Blog Posts Tagged with "Cyber Warfare"

7fef78c47060974e0b8392e305f0daf0

Stuxnet, SCADA, Nation State Terrorism and FUD

October 13, 2011 Added by:Infosec Island Admin

With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...

Comments  (2)

E11e506024f5d2b70f037b9af4734f33

Israel and Cyber Warfare

September 27, 2011 Added by:Stefano Mele

The book discusses the formulation and development of Israeli deterrence policies, including the ability to carry out injurious and direct response against any party engaged in aggression against Israeli cyberspace...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Future Enterprise: Cyber Warfare

September 23, 2011 Added by:Bill Gerneglia

Cyber war is now an urgent issue that transcends lines between enterprises or governments. Unless a global cyber security framework can be engineered, a world of disorder will rapidly emerge - a turbulent world, where change has ceased to be beneficial and becomes ultimately destructive...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Linking Cyberspace and 4th Generation Warfare - Act Deux

September 09, 2011 Added by:Don Eijndhoven

It is easily conceivable that online collectives such as Anonymous and LulzSec, who are known to harbor militant types, will eventually get bored with relatively innocuous attacks and start targeting digital weak points to critical infrastructure to bring their point across...

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

RSA Attack: All That Glitters Isn't China

September 07, 2011 Added by:J. Oquendo

RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Investing Heavily in Cyber Offensive Capabilities

September 07, 2011 Added by:Headlines

"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Cyberworld Points at China

September 01, 2011 Added by:Joel Harding

While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...

Comments  (5)

94ae16c30d35ee7345f3235dfb11113c

Did China Really Expose a Cyber Attack Tool?

August 30, 2011 Added by:Joel Harding

Wow, it’s really cool that we have proof that China not only has the capabilities but has been caught red-handed attacking a website, and the target they’re attacking is located inside the US. I’m sure somebody at the new US Cyber Command jumped up and down and said, “Yes! We have proof..."

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Monkey See Monkey Do

August 29, 2011 Added by:J. Oquendo

Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...

Comments  (6)

7fef78c47060974e0b8392e305f0daf0

From China with Love: The Chairman Meow Collection

August 26, 2011 Added by:Infosec Island Admin

China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Cyberspace and 4th Generation Warfare - A Marriage of Convenience

August 25, 2011 Added by:Don Eijndhoven

The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...

Comments  (10)

69dafe8b58066478aea48f3d0f384820

Chinese Documentary Reveals Cyber Attack Software

August 23, 2011 Added by:Headlines

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Calls for Innovation to Protect DoD Systems

August 22, 2011 Added by:Headlines

"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Israeli Cyber Command Plans to Cripple Iran in Cyberspace

August 09, 2011 Added by:Headlines

"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.S. and China are Engaged in a Cyber Cold War

July 29, 2011 Added by:Headlines

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Report: DOD in the Midst of a Global Cyberspace Crisis

July 27, 2011 Added by:Headlines

According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »