Blog Posts Tagged with "Cyber Offense"

94ae16c30d35ee7345f3235dfb11113c

Let’s Put Real War In To Cyberwar

April 19, 2012 Added by:Joel Harding

Why isn’t infosec effective? Because we already admitted defeat. Hackers have nothing to fear. Their computer might be confiscated, they might spend a few cozy months in some minimum security prison, and then they will get recruited by an offensively oriented corporation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Department Finalizing Cyberwar Operations Guidelines

March 21, 2012 Added by:Headlines

“I think the capabilities are available in cyber to virtually cripple this nation, to bring down the power grid system, to impact on our governmental systems, to impact on Wall Street on our financial systems, and literally to paralyze this country..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

What are Cyber Weapons?

March 14, 2012 Added by:Dan Dieterle

"Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the received wisdom on cyber-security..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

North Korea’s Cyber War Forces

March 06, 2012 Added by:Dan Dieterle

North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (2)

1b061b1cec6b5898e5326992d9461610

Does Offensive Security Really Exist?

February 09, 2012 Added by:Dave Shackleford

I want to refute the concept of offensive vs. defensive security staff. It's not realistic. Reason? Offense really exists for one reason – to inform defense. In my mind, this really means we’re ALL defense. We just accomplish our defensive strategy and tactics in different ways...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Cyber Threats: From Military to Economic

January 12, 2012 Added by:Pierluigi Paganini

Governments around the world are gearing up to cope with this massive technology call to arms. The awareness of the threat and risks are high and this made it necessary, despite the struggling economy, the allocation of large sums of money to prepare for the new emergency...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Secretary Panetta: Cyber Attack Could Paralyze US

January 06, 2012 Added by:Headlines

"I think we have to be prepared not only to defend against that kind of attack but if necessary we are going to have to be prepared to be able to be aggressive when it comes to cyber efforts as well. We've got to develop the technology, the capability, we've got to be able to defend this country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts Warn Against Developing Cyber Weapons

January 04, 2012 Added by:Headlines

“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation. It ups the ante to a new level that may not be sustainable, especially when -- not if -- the code for the 'good' virus gets out...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Japanese Defense Ministry Developing Cyber Weapon

January 03, 2012 Added by:Headlines

"The program can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers...."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Iran Invests Heavily in Developing Cyberwarfare Capabilities

December 19, 2011 Added by:Headlines

The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Sanctions Offensive Military Action in Cyberspace

December 15, 2011 Added by:Headlines

Section 954 of the the FY 2012 defense authorization act states that “Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, allies and interests..."

Comments  (0)

Page « < 1 - 2 - 3 > »