Is This What The First World Cyber War Looks Like?: Global Real Time Cyber Attack Map

Cyberattack Map - Zero Hedge

After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.

What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.

(Read the rest of the story here…)

1 thought on “Is This What The First World Cyber War Looks Like?: Global Real Time Cyber Attack Map”

  1. If I were responsible for security I would place a computer between their computer and our network.
    The computer operating program would be written permanently and unchangeable on the inbetween computer. Possibly on a CD or DVD that is written in stone.
    The first job being to id the computer incoming.
    I would use one of many different UNIX based languages with Linux. Again it would require a DVD or CD depending on size and it would keep anyone from writing to the base operating system period.
    The operating system itself would transfer itself on bootup to RAM. Changes to the operating system would require a new DVD or CD.
    RAM would be large. It would be solid state. There would be a firewall to end all firewalls. On close down, everything on ram is erased.
    Outgoing messages would use TOR.
    The important thing is the entire thing can move from computer to computer any time there is a problem with hackers. It is an onion setup.
    You might still have hackers attempting to overcome the system. Pull the plug. Erase the hack. Restart the computer deleting that user.
    The user base has to be secure from the inside out.
    If there is a weak spot that is it. Placing an actual computer between them and us does work. Making it mobile works even better.
    Long term I would have the programming people develop a language based on Navaho or some other obscure written language that few if any understand. I would write that into the operating system command language.
    So I would substitute another word for every command in the system.
    The underlying command language can remain the same only the interface to the command language changes.
    Things like SUDO might become ODUS instead. Or it could be any name different than SUDO.
    Entire combination commands can be rewritten in the interface language.
    Nothing will stop expert computer programmers from performing a hack. But we can sure make it a lot harder than it is right now.

Comments are closed.

The Most Important News