Blog Posts Tagged with "Cyber Warfare"
June 06, 2011 Added by:Infosec Island Admin
China's Dark Visitor movement of the 1990′s has morphed into a government espionage wing. What was once a loosely affiliated group of patriotic hackers has been honed by the Peoples Liberation Army into a force to be reckoned with on the stage of digital espionage and data theft...
June 01, 2011 Added by:Headlines
“We must plan, train, exercise and operate in a way which integrates our activities in both cyber and physical space. We will grow a cadre of dedicated cyber experts to support our own and allied cyber operations and secure our vital networks...”
May 31, 2011 Added by:Headlines
The report concludes that the Laws of Armed Conflict should also extend to the cyberspace field of operations. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said an unidentified military official...
May 27, 2011 Added by:Headlines
Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...
May 26, 2011 Added by:Headlines
While numerous nations are involved in varying levels of cyber aggression, what makes the Chinese threat so much more palpable is the systemic nature and comparatively large scale of the state-sponsored cyber-offensive operations...
May 15, 2011 Added by:J. Oquendo
Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...
May 11, 2011 Added by:Headlines
"There is a lack of historical precedent for what constitutes traditional military activities in cyberspace... Section (962) would clarify that the Secretary of Defense has the authority to conduct clandestine cyberspace activities in support of military operations..."
May 10, 2011 Added by:Don Eijndhoven
The attacks on the Pentagon networks, the plundering of its email servers, the 2007 attacks on Estonia, the 2008 attacks on Georgia and the 2009 attacks on both the US as well as South Korea should sway any sane person from the notion that cyberwar denial will solve the problem...
May 02, 2011 Added by:Headlines
The Chinese have long seen a tactical cyber offensive capability as being a powerful equalizer in their quest to attain superpower status and undermine the effectiveness of international political rivals. The Chinese strategy extends well beyond potential military targets...
April 28, 2011 Added by:Don Eijndhoven
The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...
April 27, 2011 Added by:Headlines
“It may seem like a small step, but Russians and Americans have never before sat down and really agreed on the terms that are the prerequisite for rules of the road for cyber conflict. Defining terms together is the first step for creating international cybersecurity agreements...”
April 25, 2011 Added by:Headlines
"Certain characteristics about the 'Stars' virus have been identified, including that it is compatible with the (targeted) system. In the initial stage, the damage is low and it is likely to be mistaken for governmental executable files..."
April 21, 2011 Added by:Headlines
Despite continued debate by security experts as to whether the concept of "cyber warfare" appropriately describes military actions conducted in an electronic medium, the Pentagon is moving forward with a declaration that cyberspace will be considered an operational domain...
April 20, 2011 Added by:Infosec Island Admin
Over the years the Chinese have made it their business to steal a lot of data. Some of it you would readily see as important militarily or for industrial espionage, but some of the data is much more arcane as to the reasons why they would make the efforts that they do to get it...
April 18, 2011 Added by:J. Oquendo
The sole purpose of Ensatus is deception and it drives the point of "fail" when it comes to counterattacking. If I were performing a sanctioned penetration test, I would be using decoys. In the event counterattacking were legal, you would be counterattacking an innocent victim...
April 18, 2011 Added by:Headlines
"Iran's Foreign Ministry should probe into the political and legal aspects of the cyber attack while other Iranian bodies should pursue and complain to international circles... Siemens should explain why and how it provided the enemies with the codes for the SCADA software..."
Wanna Buy Some Dumps?... Xenon Jur on 08-21-2014
The Benefits of FUD... willy ben on 08-21-2014
Mobile Security: Tips for Using Personal Dev... sikawai duluan on 08-20-2014