COMPUTERWORLD NITRO PDF

Nitro, the software company behind the top alternative to Adobe Acrobat, launched in Melbourne in but after three years moved to San Francisco. They will employ thousands of people in the future. And these are all companies that have either already passed one of those thresholds or both of them, or will in the next year or so. Chandler disagreed with the line of thinking that employee share options are only needed as a hiring incentive for very young startups that have a higher risk of folding. Spurring startups is not about the government writing cheques, but rather setting a regulatory environment so that Australian startups are on even footing with companies of other countries, said Chandler.

Author:Mujinn Febar
Country:Burma
Language:English (Spanish)
Genre:Spiritual
Published (Last):24 January 2009
Pages:45
PDF File Size:20.41 Mb
ePub File Size:16.88 Mb
ISBN:113-5-38319-132-3
Downloads:85544
Price:Free* [*Free Regsitration Required]
Uploader:Doulkree



Attackers used an off-the-shelf Trojan horse to sniff out secrets from nearly 50 companies, many of them in the chemical and defense industries, Symantec researchers said today. The attack campaign -- which Symantec tagged as "Nitro" -- started no later than last July and continued until mid-September, targeting an unknown number of companies and infecting at least 48 firms with the "Poison Ivy" remote-access Trojan RAT. Poison Ivy, which was created by a Chinese hacker, is widely available on the Internet, including from a dedicated website.

The malware has been implicated in numerous attacks, including the March campaign that hacked the network of RSA Security and swiped information about that company's SecurID authentication token technology. In a paper published today download PDF , Symantec researchers spelled out their analysis of the Nitro attacks and the use of Poison Ivy. Poison Ivy was planted on Windows PCs whose owners fell for a dodge delivered via email, said Symantec.

Those emails, which were delivered in small numbers -- sometimes to only a few people in a company -- touted meeting requests from reputable business partners, or in some cases, as updates to antivirus software or for Adobe Flash Player. When users fell for the trick and opened the message attachment, they unknowingly installed Poison Ivy on their machines. After that, the attackers were able to issue instructions to the compromised computers, troll for higher-level passwords to gain access to servers hosting confidential information, and eventually offload the stolen content to hacker-controlled systems.

Many of the same techniques, including substantial time spent scouting targets and crafting individual emails, have characterized a number of notable attacks in the last two years, including the "Aurora" campaign against Google and dozens of other Western firms, and the attacks against RSA this year.

Wilhelm declined to connect the dots between Nitro and the RSA attack, but did admit that there were similarities. Twenty-nine of the 48 firms that were successfully attacked were in the chemical and advanced materials trade -- some of the latter with connections to military vehicles -- while the other 19 were in a variety of fields, including the defense sector.

A dozen of the targeted organizations were U. Symantec declined to comment on whether the sole Japanese firm was Mitsubishi Heavy, that country's largest defense contractor. Last month, Mitsubishi confirmed that scores of its servers had been infected with malware in August , a time right in the middle of the Nitro two-and-a-half-month run.

Last week, Mitsubishi Heavy said that secret information may have been stolen from its network during the attack. Mitsubishi has not identified the attack's origin, or the malware that was placed on its servers and PCs.

China has denied that its government was involved in the attacks against Mitsubishi. Hebei is a province in northern China, and surrounds the capital, Beijing.

But the information Symantec had on the Nitro attacks was of little use in determining whether Covert Groove acted alone, or if he did, whether he was fronting for a hacking group or even a national government. And Wilhelm was hesitant to draw conclusions about the motivation for the attacks. Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld.

His e-mail address is gkeizer computerworld. See more articles by Gregg Keizer. Here are the latest Insider stories. More Insider Sign Out. Sign In Register. Sign Out Sign In Register. Latest Insider. Check out the latest Insider stories here. More from the IDG Network. Researcher follows RSA hacking trail to China. China denies role in hack of Japanese defense contractor.

Hackers hit Japan's biggest defense contractor. Related: Security Cyber Crime Malware.

HT IMENIK PDF

computerworld-uk

.

CESMM4 CIVIL ENGINEERING STANDARD METHOD OF MEASUREMENT PDF

Govt 'competitiveness agenda' excludes mature startups: Nitro CEO

.

GUTHRIE GOVAN UNCLE SKUNK PDF

'Nitro' hackers use stock malware to steal chemical, defense secrets

.

ALEGORIA DE LA CAVERNA PLATON PDF

.

Related Articles