapons, Researchers Say

FoxNews.com/SciTech: Iran Admits Nuclear Sites Hit by ‘Duqu’ Cyberweapon

FoxNews.com/SciTech: Science Fiction-Style Sabotage a Fear in New Hacks

Article source: http://news.discovery.com/tech/japan-vigilante-virus-120104.html

View full post on National Cyber Security » Virus/Malware/Worms

Japan testing ‘virus’ cyberdefence weapon, reports say

The Japanese authorities have tested a ‘virus’ cyberweapon capable of tracing and disabling computers being used in cyberattacks against the country, a newspaper in the country has reported.

Quoting anonymous sources said to be connected to the project, The Yomiuri Shimbun said that Japan’s Defense Ministry’s Technical Research and Development Institute began developing the program three years ago in conjunction with Fujitsu, since when it had been tested on a closed network.

What they’ve ended up with sounds like the first of a type of multipurpose program many experts suspect other countries are also developing, namely one capable of quickly identifying the chain of servers and computers being used in different types of cyberattack scenario.

These would include DDoS attacks, those in which a large number of computers are used to attack a company’s or country’s computing infrastructure, but also subtler attacks designed to steal data.

In either case the program is described as being able to disable an attacking resource, which is probably where the trouble starts from a Japanese legal standpoint.

The country has strict laws on producing programs that could be construed as malware let alone wielding them in a cyberwar context that inevitably blurs the distinction between defence and attack.

It is generally assumed that all countries (especially the US and its allies that had previously taken a benign view of the Internet) are developing programs for cyber-defence and offence. These are almost never talked about beyond a few veiled references in speeches by senior politicians.

This has begun to change very slowly in the aftermath of 2010’s Stuxnet affair, a program believed on the basis of circumstantial evidence to have been created with the sole purpose of attacking Iran’s nuclear program.

Japan’s willingness to drop hints about its plans might have something to do with a recent spate of attacks on the country’s Government infrastructure. These include attacks on the country’s defence contractors, its politicians, and leading industrial sectors.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1b7d62d6/l/0Lnews0Btechworld0N0Csecurity0C33275480Cjapan0Etesting0Evirus0Ecyberdefence0Eweapon0Ereports0Esay0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

Japan tasks Fujitsu with creating search-and-destroy cyber-weapon

Zombie boss hunter developed in lab Fujitsu has been commissioned to develop ‘seek and destroy’ malware, reportedly designed to track and disable the sources of cyber-attacks.…

View full post on hacking tools — Yahoo! News Search Results

View full post on National Cyber Security

Japan working on defensive cyberweapon

Japan’s defence ministry is in the process of developing a computer virus capable of tracking, identifying and disabling sources of cyber-attacks, The Yomiuri Shimbun has learned.

The development of the virtual cyberweapon was launched in 2008. Since then, the weapon has been tested in a closed network environment.

Cyberweapons are said to already be in use in countries such as the United States and China. However, in Japan there is no provision on the use of cyberweapons against external parties in existing legislation on foreign attacks. With this in mind, the defence and foreign ministries have begun legislative consideration regarding the matter, according to sources.

The three-year project was launched in fiscal 2008 to research and test network security analysis equipment production. The defence ministry’s Technical Research and Development Institute, which is in charge of weapons development, outsourced the project’s development to a private company. Fujitsu Ltd won the contract to develop the virus, as well as a system to monitor and analyse cyber-attacks for 178.5 million yen (US$2.32 million).

The most distinctive feature of the new virus is its ability to trace cyber-attack sources. It can identify not only the immediate source of attack, but also all “springboard” computers used to transmit the virus.

The virus also has the ability to disable the attacking programme and collect relevant information.

Test runs in closed networks have helped the ministry to confirm the cyberweapon’s functionality and compile data on cyber-attack patterns.

According to the sources, the programme can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers. In DDoS attacks, hackers send target websites enormous volumes of data, eventually forcing them to shut down.

Cyber-attacks, however, were not included in a 2005 cabinet decision outlining the type of attacks against which the right to self-defence can be exercised.

Under the current situation, there is a high possibility that cyberweapons cannot be used against external parties.

The use of the weapon could be considered a violation of the clause banning virus production under the Criminal Code.

Keio University professor Motohiro Tsuchiya, a member of a government panel on information security policy, said Japan should accelerate anti-cyber-attack weapons development by immediately reconsidering the weapon’s legal definition, as other countries have already launched similar projects.

Tsuchiya said the panel also will discuss the issue.

However, a defence ministry official said the ministry is not considering outside applications for the programme as it was developed for more defensive uses, such as identifying which terminal within the Self-Defense Forces was initially targeted in a cyber-attack.

Fujitsu declined to comment about the programme, citing client confidentiality.

Article source: http://asianewsnetwork.feedsportal.com/c/33359/f/566601/s/1b779ac3/l/0L0Sasianewsnet0Bnet0Chome0Cnews0Bphp0Did0F25777/story01.htm

View full post on National Cyber Security

Japan developing cyber weapon: report

Japan has been developing a virus that could track down the source of a cyber attack and neutralise its programme, the daily Yomiuri Shimbun reported Sunday.

View full post on cyber attack — Yahoo! News Search Results

View full post on National Cyber Security

Japan plans smart grids that could treat energy ‘like network data’

Using concepts from IT and networking, a Japanese consortium plans to develop large-scale energy grids that will handle power the way the Internet handles data, using “routers” and “service providers” to efficiently manage and direct the flow of electricity.

The Digital Grid Consortium, which was officially founded in September and includes NEC among its members, said it will build experimental systems next year, and aims to launch large grid services to try out the concept after three years.

The group’s fundamental aim is the development of technology to track units of energy across an entire grid, tagging them with their source and destination similar to the way data packets are handled on the Web. This will require grid addresses for everything from power plants to individual homes, along with routers that can convert and shuffle the energy units to where they are needed.

Pressing need in Japan

“This is a mechanism that will allow electricity to be sent out, or transferred back in any direction as required. This is something that doesn’t exist in current smart grids, which are only really used to monitor electricity,” said Rikiya Abe, a Tokyo University professor who serves as representative director of the consortium.

Creating power networks that are more intelligent is seen as a pressing need in Japan, which suffered sporadic blackouts after a powerful earthquake and resulting tsunami caused meltdowns at a key nuclear power plant. The central region of the country, which includes Tokyo, is still facing tight supply without the plant.

IT can get into energy

As with the traditional smart grids, the consortium plans for inputs to include existing power plants as well as solar facilities and other alternative sources. Local power storage such as large-capacity batteries in homes will be another key element, said Abe, as currently the entire grid must be built to handle peak loads.

Energy and financial exchanges on a grid would be managed by “service providers” which would be able to track and charge by distinct units of energy. Much of the day-to-day transactions could be virtual, similar to the way currency exchange markets work today, he said.

“This creates discussions about how an IT and networking company like NEC, which also has a battery business, can enter the energy industry,” said Takemitsu Kunio, a senior vice president at the company.

Article source: http://rss.feedsportal.com/c/270/f/3558/s/1adeded0/l/0Lnews0Btechworld0N0Cdata0Ecentre0C33243710Cjapan0Eplans0Esmart0Egrids0Ethat0Ecould0Etreat0Eenergy0Elike0Enetwork0Edata0C0Dolo0Frss/story01.htm

View full post on National Cyber Security

‘Hacker’ Group Safecast Crowdsources Radiation Data in Japan

By: Jenny Marder

We officially launch a new feature today we’re calling “Science Thursday.” Each week, we’ll feature an online-exclusive multimedia piece on a topic in the world of science and technology.

Here’s what’s up first. On Thursday’s NewsHour, science correspondent Miles O’Brien reports on a grassroots group called Safecast that is measuring and mapping data on radiation contamination from locations around Japan after this year’s devastating earthquake.

While in Tokyo, Miles spoke to Hari Sreenivasan about his trip with Safecast workers into the voluntary exclusion zone around the Fukushima Daiichi nuclear plant, where they detected levels reaching the equivalent of six X-rays per day.

He also filled us in on his conversations with Japanese officials working in evacuated areas and Japanese residents eager for more information about the consequences of the nuclear accident.

Find more coverage on our science page.

Article source: http://www.pbs.org/newshour/rundown/2011/11/online-hacker-group-crowdsources-radiation-data-for-japanese-public.html

View full post on National Cyber Security » Computer Hacking

Page 2 of 3«123»

My Twitter

Gregory D. Evans On Facebook