Blog Posts Tagged with "Israel"
December 11, 2012 Added by:Dan Dieterle
Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...
October 31, 2012 Added by:Pierluigi Paganini
Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in fact, both states are boosting investment in the development of their cyber capabilities...
August 26, 2012 Added by:Richard Stiennon
Carbon whiskers unleashed to disable transformers? Oh yes. Just a few grams got released into the atmosphere and shorted out transformers throughout the Pacific Northwest. I do not like the idea of kilograms of this escaping the target area. It could be decades before power grids are free of this menace...
August 18, 2012 Added by:Pierluigi Paganini
It is expected that in the first phase of an offensive against Iran, Israel will conduct a cyber attack of impressive dimensions with the intent to paralyze the country by knocking out the Internet, all communications and other critical infrastructure. This is the new way to engage in a war...
August 17, 2012 Added by:Joel Harding
"Silverstein claims to have obtained an Israeli briefing document outlining the Jewish state’s war plans against Iran, which, according to him, include the launching of dozens of missiles, an aerial attack, a sophisticated cyber attack and even the assassination of senior Iranian military and intelligence officials..."
August 07, 2012 Added by:Headlines
Pro-Israeli hacker Yourikan (you-r!-k@n) is claiming to have hacked and defaced as many as ninety-one Iranian websites including government, education and business targets in protest of Iran's continued pursuit of nuclear weapons and support for terrorist activities targeting Israel...
May 29, 2012 Added by:Headlines
"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."
April 17, 2012 Added by:Dan Dieterle
“Using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. 'Iranian double agents' would have helped to target the most vulnerable spots in the system...”
February 07, 2012 Added by:Pierluigi Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
February 05, 2012 Added by:James Colbert
“Even if they brilliantly secure their networks, the greatest threat that organizations face is that they are still vulnerable if their minimum wage security guards are disgruntled or their physical access control systems can be easily bypassed...”
January 29, 2012 Added by:Rafal Los
You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...
January 20, 2012 Added by:Infosec Island Admin
The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?
January 19, 2012 Added by:Infosec Island Admin
There was the dropping of the SCADA passwords recently, and that is more along the lines of doing something. As I wrote recently about cyberwar, the real aegis is to damage infrastructure, supply chain failure, and in the end invade or conduct military operations...
January 10, 2012 Added by:Headlines
In a tit for tat type move, Pro-Israeli hackers breached Saudi shopping sites and that they have thousands of Saudi credit cards. “If the leaks continue, we will cause severe damage to the privacy of Saudi citizens,” one of the Israeli’s stated...
January 08, 2012 Added by:Danny Lieberman
The biggest vulnerability of PCI DSS is that it’s about 10 years behind the curve. When people in the PCI DSS Security Council in Europe confess to never having heard of DLP and when the standard places an obsessive emphasis on anti-virus, you know you're still in Kansas...
December 19, 2011 Added by:Headlines
The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...
Amphion Forum Highlights Promise and Problem... Margot Bertin on 12-19-2014
Wireless Home Technologies Create Security R... Bill Phillips on 12-19-2014
Mobile Security Processes Could Be Applied t... Lukas Ho on 12-19-2014