Blog Posts Tagged with "cyberweapons"

76e662e7786bf88946bd6c010c03ac65

Cyber Security Goes Ballistic

April 16, 2013 Added by:Jarno Limnéll

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

850c7a8a30fa40cf01a9db756b49155a

On the Right to Bear Cyber Arms

July 10, 2012 Added by:J. Oquendo

An attacker is decimating my infrastructure. I have purchased and deployed every security technology I can think of. I have contacted law enforcement as a matter of relevance, but I know they will not be able to do much. I have given the service provider two fair warnings. I now fight fire with fire...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Flame: Cutting Through Media and SME Hype

June 14, 2012 Added by:J. Oquendo

Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

A Stuxnet Drinking Game

March 12, 2012 Added by:Joel Harding

If one deconstructs Stuxnet down to its basic functions, nothing is new - but in its execution, success and the huge publicity of its discovery, Stuxnet is a finely manufactured weapon which I expect will be duplicated in its functionality many, many times...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

State Actors Develop Cyberweapons to Cripple Infrastructure

March 25, 2011 Added by:Dan Dieterle

“We believe that state actors have developed cyberweapons to cripple infrastructure targets in ways tantamount to kinetic assaults. Some of these weapons could potentially destroy hardware as well as data and software..."

Comments  (9)