Blog Posts Tagged with "cyber weapon"

Bd623fa766512fdf6b57db66f522b741

Stuxnet: Tsunami of Stupid or Evil Genius?

June 01, 2012 Added by:Ali-Reza Anghaie

We just compounded ugly. Weaponizing Cyberspace is a losing proposition across the board but it's still going to happen. I was just hoping we'd cut it a bit short and realize the errors - this NYT piece makes me feel like we don't have enough depth in DC to realize the risks before it's too late...

Comments  (7)

296634767383f056e82787fcb3b94864

Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber Weapons - Bits Instead of Bullets Damage Nonetheless

May 03, 2012 Added by:Rafal Los

In this post I discuss some of the ramifications of digital weapons and put into context just what this means for your enterprise security strategy as your organization continues towards cloud/utility computing, mobility, and a larger presence on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Military Advocates Cyber Offensive Capability

May 02, 2012 Added by:Headlines

“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran vs. The West: Cyberwar or Media Hype?

April 27, 2012 Added by:Pierluigi Paganini

The growing tension between Iran, the U.S. and Israel does not bode well, however the reports persistently circulated on the Internet don't add anything new to a scenario that has long been known. Iran has long understood how strategic a strong presence in cyber space is...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Testimony: Iran Preparing Attacks on U.S. Infrastructure

April 26, 2012 Added by:Headlines

Cybersecurity experts will testify before Congress today on the high probability that the Iranian government is engaged in building a cyber offensive force geared towards attacks against critical U.S. infrastructure targets including power and water distribution facilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Ten Takeaways from the Tilded Platform

April 02, 2012 Added by:Robert M. Lee

Stuxnet had a major impact on ICS/SCADA. It revealed vulnerabilities that many cyber security experts in that community had been warning about for years. Moreover, it showed that nation-states are willing to target these systems if it helps the success of a mission...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

What are Cyber Weapons?

March 14, 2012 Added by:Dan Dieterle

"Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the received wisdom on cyber-security..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Cyber Arms Race: Casting Shadows on the Future

March 01, 2012 Added by:Pierluigi Paganini

We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Real Bullets for Digital Attacks

February 09, 2012 Added by:Don Eijndhoven

In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Pierluigi Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

When a Tool Becomes a Weapon

February 01, 2012 Added by:Alan Woodward

The Metasploit Project is an extremely valuable tool. However, a recent development which was revealed demonstrates just how easily the Metasploit Framework can be used to develop malicious payloads that avoid detection by the usual Anti-Virus and Firewall software...

Comments  (1)

Page « < 1 - 2 - 3 - 4 > »