Items Tagged with "Attacks"


Ask The Experts: Workstation Malware

October 04, 2012 Added by:Brent Huston

Once we’ve embraced the fact that we need better detection and response mechanisms, we start to see how honeypots can help us but also how creating better awareness within our users can be the greatest investment an organization might make in detection...

Comments  (0)


No Surprise - Ransomware On the Rise

October 04, 2012 Added by:Robert Siciliano

Data can sometimes be held hostage with the help of ransomware, software that infiltrates your com­puter when you download an infected attachment or clicking a link within the body of an email. You can also get ransomware simply by visiting the wrong website, in what is called a drive-by...

Comments  (1)


How to Protect against Denial of Service Attacks: Refresher

October 03, 2012 Added by:Stephen Marchewitz

In order to mitigate this threat, ISPs will need to combine their efforts. It would take a global effort on the part of the ISPs. Until then, the capabilities are there to deal with the issue when it arises on a per incident basis...

Comments  (3)


Chinese Hack Energy Company, Attack Pentagon, Try to Steal Stealth Bomber Skin

October 03, 2012 Added by:Dan Dieterle

China is well know for trying to steal military and scientific research, in an attempt to catch up on technology. How successful have they been? Just check out this cockpit comparison between China’s new Chengdu J-20 Stealth Fighter and the US F-22 Raptor...

Comments  (1)


Correlating and Escalating Cyber

October 02, 2012 Added by:Don Eijndhoven

So here we have a rather clear-cut case of attacker correlation which, as ever, is done pretty much after the fact by an international firm who investigated the malware. My question is: How do you deal with this as a nation, as it happens?

Comments  (7)


Chinese cyber attack against the White House

October 02, 2012 Added by:Pierluigi Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)


We're Under Cyber Attack INSIDE America!

October 01, 2012 Added by:Doug DePeppe

Cyberattacks are mounting. They are getting more severe, and indicate nation-state support, reportedly from Iran. The US national strategy must change. It must address the need for capability where harm from an attack on critical infrastructure will be felt in communities across America...

Comments  (4)


Concerted Chinese Government Attacks or Just Another Day?

October 01, 2012 Added by:Marc Quibell

Front page news headlines today: "Chinese Hackers Breach White House!" For a split second there I was almost concerned; and then after reading I thought to myself...blah another false alarm. What did I expect?

Comments  (2)


Energy Sector Cyber Espionage: Chinese Hackers are not Alone

September 29, 2012 Added by:Pierluigi Paganini

Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems...

Comments  (0)


Surviving a Public Infrastructure or Energy Grid Attack

September 27, 2012 Added by:Dan Dieterle

What would you do if the lights suddenly went out? Where would you get news from? Or more importantly water? Keep cool or get heat? Though many disregard warnings about critical infrastructure attacks what if the worst did happen, would you be prepared?

Comments  (2)


The Wicked Witches of Cyberspace

September 27, 2012 Added by:Joel Harding

Lately I’ve been doing a deep dive on technologies that enable one to bypass filters, blocking and jamming, to get uncensored information into denied areas. When we use these technologies it is on behalf of goodness, apple pie and the American way. When someone else does its nefarious...

Comments  (0)


Video: Do I Have to Secure All My Applications?

September 24, 2012

Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...

Comments  (0)


Iran Increasing Tensions: Cyber Perspective

September 24, 2012 Added by:Pierluigi Paganini

A massive cyber attack could increase hostilities, anticipating a conventional strike, but the Government of Teheran is showing awareness of risks related to a cyber attack and it has started a massive propaganda campaign to show to the western world its cyber capabilities...

Comments  (4)


How to PWN Systems Through Group Policy Preferences

September 20, 2012 Added by:Jeff McCutchan

All users have read access to the SYSVOL share of the domain controller. Forget about password cracking or passing the hash, you just get the cleartext password. A simple search for “*.xml” in the SYSVOL share on the domain controller will show if your organization is vulnerable...

Comments  (0)


How We Might Wage War in Cyberspace

September 19, 2012 Added by:Joel Harding

With the way US forces are distributed globally, cyber capabilities and flexibilities are enhanced. Cyber, both offense and defense, can be launched from anywhere. All Combatant Commanders have liaisons and representative elements with geographic commands, Cyber Command is no different...

Comments  (0)


War in Cyberspace is about Definitions

September 18, 2012 Added by:Joel Harding

We are stuck in “Definitional Wars” or the struggle to get definitions approved that are not only accurate but widely accepted. A bigger problem is the constant evolution of technology and terminology, by the time a definition is published, it is usually obsolete...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »