Blog Posts Tagged with "Attribution"

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats: The Butler in China Did It

March 05, 2012 Added by:J. Oquendo

Aside from the attack coming from a Philips Electronics' Chinese-based IP block, I am positive that whoever was behind the attack was not an employee. Someone probably compromised a machine at Philips and was using it to attack the PBX I managed. Nothing more, and nothing less...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Real Bullets for Digital Attacks

February 09, 2012 Added by:Don Eijndhoven

In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

48ee5cc2faa38ddec15846777f57f1a6

Hidebound Governments Unprepared for Cyber Threats

February 05, 2012 Added by:James Colbert

“Even if they brilliantly secure their networks, the greatest threat that organizations face is that they are still vulnerable if their minimum wage security guards are disgruntled or their physical access control systems can be easily bypassed...”

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Criticality of Attribution in Volatile Situations

January 22, 2012 Added by:Rafal Los

Imagine when a kinetic act causing loss of life is falsely attributed to a group, and because of the situation, human nature takes over. Assigning responsibility even when it's false is all the "evidence" we need to go to war or retaliate. Same with a hacked website...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

US vs The World - The Cyber Monroe Doctrine

January 10, 2012 Added by:Don Eijndhoven

Not unlike other testimonies on the subject of Cyber Warfare and Cyber Doctrine coming from the US, we see a very 'red-blooded American' attitude seeping through, and quite frankly that's not helping matters...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Secretary Panetta: Cyber Attack Could Paralyze US

January 06, 2012 Added by:Headlines

"I think we have to be prepared not only to defend against that kind of attack but if necessary we are going to have to be prepared to be able to be aggressive when it comes to cyber efforts as well. We've got to develop the technology, the capability, we've got to be able to defend this country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Collision of Physical and Digital Defenses

November 30, 2011 Added by:Rafal Los

With all the SCADA hacking lately we have to let reason guide us, and emphasize temperance while we develop our own defensive capability in the digital age. It's too easy to just say "strike the attacker" but much harder when that attacker is a virtual ghost in the fabric of cyberspace...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Neuromancing The Cyberwars

November 17, 2011 Added by:Infosec Island Admin

It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NATO Drafting Cyber Warfare International Law Manual

November 15, 2011 Added by:Headlines

"The manual is meant to address all the legal issues under a framework of both international use-of-force law and international humanitarian law... it examines related problems such as sovereignty, state responsibility and neutrality... [and] especially those regarding retaliation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mikko Hypponen Warns of Adobe Reader Threats

November 11, 2011 Added by:Headlines

F-Secure's Mikko Hypponen urged organizations to reconsider the continued use of Adobe Reader given the tendency for attackers to exploit the application's frequent vulnerabilities. "These attacks are not against PDF - these attacks are against Adobe Reader," said Hypponen...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island's Position on Plagiarism

October 20, 2011 Added by:Infosec Island Admin

Occasionally it comes to our attention that material submitted for publication by a member may contain instances of unattributed content. Infosec Island's policy is to immediately remove the offending content to preserve the original author's copyright...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

RSA Attack: All That Glitters Isn't China

September 07, 2011 Added by:J. Oquendo

RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Monkey See Monkey Do

August 29, 2011 Added by:J. Oquendo

Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...

Comments  (6)

Page « < 1 - 2 - 3 - 4 > »