Blog Posts Tagged with "Cyber Warfare"

7fef78c47060974e0b8392e305f0daf0

China’s Rise from Hacking To Digital Espionage

June 06, 2011 Added by:Infosec Island Admin

China's Dark Visitor movement of the 1990′s has morphed into a government espionage wing. What was once a loosely affiliated group of patriotic hackers has been honed by the Peoples Liberation Army into a force to be reckoned with on the stage of digital espionage and data theft...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Governments Escalate Cyber Warfare Rhetoric

June 01, 2011 Added by:Headlines

“We must plan, train, exercise and operate in a way which integrates our activities in both cyber and physical space. We will grow a cadre of dedicated cyber experts to support our own and allied cyber operations and secure our vital networks...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon: Cyber Attacks Considered Act of War

May 31, 2011 Added by:Headlines

The report concludes that the Laws of Armed Conflict should also extend to the cyberspace field of operations. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said an unidentified military official...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO: Cyber Defense and the New Strategic Concept

May 27, 2011 Added by:Headlines

Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Acknowledges Existence of Cyberwarfare Unit

May 26, 2011 Added by:Headlines

While numerous nations are involved in varying levels of cyber aggression, what makes the Chinese threat so much more palpable is the systemic nature and comparatively large scale of the state-sponsored cyber-offensive operations...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Re-Analyzing Cyberdeterrence and Cyberwarfare

May 15, 2011 Added by:J. Oquendo

Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Carry Out Clandestine Operations in Cyberspace

May 11, 2011 Added by:Headlines

"There is a lack of historical precedent for what constitutes traditional military activities in cyberspace... Section (962) would clarify that the Secretary of Defense has the authority to conduct clandestine cyberspace activities in support of military operations..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

U.S. Redefines Cyberspace in an Effort to Deny Cyberwar?

May 10, 2011 Added by:Don Eijndhoven

The attacks on the Pentagon networks, the plundering of its email servers, the 2007 attacks on Estonia, the 2008 attacks on Georgia and the 2009 attacks on both the US as well as South Korea should sway any sane person from the notion that cyberwar denial will solve the problem...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

China Advances Cyber Warfare as Primary Strategy

May 02, 2011 Added by:Headlines

The Chinese have long seen a tactical cyber offensive capability as being a powerful equalizer in their quest to attain superpower status and undermine the effectiveness of international political rivals. The Chinese strategy extends well beyond potential military targets...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber Conflict in Dutch National Risk Assessment of 2010

April 28, 2011 Added by:Don Eijndhoven

The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Joint US - Russian Report on Critical Cyber Terms Released

April 27, 2011 Added by:Headlines

“It may seem like a small step, but Russians and Americans have never before sat down and really agreed on the terms that are the prerequisite for rules of the road for cyber conflict. Defining terms together is the first step for creating international cybersecurity agreements...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Targeted by New Computer Worm in Cyber Attack

April 25, 2011 Added by:Headlines

"Certain characteristics about the 'Stars' virus have been identified, including that it is compatible with the (targeted) system. In the initial stage, the damage is low and it is likely to be mistaken for governmental executable files..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DoD Plans Comprehensive Cyber Security Strategy

April 21, 2011 Added by:Headlines

Despite continued debate by security experts as to whether the concept of "cyber warfare" appropriately describes military actions conducted in an electronic medium, the Pentagon is moving forward with a declaration that cyberspace will be considered an operational domain...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Thousand Grains of Sand in the Electronic Age

April 20, 2011 Added by:Infosec Island Admin

Over the years the Chinese have made it their business to steal a lot of data. Some of it you would readily see as important militarily or for industrial espionage, but some of the data is much more arcane as to the reasons why they would make the efforts that they do to get it...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

The Art of Cyber Warfare: Counterattack Fail

April 18, 2011 Added by:J. Oquendo

The sole purpose of Ensatus is deception and it drives the point of "fail" when it comes to counterattacking. If I were performing a sanctioned penetration test, I would be using decoys. In the event counterattacking were legal, you would be counterattacking an innocent victim...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Iran May Sue Siemens over Stuxnet Virus

April 18, 2011 Added by:Headlines

"Iran's Foreign Ministry should probe into the political and legal aspects of the cyber attack while other Iranian bodies should pursue and complain to international circles... Siemens should explain why and how it provided the enemies with the codes for the SCADA software..."

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »