Blog Posts Tagged with "Cyber Warfare"
October 13, 2011 Added by:Scot Terban
With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...
September 23, 2011 Added by:Bill Gerneglia
Cyber war is now an urgent issue that transcends lines between enterprises or governments. Unless a global cyber security framework can be engineered, a world of disorder will rapidly emerge - a turbulent world, where change has ceased to be beneficial and becomes ultimately destructive...
September 09, 2011 Added by:Don Eijndhoven
It is easily conceivable that online collectives such as Anonymous and LulzSec, who are known to harbor militant types, will eventually get bored with relatively innocuous attacks and start targeting digital weak points to critical infrastructure to bring their point across...
September 07, 2011 Added by:J. Oquendo
RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...
September 07, 2011 Added by:Headlines
"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"
September 01, 2011 Added by:Joel Harding
While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...
August 30, 2011 Added by:Joel Harding
Wow, it’s really cool that we have proof that China not only has the capabilities but has been caught red-handed attacking a website, and the target they’re attacking is located inside the US. I’m sure somebody at the new US Cyber Command jumped up and down and said, “Yes! We have proof..."
August 29, 2011 Added by:J. Oquendo
Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...
August 26, 2011 Added by:Scot Terban
China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...
August 25, 2011 Added by:Don Eijndhoven
The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...
August 23, 2011 Added by:Headlines
"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...
August 22, 2011 Added by:Headlines
"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."
August 09, 2011 Added by:Headlines
"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."
July 29, 2011 Added by:Headlines
"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...
July 27, 2011 Added by:Headlines
According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...
Why Bother with Security? [If you’re going... Westley McDuffie on 12-12-2013
Are Security Professionals Exiting the Enter... Westley McDuffie on 12-12-2013
The Security Risks of Remote Support Tools ... Amanda Martin on 12-11-2013