Feeds

Pentagon pleas for cyber peace fall on deaf ears

Hackers keep doing it for themselves

  • alert
  • submit to reddit

Remote control for virtualized desktops

Hackers probing the Pentagon's cyber defences have taken no heed of the ministry's pleas for them to stop their incursions.

A spokesman for the government body appeared at the hackers' convention Defcon 8 to appeal to hackers to work with the government instead of constantly attacking it. It tried tempting them with promises of access to groovy gadgets and the latest technology.

However, the hackers have all but ignored the request according to Richard Schaeffer, who heads the cyber-security office in the Pentagon arm responsible for command, control, communications and intelligence. The poor response has not surprised Pentagon officials.

Last year, over 22,000 "attacks"' were detected on Defence Department networks, congress was told in March. Just a year earlier there had been just under 6000 similar attempted incursions. So far this year there have been over 13,000 "attacks", classified as probes, viruses, intrusions or scans.

At a Web Defence' conference on business solutions to online crime, Schaeffer said the government would like to take hackers out of the equation as much as possible, to make it easier to spot genuine threats from foreign sources.

He also said that he was reasonably sure that the classified portions of the Pentagon had not been breached. Perhaps this will spark more interest in the hacking community than the enticements of the military. ®

Original Story

Join the navy, hack the world

Remote control for virtualized desktops

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.