Blog Posts Tagged with "Cyberterrorism"
July 17, 2012 Added by:Ali-Reza Anghaie
The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...
April 09, 2012 Added by:Matthijs R. Koot
The digital domain is a new operational domain for the armed forces. The Ministry of Defense is investing to significantly strengthen existing capabilities and develop new ones including offensive. The right to self-defense also applies to cyber attacks...
March 26, 2012 Added by:Headlines
Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."
March 08, 2012 Added by:J. Oquendo
We placed computers in the environment of our critical infrastructure that are responsible for the things like water, power, communications - but we never engineered security into the equation. We are looking at a magnificent attack in the next couple of months, even days or hours...
February 22, 2012 Added by:Infosec Island Admin
Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?
February 14, 2012 Added by:Infosec Island Admin
There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…
December 07, 2011 Added by:Stefano Mele
While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents...
November 28, 2011 Added by:Headlines
"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...
November 20, 2011 Added by:Infosec Island Admin
Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...
November 02, 2011 Added by:Headlines
"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...
October 18, 2011 Added by:Infosec Island Admin
The motivations of DHS have also been called into question by some. This is especially prescient since they take pains to say that the Anonymous movement “most likely” does not have the technical means and motive to really pull of these types of attacks on the infrastructure. So why even bother?
October 14, 2011 Added by:Craig S Wright
What is at stake is the loss of life and property that will result from compromised SCADA systems. Not just PLCs as the opponents of this position like to presuppose, but Windows XP and other systems that act as controllers. You think this does not occur? Well there you are wrong...
September 11, 2011 Added by:Infosec Island Admin
The AQ core will continue to reach out to the lonely and dispossessed to radicalize the newcomers as well as use the technologies we have created (privacy/hacking utilities included) to effect the outcomes they desire and we need to be able to counter them...
September 09, 2011 Added by:Don Eijndhoven
It is easily conceivable that online collectives such as Anonymous and LulzSec, who are known to harbor militant types, will eventually get bored with relatively innocuous attacks and start targeting digital weak points to critical infrastructure to bring their point across...
September 07, 2011 Added by:Craig S Wright
SCADA systems and other critical infrastructure is taken for granted and we forget just how much of our lives are managed through private systems. Exploits have been noted as being of critical concern in US government briefs. We also forget that SCADA systems are connected to the world...
August 25, 2011 Added by:Don Eijndhoven
The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...
Expect More Internet Anarchy with Dawn of Sc... Neeraj kumar on 01-26-2015
Dark Technology: Are You (Unknowingly) Putti... ut ut on 01-26-2015
Security Spending Wasted When Software Goes ... ut ut on 01-26-2015