A look inside the Department of Homeland Security’s cyber hub. From TheVerge. The building where the Department of Homeland Security tracks every cyber attack against the US is surprisingly bland. With its neutral exterior and circular drive, I wasn’t even sure we were at the right place until I saw our press liaison standing in the lobby. There are no signs to distinguish it from the generic office park that surrounds it, and the doorman wouldn’t even confirm if DHS had an office inside.
Engineering student arrested for hacking Indian Politician Lalu Prasad’s Facebook account. From Times Of India. An engineering student was arrested on Tuesday for allegedly hacking the Facebook profile and email account of RJD supremo Laluprasad Yadav. The Facebook profile of Yadav was hacked by the criminals on March 13. An FIR was lodged by his son and deputy CM Tejashwi Prasad Yadav with Secretariat police station and sections 419, 420 and 506 of IPC was lodged in the case. Two investigating officers (IO), ASP Nilesh Kumar and inspector Ramashankar Singh of the cyber cell of economic offences unit (EOU) first located that the hacking was committed from mobile phone device and not a desktop or laptop.
- History Of TCP/IP. From History Of Computers. The most popular network protocol in the world, TCP/IP proto cal suite, was designed in 1970s by 2 DARPA scientists—Vint Cerf and Bob Kahn, persons most often called the fathers of the Internet. Vinton Gray “Vint” Cerf (born June 23, 1943 in New Haven, Connecticut) obtained his B.S. in Math and Computer Science at Stanford University in 1965 and went to IBM, where he worked for some two years as a systems engineer, supporting QUIKTRAN—a system to make time-shared computing more economical and widely available for scientists, engineers and businessmen.
FBI Says a Mysterious Hacking Group Has Had Access to US Govt Files for Years. From VICE. The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard.
- How is Malware Researched?. From Intego. You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time virus definitions magically appear on your machine. All researchers do things a little differently, but there are some basic techniques that are common to a lot of them. For instance, which technique a researcher uses as his or her first or primary method of analyzing a file will depend on a lot of things. Some might seem obvious (such as how complicated or armored is the threat or how quickly do we need to analyze this), while others might seem a bit odd (how old is the researcher?).