Blog Posts Tagged with "Cyberwar"
The Three Great Threats to Modern Civilization
April 12, 2018 Added by:Jessica Lavery
There are three main threats to our modern civilization that could cause humanity to go the way of the ancient Mayans.
Comments (0)
Cyderworld as political domain
May 29, 2013 Added by:Jarno Limnéll
Cyber has very often been called the fifth dimension of warfare in today´s world. However, the reality is different. A major misconception is that the logic of cyber war takes place on a different domain, such as a fifth domain, that is totally separate and disconnected from all other forms of warfare, be it land, sea or air space.
Comments (1)
The Danger of Mixing Cyber Espionage with Cyber Warfare
May 22, 2013 Added by:Jarno Limnéll
Cyber espionage does not equate with cyber warfare. Espionage may be carried out by multiple actors for manifold reasons. It does not automatically relate to warfare and plays only a minor part in the vast realm of war.
Comments (6)
Pentagon Ups Cyber Espionage Accusations Against China
May 07, 2013 Added by:InfosecIsland News
A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.
Comments (0)
Cyber Security Goes Ballistic
April 16, 2013 Added by:Jarno Limnéll
Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.
Comments (0)
Sun Tzu and the Art of Cyber-War
March 21, 2013 Added by:Krypt3ia
The overall tactics put forth by the Art of War are applicable because this is warfare we are talking about no matter the landscape (electronic) that we are fighting it in.
Comments (2)
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
March 16, 2013 Added by:Ben Rothke
The notion of advanced persistent threats (APT) and cyber warfare has reached the mainstream press. As nation states are attacking corporate networks, the need to take defensive action is an imperative.
Comments (0)
From Cyber Quarrelling to Cyber Diplomacy
March 15, 2013 Added by:Jarno Limnéll
Cyber quarrelling ‒ lately practiced by the US and China ‒ makes the need for increased openness and international cooperation in the domain clearly evident...
Comments (1)
Symantec Uncovers Earliest Known Version of Stuxnet (Version 0.5)
February 26, 2013 Added by:Mike Lennon
According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.
Comments (0)
Defining the Qualities of Cyber Warfare
February 14, 2013 Added by:Jarno Limnéll
Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.
Comments (1)
Electronic Warfare and Cyber – Uncomfortable Cousins?
January 18, 2013 Added by:Joel Harding
I know the Chinese recently held a military exercise under constrained conditions, they even advertised it ex post facto. Why don’t we? I would see that as the perfect opportunity to increase the cross-pollination, knowledge and appreciation between Electronic Warfare and cyber...
Comments (0)
The Interim Years of Cyberspace - The Quick(er) Version
January 15, 2013 Added by:Robert M. Lee
A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...
Comments (0)
New attacks against banking, cyber Jihad or cyber warfare acts?
December 22, 2012 Added by:Pierluigi Paganini
The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...
Comments (1)
Iran, the cyber shooting range, new malware detected
December 19, 2012 Added by:Pierluigi Paganini
Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...
Comments (4)
The "January Effect" - An Annual Phenomenon Since 2009
December 16, 2012 Added by:Jeffrey Carr
A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...
Comments (1)
Israel’s Cyber Defenses Protect Government Sites from 44 Million Attacks
December 11, 2012 Added by:Dan Dieterle
Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...
Comments (0)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them