The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)


German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Friday, March 23, 2012

Most 2011 cyberattacks were avoidable, Verizon says

Despite all the hype about sophisticated attack methods, 97% could have been stopped using fundamental precautions

Computerworld, by Jaikumar Vijayan, March 22, 2012

Computerworld - Despite rising concern that cyberattacks are becoming increasingly sophisticated, hackers used relatively simple methods 97% of data breaches in 2011, according to a report compiled by Verizon.

The annual Verizon report on data breaches, released Thursday, also found that in a vast majority of attacks (80%), hackers hit victims of opportunity rather than companies they sought out.

The findings suggest that while companies are spending increasing sums of money on sophisticated new security controls, they are also continuing to overlook fundamental security precautions.

The conclusions in the Verizon report are based on the investigations into more than 850 data breaches. The report was compiled with the help of the U.S. Secret Service and law enforcement agencies in the United Kingdom, The Netherlands, Ireland and Australia, Verizon said.

Verizon said it found that attacks by so-called "hactivist" groups such as Anonymous for the first time compromised more breached records -- more than 100 million -- than the number of attacks by hackers specifically looking to steal financial or personal data.

Data breach victims and security vendors generally tend to describe attacks as highly sophisticated and involving a great deal of expertise on the part of hackers.

The Verizon report though shows a far more mundane reality.

Most of the breaches didn't require hackers to possess special skills or resources, or to do much customization work. In fact, Verizon said that 96% of the attacks "were not highly difficult" for the hackers.

"Additionally, 97% were avoidable, without the need for organizations to resort to difficult or expensive countermeasures," the report said.

Very often, the companies breached had no firewalls, had ports open to the Internet or used default or easily guessable passwords, said Marc Spitler a Verizon security analyst.

The study found that cybercriminals did not have to work any harder to break into a large organization than into a small one.

Attackers in 2011 generally didn't need new sophisticated tools to break into most organizations, Spitler said.

"We have seen nothing new. Some of the old standbys are continuing to work very well for the people going after information," he said. "Not enough has been done to raise the bar and to force them to spend" significant sums on new tools and exploits.

The most sophistication found by the researchers was in the methods used by attackers to steal data after breaking in to systems, he said.

Attackers typically have installed malware on a victim company's network to escalate privileges, set up backdoors, enable remote control and sniff out sensitive data. Many take steps to remain hidden on the network for a long time and then wipe their tracks when they are done.

Such tasks require moderate to advanced skills and extensive resources on the part of the attackers, according to Spitler. "That is one area where we have raised the bar," he said.

Most of the targeted attacks last year were directed large companies in the finance and insurance industries, according to Verizon.

Hackers, often part of organized groups, used large-scale automated methods to find vulnerable businesses to exploit.

In such cases, more than 85% of victim companies employed less than 1,000 employees and were mostly in the retail, hospitality and food services industries.

The findings once again highlight the need for companies to pay attention to security basics, Spitler said.

"It is about going back to basic security principles. A lot of the same recommendations we have used in past years, we have recommended this year," he said.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is jvijayan@computerworld.com.

No comments: