Blog Posts Tagged with "Cyberterrorism"

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Response to AIV/CAVV Advice on Digital Warfare

April 09, 2012 Added by:Matthijs R. Koot

The digital domain is a new operational domain for the armed forces. The Ministry of Defense is investing to significantly strengthen existing capabilities and develop new ones including offensive. The right to self-defense also applies to cyber attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Northern Command Makes Cyber Security a Priority

March 26, 2012 Added by:Headlines

Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

How FUD Defends Against APT

March 08, 2012 Added by:J. Oquendo

We placed computers in the environment of our critical infrastructure that are responsible for the things like water, power, communications - but we never engineered security into the equation. We are looking at a magnificent attack in the next couple of months, even days or hours...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Anonymous, NSA, Power Grids and False Flags

February 22, 2012 Added by:Infosec Island Admin

Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Jihadi Information Warfare: The Next Wave

February 14, 2012 Added by:Infosec Island Admin

There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Is Al Qaeda’s Internet Strategy Working?

December 07, 2011 Added by:Stefano Mele

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Cyber-Jihadi Cells Plot Western Destruction

November 28, 2011 Added by:Headlines

"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FUD Files: Cyber Attacks on Our Water Systems

November 20, 2011 Added by:Infosec Island Admin

Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Kaspersky Warns of Threat from Cyber Terrorism

November 02, 2011 Added by:Headlines

"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous, SCADA, Lulz, DHS, and Motivations

October 18, 2011 Added by:Infosec Island Admin

The motivations of DHS have also been called into question by some. This is especially prescient since they take pains to say that the Anonymous movement “most likely” does not have the technical means and motive to really pull of these types of attacks on the infrastructure. So why even bother?

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Logical Fallacies and the SCADA Security Problem

October 14, 2011 Added by:Craig S Wright

What is at stake is the loss of life and property that will result from compromised SCADA systems. Not just PLCs as the opponents of this position like to presuppose, but Windows XP and other systems that act as controllers. You think this does not occur? Well there you are wrong...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

The Psychology of “Neo Jihad” Radicalization

September 11, 2011 Added by:Infosec Island Admin

The AQ core will continue to reach out to the lonely and dispossessed to radicalize the newcomers as well as use the technologies we have created (privacy/hacking utilities included) to effect the outcomes they desire and we need to be able to counter them...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Linking Cyberspace and 4th Generation Warfare - Act Deux

September 09, 2011 Added by:Don Eijndhoven

It is easily conceivable that online collectives such as Anonymous and LulzSec, who are known to harbor militant types, will eventually get bored with relatively innocuous attacks and start targeting digital weak points to critical infrastructure to bring their point across...

Comments  (5)

8b5e0b54dfecaa052afa016cd32b9837

The Growth of Cyber Terror

September 07, 2011 Added by:Craig S Wright

SCADA systems and other critical infrastructure is taken for granted and we forget just how much of our lives are managed through private systems. Exploits have been noted as being of critical concern in US government briefs. We also forget that SCADA systems are connected to the world...

Comments  (15)

44a2e0804995faf8d2e3b084a1e2db1d

Cyberspace and 4th Generation Warfare - A Marriage of Convenience

August 25, 2011 Added by:Don Eijndhoven

The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...

Comments  (10)

Page « < 1 - 2 > »
Most Liked