Map of cyber attacks in real time for those wishing to be spellbound

With the revelation of the recent cyber attack on Centcom, I came across a fascinating site that has real-time demonstrations of attacks. Both the Norse links below and the Kaspersky lab links demonstrate what we are up against every nanosecond. Sooner or later if we don’t get on this someone will get into the really big room. Here we go:

Norse ‘dark intelligence’ has a ‘live’ map of global cyber attacks and Kaspersky Lab has an interactive cyber threat map, both update in real-time. Careful not to get sucked in as the amazingly hypnotic maps are serious time eaters.If you’ve ever been entranced by maps showing data in real-time, such as a lightning strike map, then it’s likely a global map with “live” cyber attacks might hold you spellbound too. Below is a screen capture. For real time, follow the links. It is interactive, so use icons at various locations at sites.

Kaspersky Cyberthreat real-time map and Norse Attack Map

 the live links.(The sites were down for awhile yesterday, but up now.)


If you are interested in viewing attacks in real-time on something other than thousands of honeypots, then Kaspersky’s interactive cyber threat map might fit the bill. Although the attacks seem like they are being launched from China, that is not necessarily true as attackers are good at masking their real location. Just the same, in this little snapshot of “live” activity, Norse’s cyber attack map shows China launching massive attacks on the USA. As far as attack origins go, the U.S. is plenty active too; in fact the top five attack countries are China, followed by the U.S., Bulgaria, Netherlands, and Other Country – wait, what?

Kaspersky Lab has over 60 million users and detects more than 300,000 malicious objects every day. Its cyber threat map shows threats detected in real-time “with various diagnostic tools, including On-Access Scan, On-Demand Scan, Web and Mail Anti-Viruses, as well as the Vulnerability Scan and Intrusion Detection System.”According to Norse, a “dark intelligence” and security solution company, “Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries.” As cool as the attack map is, what you see is only a “small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports).”

Full story over at Net work world

Senators introduce bill that would allow US to disconnect the Internet

Doesn’t take much to think about what could go wrong with this plan in the wrong hands. Do we really want our Commander in Thief to have this power? I can see the upside, but whoa, looks to me we are going way to far getting into our face. I would say Overkill. An Internet “kill Switch” you say? Hat tip to Raw Story

Sen. Joe Lieberman (I-CT), along with one Republican and Democratic senator, introduced a bill late last week that would allow the President to effectively disconnect the internet by emergency decree.

The Protecting Cyberspace as a National Asset Act would allow the President to disconnect Internet networks and force private websites to comply with broad cybersecurity measures.

Future US presidents would have their Internet “kill switch” powers renewed indefinitely.

The bill was introduced by Lieberman, Sen. Susan Collins (R-ME) and Sen. Tom Carper (D-DE). A parallel bill was drafted last year by Sen. Jay Rockefeller (D-WV) and Sen. Olympia Snowe (R-ME) which would allow the federal government to unilaterally “order the disconnection” of certain websites.

One news site notes:

The bill would give a newly-formed National Center for Cybersecurity and Communications the authority to monitor the “security status” of private websites, ISPs and other net-related business within the U.S. as well as critical internet components in other countries. Companies would be required to take part in “information sharing” with the government and certify to the NCCC that they have implemented approved security measures. Furthermore, any company that “relies on” the internet, telephone system or any other part of the U.S. “information infrastructure” would also be “subject to command” by the NCCC under the proposed new law.

For the rest of the story over at Raw Story/

Website for those who wish to leak secrets: Wikileaks

For all those left wingers who would like to do us in by giving out government secrets, here is your chance–I caught the topic on one of the talk radio programs. Take a look. Considering all of the radicals in the Whitehouse– with thousands having clearance to secrets, I guess we know the outcome. Love of country be damned.

We don’t know yet whether whistle-blowing Web operation Wikileaks has hundreds of thousands of classified U.S. State Department documents provided by U.S. Army Specialist Bradley Manning or whether it will publish them. But in the meantime Wikileaks’ Julian Assange is providing ammunition to those who believe that the fragile new world of cybersecurity demands a more flexible approach to the rules of engagement.

There are two distinct ethical problems at play here. One is old: it requires you to define the public good before you determine what kinds of information should be made public. As the Economist recently noted, this is complicated by the fact that the leaker and his audience may not agree on the logical import of the leaked information. There are unintended consequences to transparency given that people have different interpretative frameworks and values for processing such information. An ethics of publishing that is blindly absolutist simply begs for all sorts of painful, unintended consequences . Read More:

%d bloggers like this: