Novell Cool Solutions

Hackers Steal Dalai Lama’s Emails



By:

April 8, 2010 2:10 pm

Reads:129

Comments:0

Score:Unrated

According to recent news, a sophisticated network of hackers operating out of China has launched cyber attacks against the computer systems of the office of the Dalai Lama and the United Nations, stealing Indian national security information, 1,500 e-mails from the Dalai Lama’s office and other sensitive documents. According to a new report, researchers at the University of Toronto monitored the hacking for eight months and have traced the core of the Shadow Network to servers located in China.

So, what would one gain from stealing 1,500 e-mails from the Dalai Lama? Other than a lifetime of really, really bad karma!

See what Terry Cutler, Novell’s resident certified ethical hacker and internationally known author, trainer, speaker, and professional security consultant has to say in this CTV news story about the Shadow Network.

Terry’s primary focus at Novell is analyzing systems and network vulnerabilities. He then helps our customers deploy Novell security solutions that uniquely integrate real-time security event monitoring and log management capabilities with identity and access management technologies. With strong identity and security policies and solutions in place, organizations can leverage user activity monitoring to catch nefarious behavior and cyber attacks before it’s too late.

Did I mention Terry has wicked good karma?

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.
Loading...Loading...

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog

0

Disclaimer: This content is not supported by Novell. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.

Comment

RSS