Blog Posts Tagged with "Military"

B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Antivirus Ban for Iran: A Controversial Penalty

February 20, 2012 Added by:Plagiarist Paganini

Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How I Learned to Stop Worrying and Love Cyberwar

February 16, 2012 Added by:Infosec Island Admin

Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Iran Successfully Eradicates Stuxnet Virus Infestation

February 15, 2012 Added by:Headlines

"I would assume that once Iran learned of Stuxnet, then intelligence agencies looked at this method of cyber attack as compromised regardless of how long it has taken Iran to neutralize it. It is a cat and mouse game..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Remains Defiant in Confronting Cyber Attacks

February 14, 2012 Added by:Headlines

"Iranian experts possess adequate knowledge to confront cyber threats. All nuclear facilities in the country are immune from cyber attacks... Many viruses are produced in the world every day... there has been no destructive impact inside the country," said Gholam-Reza Jalali...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

US Confirms Iran Did Not Hack RQ-170 Stealth Drone

February 13, 2012 Added by:Dan Dieterle

A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Real Bullets for Digital Attacks

February 09, 2012 Added by:Don Eijndhoven

In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Syrian Drama and the Impact on Cyberspace

February 07, 2012 Added by:Plagiarist Paganini

Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Strategic Command on Defending Cyberspace

February 07, 2012 Added by:Headlines

DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

E-Meme: The Next Generation of Thought Crime Detection?

January 25, 2012 Added by:Infosec Island Admin

An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?

Comments  (6)

03b2ceb73723f8b53cd533e4fba898ee

The Chinese Cyber Threat: Japan Under Attack

January 23, 2012 Added by:Plagiarist Paganini

China is a cyber power capable of destroying most any opponent, especially when going against companies in trouble because of the difficult economy situation. These companies are the most vulnerable members of the security chain and therefore a favorite target...

Comments  (6)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Criticality of Attribution in Volatile Situations

January 22, 2012 Added by:Rafal Los

Imagine when a kinetic act causing loss of life is falsely attributed to a group, and because of the situation, human nature takes over. Assigning responsibility even when it's false is all the "evidence" we need to go to war or retaliate. Same with a hacked website...

Comments  (1)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Council on Int'l Affairs' Advice on Digital Warfare

January 22, 2012 Added by:Matthijs R. Koot

In December 2011 the Dutch Advisory Council on International Affairs published an advisory entitled "Digitale Oorlogsvoering" (English: "Digital Warfare") intended for the Dutch government. Below is my translation of the conclusions and recommendations of the advisory...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

China’s “Online Blue Army” Ready

January 19, 2012 Added by:Dan Dieterle

Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

US Air Force Solicits Cutting Edge Cyber Technologies

January 18, 2012 Added by:Headlines

"The Air Force is seeking information on revolutionary hardware and software cyber technology and systems as well as innovative Tactics, Techniques, and Procedures (TTP) that will support, augment and in some cases extend mission range and scope..."

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »