Blog Posts Tagged with "Military"

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare - Questions from .GOV

November 08, 2011 Added by:Don Eijndhoven

People ask what the impact may be from cyber warfare, and this is a valid question. However, it should not be confused with political and/or military motive. War is, as Clausewitz said, the continuation of policy through other means, and that is what cyber is, another means...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

This Veterans Day - A Hackday for Heroes

November 08, 2011 Added by:Headlines

"It is a true honor to be personally involved with an initiative that gives back to our nation’s heroes. We are grateful for their service and look forward to helping them transition back into the workforce as we equip them with the tools and insights to manage their careers..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Drone Wars – When Cyber Warfare Becomes Real

November 08, 2011 Added by:Dan Dieterle

Much hype has been heard in the media about cyber war but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage. The comparison to “war” really hasn’t been justified. But what if a drone based virus could change friend to a foe?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DARPA Advocates Improved Cyber Offense Capabilities

November 07, 2011 Added by:Headlines

"We are shifting our investments to activities that promise more convergence with the threat and that recognize the needs of the DoD. Malicious cyber attacks are not merely an existential threat to our bits and bytes. They are a real threat to our physical systems..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

US Chose Not to Use Cyberwarfare Against Libya

November 03, 2011 Added by:Dan Dieterle

Granted you would be coming in through a firewall to attack a computer, but is it really any different than attacking it through radar waves? Especially if the results would be the same, or very similar? If this is true, then is cyber warfare really any different from Electronic Warfare?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Beefs Up PLA's Cyber Militia

October 21, 2011 Added by:Headlines

"Effectively acting as a PLA-associated technical reserve, its mostly under-thirty part-timers are drawn largely from civilian companies and university-level institutes operating in electronic fields. A national guard of cyber soldiers..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Drones Were Hit by Online Gaming Malware

October 18, 2011 Added by:Headlines

The UAV drone system were not the target of the malware. Instead, according to an anonymous defense official, the malware discovered was the kind that is “routinely used to steal log-in and password data from people who gamble or play games like Mafia Wars online..."

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Reducing America’s Cyberwar Capabilities to a Maginot Line

October 13, 2011 Added by:Dan Dieterle

The United States has been ravished electronically by infiltrating sources that have pilfered military secrets, financial information and account credentials. According to some, our national infrastructure has also been infiltrated and key systems backdoored...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Navy Developing Cyber Battle Lab in Florida

October 11, 2011 Added by:Headlines

"The next war could be one where not a single bomb is dropped. Why would they if another country could take down our financial system, or shut down commercial aviation for two weeks? The scary part is there are folks who spend all day trying to do just that..."

Comments  (1)

91648658a3e987ddb81913b06dbdc57a

US Drone Fleet Infected with Computer Virus

October 10, 2011 Added by:Ron Baklarz

We will probably never know how the infections occurred. Were vendor support connections the cause? Was an infected thumb drive or disk the culprit? At any rate, these types of incidents underscore the enemy's desire to exploit cyber-security to their advantage...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Attacks: Iran Will Retaliate

October 03, 2011 Added by:Joel Harding

What does Iran mean by ‘We will retaliate in cyberspace’? Iran has a record of Shamshir rattling and ‘trash talk’. Yes, Iran has formed a cyber command. Yes, there is a hacker group called the Iranian Cyber Army, and they were defacing pages in China and even took down Baidu...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

A US Cyber Auxiliary?

September 27, 2011 Added by:Joel Harding

Four years ago a few of us were pulled into a STRATCOM study group and I coughed up a furball when the idea of a cyber militia was surfaced. I thought the press would have a field day with that concept and it would be a PR fiasco. Now I’m not too sure...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Two Million Euro for Dutch Cyber Operations in 2012

September 27, 2011 Added by:Don Eijndhoven

A small sum, but considerable in the face of ongoing budget cuts at the Dutch Ministry of Defense. One has to wonder though, with all that has been going on the last few years, what will be done with a mere € 2 million for an entire year. This would pay for roughly 10 people and some hardware...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Israel and Cyber Warfare

September 27, 2011 Added by:Stefano Mele

The book discusses the formulation and development of Israeli deterrence policies, including the ability to carry out injurious and direct response against any party engaged in aggression against Israeli cyberspace...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

How to Wage War in Cyberspace with Iran

September 15, 2011 Added by:Joel Harding

Iran has already begun deployment of cyber forces in small teams throughout the world to avoid devastation if the networks internal to Iran are crippled. A myriad of intelligence agencies are gathering as much intelligence as possible for a possible war in cyberspace with Iran...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Yes Virginia - Hackers and Spooks On Militant Boards

September 01, 2011 Added by:Infosec Island Admin

Some of these sites contain the works of friends of mine in the security community that they have posted as research. We have areas where the jihadi’s have an assortment of upload/download sites for malware, but some of the newer posts have malware and creation kits that are up to standard...

Comments  (1)

Page « < 7 - 8 - 9 - 10 - 11 > »