Blog Posts Tagged with "Northrop Grumman"

E11e506024f5d2b70f037b9af4734f33

Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IMF May Be Latest Victim of RSA SecurID Hack

June 13, 2011 Added by:Headlines

"There are still dozens of similar yet still undisclosed breaches that have taken place in the U.S. government and defense domain during the same time frame. My guess is that it is the same set of bad actors who are behind the attacks focused on military, government and economic intelligence...

Comments  (2)

70e177868d7bc383ce3ea10b6f976ada

To Disclose or NOT to Disclose...

June 09, 2011 Added by:Andrew Baker

The issue of disclosure is a sensitive one, and it is important not to feed more bad guys with more information that will allow them to have greater success, but it is abundantly clear that two months of saying essentially nothing is at least just as bad as saying too much, if not worse...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

How Secure is RSA’s SecurID?

June 08, 2011 Added by:Headlines

Once installed on the authentication server, most of the cryptographic protection of the seed values could be removed by anyone with sufficient time and effort, and in fact the previous secret 64-bit algorithm was revealed about 10 years ago through such reverse engineering...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Linked to RSA and Defense Contractor Breaches

June 07, 2011 Added by:Headlines

"If it's any kind of military espionage, military adversaries are going to be high on the list. The question then is who in China--is it government agents or independent contractors selling to the Chinese government?" asked Veracode's Chris Wysopal...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

RSA SecurID Breach Spreads to L3 and Northrop

June 02, 2011 Added by:Headlines

"We're seeing are targeted attacks against the defense industry. The RSA attack was very sophisticated, probably executed by people who had plans for what to do with the keys. Think about the data that those companies have. They have our nation's military technology secrets..."

Comments  (0)