Military

Ffc4103a877b409fd8d6da8f854f617e

CrowdStrike Releases Global Threat Report: Tracked More Than 50 Threat Actor Groups in 2013

January 21, 2014 Added by:InfosecIsland News

CrowdStrike's Intelligence Team tracked more than 50 different threat actor groups believed to be behind the majority of sophisticated threats against enterprises in 2013.

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Command’s Budget Doubles

January 20, 2014 Added by:Joel Harding

According to the Washington Post, here, the budget of the US Cyber Command has doubled from $212 million to $447 million. This covers the addition of 4,000 staff personnel, among other things.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

DNP3 Vulnerabilities Part 1 of 2: NERC’s Electronic Security Perimeter is Swiss Cheese

November 07, 2013 Added by:Eric Byres

If you have been following SCADA news in the last month, you might have noticed an avalanche of reports and blogs on new security vulnerabilities in power industry equipment. So far, vulnerability disclosures for 9 products using the DNP3 protocol have been released by the ICS-CERT, with another 21 SCADA product disclosures on their way.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Snowden Effect is Adverse to his Intentions

October 14, 2013 Added by:Jarno Limnéll

Edward Snowden did not restart a cold war nor did he change the reality of international politics. The consequences of his actions will thwart his original intentions.

Comments  (1)

682e0e796084e163c5ca053dd8573b0c

Enough Clucking – Start Fixing the SCADA Security Problem

September 12, 2013 Added by:Eric Byres

I am not a SCADA Apologist. If anything, I consider people like myself and Joel Langill to be SCADA Realists. Clearly Joel and I believe security is important. If we didn’t, we wouldn’t be in this business. And our clients don’t pay us to hear: “Do nothing; it’s the other guy’s fault.”

Comments  (0)

30b156aaa9e421081ba1235658abc523

The Electric Industry: Understanding Cyber Risk is Key to Resource Allocation

August 07, 2013 Added by:Lila Kee

Organizations, especially those involved in the electric industry, must view security investments as a viable risk-reduction tools that not only protect the nation’s way of life, but also investments they have made in their own businesses. To truly understand the risk that critical infrastructures face, and the level of security attention its different sectors require, you must first understand ...

Comments  (0)

A58bf865b185e0e3f665473bf8f3ca6d

Emergency Alerting Systems Found Vulnerable to Remote Attack

July 08, 2013 Added by:Steve Ragan

Digital Alert Systems From Monroe Electronics Contain a Known SSH Private Key and are Vulnerable to Remote Attack

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Resilience ‒ The way to Survive a Cyber Attack

May 07, 2013 Added by:Jarno Limnéll

In reality, a well-prepared cyber attack does not need to last for 15 minutes to succeed. After preparations it takes only seconds to conduct the attack which may hit targets next door as well as those on the other side of the world.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Cyber Security Goes Ballistic

April 16, 2013 Added by:Jarno Limnéll

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

The Fight Against Secret Surveillance Law Continues: EFF Asks D.C. Circuit to Order Release of Secret Legal Opinion

March 19, 2013 Added by:Electronic Frontier Foundation

In a brief filed on Friday, EFF continued its fight against secret surveillance law, asking the D.C. Circuit Court of Appeals to order the release of a secret opinion of the Office of Legal Counsel (OLC).

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Congress is Hurting the U.S. Regarding Cybersecurity

March 19, 2013 Added by:Joel Harding

If Congress doesn’t wake up and begin asking serious questions around cybersecurity, their inattention is going to cause us great harm in the coming years.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Symantec Uncovers Earliest Known Version of Stuxnet (Version 0.5)

February 26, 2013 Added by:Mike Lennon

According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.

Comments  (0)

306708aaf995cf6a77d3083885b60907

China's PLA Behind Massive Cyber Espionage Operation

February 19, 2013 Added by:Mike Lennon

In a fascinating, unprecedented, and statistics-packed report, security firm Mandiant made direct allegations and exposed a multi-year, massive cyber espionage campaign that they say with confidence is the work of China.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked