Blog Posts Tagged with "terrorism"
October 13, 2011 Added by:Infosec Island Admin
With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...
July 14, 2011 Added by:Infosec Island Admin
While the site is registered in the US, the actual servers are all located in Malaysia. So, once again we see that Malaysia seems to be a hub where the Internet Jihad is concerned. I have to wonder just how well our government gets along with the Malay government...
July 02, 2011 Added by:Infosec Island Admin
It's anyone’s guess as to the attack's perpetrators, methods, and final outcome until someone from the Al-Qaeda camp speaks up. Meanwhile, the media will continue to spin on MI6 hacking them or those mysterious British hackers that many articles mentioned. “Bollocks” As they say in England...
June 30, 2011 Added by:Infosec Island Admin
Who attacked Shamikh and why? There no evidence cited or even hinted at in the real world that MI6 or MI5 for that matter had anything to do with this. For all they know, it could have been The Jester or someone with like technology that DoS’d them and got them yanked offline by their host...
June 30, 2011 Added by:Headlines
“Al-Qaeda's online communications have been temporarily crippled... Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI. This particular event began as a basic domain hijacking, which does tend to happen every so often..."
June 29, 2011 Added by:Infosec Island Admin
Majahden have been learning about how psyops, hacking, disinformation, and being pwn3d works. With the new invigoration in the cyber-jihadi community since Osama Bin Laden's demise, they have taken up the gauntlet not only to hack, but to wage a cyber-propaganda campaign like never before...
May 06, 2011 Added by:Ben Rothke
The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...
April 01, 2011 Added by:Headlines
"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."
March 17, 2011 Added by:Dan Dieterle
Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...
March 02, 2011 Added by:Danny Lieberman
Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...
March 01, 2011 Added by:J. Oquendo
The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...
November 03, 2010 Added by:Robert Gezelter
A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...
October 07, 2010 Added by:Theresa Payton
I would like to see open and vigorous debate where the voices of both Privacy advocates and National Security & Law Enforcement agencies are heard. By vetting the pros and cons of the issue, I believe the country can craft a law that accommodates the concerns and needs of both sides...
July 30, 2010 Added by:Jon Stout
Originally developed in World War II as a resource on enemy technology, the DTIC has morphed into a valuable - if underutilized - tool for understanding the technology bases for enemy attacks...
It is important to understand that the EIs continue to use our infrastructure against as they have over the years during physical attacks and currently using social network software and sites to drive awareness and training while building recruitment through online communities and various forms of propaganda...
June 20, 2010 Added by:Michael O'Connor
Historically, to facilitate money laundering criminals opened a legitimate business as a cover, and then used the business account to deposit and legitimize large sums of money. Large deposits into accounts were routinely overlooked by banking institutions and law enforcement alike.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015