Blog Posts Tagged with "Cyberwar"
May 29, 2013 Added by:Jarno Limnéll
Cyber has very often been called the fifth dimension of warfare in today´s world. However, the reality is different. A major misconception is that the logic of cyber war takes place on a different domain, such as a fifth domain, that is totally separate and disconnected from all other forms of warfare, be it land, sea or air space.
May 22, 2013 Added by:Jarno Limnéll
Cyber espionage does not equate with cyber warfare. Espionage may be carried out by multiple actors for manifold reasons. It does not automatically relate to warfare and plays only a minor part in the vast realm of war.
May 07, 2013 Added by:InfosecIsland News
A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.
April 16, 2013 Added by:Jarno Limnéll
Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.
March 16, 2013 Added by:Ben Rothke
The notion of advanced persistent threats (APT) and cyber warfare has reached the mainstream press. As nation states are attacking corporate networks, the need to take defensive action is an imperative.
February 26, 2013 Added by:Mike Lennon
According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.
January 18, 2013 Added by:Joel Harding
I know the Chinese recently held a military exercise under constrained conditions, they even advertised it ex post facto. Why don’t we? I would see that as the perfect opportunity to increase the cross-pollination, knowledge and appreciation between Electronic Warfare and cyber...
January 15, 2013 Added by:Robert M. Lee
A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...
December 22, 2012 Added by:Pierluigi Paganini
The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...
December 19, 2012 Added by:Pierluigi Paganini
Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...
December 16, 2012 Added by:Jeffrey Carr
A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...
December 11, 2012 Added by:Dan Dieterle
Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...
December 09, 2012 Added by:Jayson Wylie
This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015