Items Tagged with "Military"
October 10, 2011 Added by:Ron Baklarz
We will probably never know how the infections occurred. Were vendor support connections the cause? Was an infected thumb drive or disk the culprit? At any rate, these types of incidents underscore the enemy's desire to exploit cyber-security to their advantage...
October 03, 2011 Added by:Joel Harding
What does Iran mean by ‘We will retaliate in cyberspace’? Iran has a record of Shamshir rattling and ‘trash talk’. Yes, Iran has formed a cyber command. Yes, there is a hacker group called the Iranian Cyber Army, and they were defacing pages in China and even took down Baidu...
September 27, 2011 Added by:Joel Harding
Four years ago a few of us were pulled into a STRATCOM study group and I coughed up a furball when the idea of a cyber militia was surfaced. I thought the press would have a field day with that concept and it would be a PR fiasco. Now I’m not too sure...
September 27, 2011 Added by:Don Eijndhoven
A small sum, but considerable in the face of ongoing budget cuts at the Dutch Ministry of Defense. One has to wonder though, with all that has been going on the last few years, what will be done with a mere € 2 million for an entire year. This would pay for roughly 10 people and some hardware...
September 15, 2011 Added by:Joel Harding
Iran has already begun deployment of cyber forces in small teams throughout the world to avoid devastation if the networks internal to Iran are crippled. A myriad of intelligence agencies are gathering as much intelligence as possible for a possible war in cyberspace with Iran...
September 01, 2011 Added by:Scot Terban
Some of these sites contain the works of friends of mine in the security community that they have posted as research. We have areas where the jihadi’s have an assortment of upload/download sites for malware, but some of the newer posts have malware and creation kits that are up to standard...
September 01, 2011 Added by:Joel Harding
While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...
August 23, 2011 Added by:Headlines
"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...
August 15, 2011 Added by:Dan Dieterle
Congress has created a requirement that 1/3 of ALL military ground vehicles be automated or unmanned by 2015. Are automated systems susceptible to malfunctions, glitches or software errors? Are there any instances of these systems turning on their creator? Unfortunately, yes...
August 09, 2011 Added by:Headlines
"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."
August 04, 2011 Added by:Dan Dieterle
In the attack, power use is monitored during the power up sequence of the chip. As it is powered up, the chip accesses a key used to decrypt the configuration data file and data stream. By analyzing the power used, the team was able to decrypt the key...
July 16, 2011 Added by:Headlines
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...
July 15, 2011 Added by:Headlines
"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."
July 12, 2011 Added by:Headlines
"Booz Allen Hamilton has confirmed today that the posting of certain data files on the Internet yesterday was the result of an illegal attack. We are conducting a full review of the nature and extent of the attack..."
July 08, 2011 Added by:Headlines
A new ad-hoc group of hacktivists calling itself "Connexion Hack Team" has published a list of email addresses associated with the US government including account information from the military, the Department of Homeland Security, the National Security Agency, and several state agencies...