Items Tagged with "Cyberwar"


03b2ceb73723f8b53cd533e4fba898ee

New weapons for cyber warfare. The CHAMP project

December 05, 2012 Added by:Pierluigi Paganini

Cyber warfare scenario is rapidly changing, governments all around the world are investing to increase their cyber capabilities and designing new tools to adopt in cyberspace to face with opponents in what is considered the fifth domain of warfare...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Proactive defense, humans or machines… that’s the question

November 27, 2012 Added by:Pierluigi Paganini

Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be instantaneous to avoid the destruction of assets and resources. The human factor could represent an element of delay...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Defending Your Digital Domain Redux: Take 2

November 21, 2012 Added by:Rafal Los

I'll start with I'm not an expert on 'cyber warfare' or a lawyer offering legal advice, in fact I'd simply rather not touch that whole angle at all. I'm much more comfortable addressing this issue as it came up today from a more sensible perspective. What follows in this post is an editorial opinion...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber espionage attack against Israel is not an isolated event

November 14, 2012 Added by:Pierluigi Paganini

The Middle East is the scene of a series of cyber attacks that hit Israeli and Palestinian systems apparently having a common origin. A group of experts from Norwegian antivirus and security firm Norman ASA have discovered a new cyber espionage campaign against the countries that used various malware to spy on victims...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

US Responses to Cyberattacks – Circus du Jour

October 31, 2012 Added by:Joel Harding

Who is in charge? Don’t answer that, you don’t want to know. Who is in charge of our national response to anything? It depends? What do you mean? Do you mean to say that there is no one person or office, no agency or even a department with the mission of coordinating a national response?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Israel vs Iran.The strategic importance of 5° domain,the cyberspace

October 31, 2012 Added by:Pierluigi Paganini

Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in fact, both states are boosting investment in the development of their cyber capabilities...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Threat Is Real and Must Be Stopped: Clarifications And Rebuttal by an INFOSEC Professional DRAFT II

October 22, 2012 Added by:Infosec Island Admin

So far though Senator Lieberman I have only seen gross generalities out of you and others about how dire things are and how scared we all should be. Your hue and cry ultimately lacks any hard evidence for any of us to stand behind as that the issue is real and it is so prescient that action must be taken post haste...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Difficulties with Attribution in a Digital World

October 16, 2012 Added by:Rafal Los

Attribution is necessary for secondary action, but not always for defense. Secondary action being retaliation, accountability, prosecution, etc. It's more important at the instant of attack to be able to make the attack stop, then afterwards be able to move on and assign blame and make the legal case...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame, miniFlame, the mystery of an on going cyber espionage campaign

October 16, 2012 Added by:Pierluigi Paganini

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new malware which hit the country named Flame, also known as Flamer or Skywiper. Kaspersky Lab and CrySyS Lab also identified the malware, recognized as a powerful cyber espionage tool that hit mainly Windows systems in the Middle East...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Secretary of Defense Panetta on U.S. Cyber Capabilities

October 15, 2012 Added by:Pierluigi Paganini

Panetta has warned of cyber attacks against critical infrastructure and that opponents are increasing their cyber capabilities and represent a serious menace. The words used last Thursday are very strong: The US is in a “pre-9/11 moment,” referring to a possible series of cyber attacks...

Comments  (4)

44a2e0804995faf8d2e3b084a1e2db1d

Social Media as a Cyber Warfare Gamechanger

October 14, 2012 Added by:Don Eijndhoven

Is some creative type with a long exposure to really unconventional warfare getting his cues from a government with a score to settle, and deep pockets to fund the whole thing? It’s a scary thought. If used properly, Social Media might very well be the most refined weapon for asymmetric warfare to date...

Comments  (3)

76e662e7786bf88946bd6c010c03ac65

Offensive Cyber Capabilities Need to be Built and Exposed Because of Deterrence

October 09, 2012 Added by:Jarno Limnéll

Cyberspace, the fifth dimension of warfare, has already become an important arena of world politics, especially since we are living in a time in which the lines between war and peace have blurred. The digital world has become a domain where strategic advantage can be either lost or won...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Attacks Cause Serious Damage to Internet Connection in Iran

October 05, 2012 Added by:Pierluigi Paganini

Iran was recently blamed for attacks onoil companies and banks. This time the scenario appears reversed, as attacks targeted Iranian infrastructure and communications, causing serious damages to Internet connections...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber War: Fact from Fiction in the shadow of the Tallinn Manual

October 04, 2012 Added by:Rafal Los

Are we involved in open cyber warfare? Definitely not. We are definitely involved in a Cold War style set of guerilla incursions aimed at strategic assets for espionage or financial damage. This hasn't yet moved direct confrontation - but that may simply be a matter of time...

Comments  (3)

B64e021126c832bb29ec9fa988155eaf

Chinese Hack Energy Company, Attack Pentagon, Try to Steal Stealth Bomber Skin

October 03, 2012 Added by:Dan Dieterle

China is well know for trying to steal military and scientific research, in an attempt to catch up on technology. How successful have they been? Just check out this cockpit comparison between China’s new Chengdu J-20 Stealth Fighter and the US F-22 Raptor...

Comments  (1)

70830de61015ee5312d58e6a9e0254ae

We're Under Cyber Attack INSIDE America!

October 01, 2012 Added by:Doug DePeppe

Cyberattacks are mounting. They are getting more severe, and indicate nation-state support, reportedly from Iran. The US national strategy must change. It must address the need for capability where harm from an attack on critical infrastructure will be felt in communities across America...

Comments  (4)

Page « < 1 - 2 - 3 - 4 - 5 > »