PaulDotCom mailing list archives
Operation “Aurora”
From: jackadaniel at gmail.com (Jack Daniel)
Date: Fri, 15 Jan 2010 12:09:07 -0500
Two thoughts- First, McAfee should be flogged for naming it Aurora. Too many things already have that name. Like the Aurora vulnerabilities in SCADA systems (specifically nuclear). Second, even my blacksmith friends know of the industrial espionage threats posed by the Chinese- the best artisans and craftsmen only put small or low res images of their work on their sites because they are tired of seeing crappy knock-offs at dumps like Pier One or Christmas Tree Shops. But, a ridiculous number of people, including many in IT, are indeed oblivious to the threats. Jack -- ______________________________________ Jack Daniel, Reluctant CISSP http://twitter.com/jack_daniel http://www.linkedin.com/in/jackadaniel http://blog.uncommonsensesecurity.com On Fri, Jan 15, 2010 at 10:54 AM, Rick Hayes <rick.hayes at gmail.com> wrote:
Operation ?Aurora? seems to be a pretty hot topic on the wires this morning. ?The following comes from McAfee Labs about the Google attack that they are now calling Aurora http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/. ?What has been the reaction from your organizations? ?I'm really surprised at the number of IT folks that seem unaware that China (or other countries for that matter) are actively probing and attacking US corporations. -- Thanks, Rick Hayes CISSP, CCSP, OSWP, GSEC, GCFA, GSLC InfoSec Daily Podcast: http://www.isdpodcast.com iTunes Keywords: InfoSec Daily _______________________________________________
Current thread:
- Operation “Aurora” Rick Hayes (Jan 15)
- Operation “Aurora” Jack Daniel (Jan 15)