Blog Posts Tagged with "Russia"
November 05, 2012 Added by:Pierluigi Paganini
Hacktivism represents a serious problem for governments and intelligence agencies. The hack of IT infrastructure and the exposure of confidential information is a serious menace. In the past Anonymous has hit several governments and law enforcement agencies in the UK, US, Japan, and India...
November 03, 2012 Added by:Pierluigi Paganini
DPI is most advanced and intrusive category of inspection tools, it is able to analyze every packet in traffic filtering particular services or contents. Remeber that DPI systems have been adopted by various regimes such Iran and also China used the technology to implement its Great Firewall project...
November 01, 2012 Added by:Pierluigi Paganini
Programming services and software sales was the most common service in the criminal market, where it is possible to buy customized malware agents and any kind of applications to conduct a cyber attack such as spammers, brute-force tools and DDoS bots and exploit toolkits...
October 03, 2012 Added by:Doug DePeppe
In the West, we tout the openness of the Internet. Many attribute the Internet as playing a major part in the Arab Spring. The dark underbelly of the Internet, however, is that all this connectivity allows bad actors to connect to any target he desires...
September 21, 2012 Added by:Scot Terban
The paper, “Peter the Great Versus Sun Tzu” alleges that a comparison can be made between the varying actors in malware creation. They have broken this down into a battle royal between the “Asians” and the “Eastern Europeans” which is just patently stupid...
June 26, 2012 Added by:Headlines
"The criminal activities were committed by a 22-year-old young man who is widely known in the hacker community under the nicknames of 'Germes' and 'Arashi'. The young man was not only developing bot-networks and massively distributing malicious programs but also personally took part in stealing funds"...
June 19, 2012 Added by:Jeffrey Carr
Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...
June 18, 2012 Added by:Dan Dieterle
Russia has very advanced cyber capabilities, and they have shared military hardware and tech with middle east nations before. It is not a big leap to think that they could and would share cyber warfare technology with these nations, especially if they rely on these nations for energy reserve...
April 30, 2012 Added by:Joel Harding
Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...
April 25, 2012 Added by:Pierluigi Paganini
The official estimates say that the global cyber crime market was worth $12.5 billion in 2011, and $4,5 billion of the market share is related to the Russian cybercrime market with $2.3 billion taking place in Russia alone. Compared to last year, the problem has doubled...
March 08, 2012 Added by:Pierluigi Paganini
Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...
February 09, 2012 Added by:Scot Terban
China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...
February 07, 2012 Added by:Pierluigi Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
February 02, 2012 Added by:Pierluigi Paganini
“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”
January 25, 2012 Added by:Bob Radvanovsky
Curran-Gardner: A contractor for a control systems outsourcing company had accessed one of his customer's systems from a foreign country, only to be confused with a foreign-national actor with malicious intent, but one question still remains: What really happened to the pump?
January 18, 2012 Added by:Headlines
Vladimir Zdorovenin and his son engaged in serial cyber crimes in Russia that targeted Americans and wrought havoc with their personal and financial information, using it to make phony purchases and to manipulate stock prices...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013