Blog Posts Tagged with "Cyber Warfare"

69dafe8b58066478aea48f3d0f384820

Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Deliver Cyber War Policy Brief

July 22, 2011 Added by:Headlines

"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Still Struggling With Stuxnet Virus Infestation

July 21, 2011 Added by:Headlines

"Tehran never did overcome the disruptions caused by Stuxnet or restore its centrifuges to smooth and normal operation as was claimed. Indeed, Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

69dafe8b58066478aea48f3d0f384820

Pentagon Admits Largest-Ever Cyber Theft to Date

July 14, 2011 Added by:Headlines

"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Team Inject0r: The Multinational Connection

July 07, 2011 Added by:Infosec Island Admin

If it was state sponsored hacking as the China connection really does lead me to believe, then we have a new problem, or perhaps this has been the case all along - that the state sponsored hackers have been within Anonymous, using them as cover. "Inj3ctor" has ties to Chinese hackers...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

McAfee: Attacks on South Korea Likely Cyberwar Exercise

July 06, 2011 Added by:Headlines

"This may have been a test of South Korea’s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers... the attack itself was very limited and may have been utilized to test and observe how quickly the attack would be discovered, reverse engineered, and mitigated..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China: There is No Cyber War With the United States

June 22, 2011 Added by:Headlines

"The U.S. military is hastening to seize the commanding military heights... and another Internet war is being pushed to a stormy peak. To protect [China's] Internet security, we must accelerate Internet defense development and accelerate steps to make a strong Internet army..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

InfraGard: Cyberwar Declaration on the Horizon

June 20, 2011 Added by:Headlines

"What does our government or other governments think is an effective deterrent or response to an all out cyber attack? Since we have no good definitions or protocols, I do think that the attack on Lockheed Martin is a sign of the future..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Lack of Attribution Undermines Clarke's China Warning

June 19, 2011 Added by:J. Oquendo

Richard Clarke should take from the lessons learned via Iraq: Not everything is what it seems. When it comes to a cyber intrusion, all anyone can ever claim is that a computer from "some country" was the source of the attack. The reality is, the attacker could be anyone in the world....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Richard Clarke: China's Cyberassault on America

June 17, 2011 Added by:Headlines

"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

My Take on the IMF Hack

June 13, 2011 Added by:Luis Corrons

Even though there are no details on the attack, speculation started talking about a "foreign country" being behind the attack, many fingers pointing at China (as usual) and talking about cyberwarfare. But it also makes sense that this is not a targeted attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Linked to RSA and Defense Contractor Breaches

June 07, 2011 Added by:Headlines

"If it's any kind of military espionage, military adversaries are going to be high on the list. The question then is who in China--is it government agents or independent contractors selling to the Chinese government?" asked Veracode's Chris Wysopal...

Comments  (3)

Page « < 3 - 4 - 5 - 6 - 7 > »