Items Tagged with "Cyberwar"


Gauss Malware and Shadow Warfare

August 14, 2012 Added by:Joel Harding

The International Telegraph Union is the world’s telecommunication governing body. The United States is actively resisting them as the governing body. With Kaspersky’s Gauss discovery, the United States’ argument grows weaker. The US recognizes the advantage it has by having de facto control over the internet...

Comments  (0)


How to Fight and Win the New Cyberwar

August 13, 2012

We are losing the cyberwar. What we are doing now not won't work and can't work because the net-centric defense approach is fundamentally flawed. This presentation includes a history of the battlefield because it's important to understand how we got in this mess in order for us to craft an effective solution...

Comments  (5)


Hacktivists and Open Source Warfare

August 13, 2012

Recorded PowerPoint presentation on Hacktivists, their motivations, and open source warfare given at the NATO CyCon by Treadstone 71...

Comments  (1)


Gauss: Evidence of Ongoing Cyberwar and Espionage Campaigns

August 13, 2012 Added by:Pierluigi Paganini

Gauss collects network interface information, BIOS characteristics and computer drive details. Many ignore the aspect of modularity of the agent which may receive supplementary modules developed using the info acquired directly on the targets to conduct attacks against critical infrastructure...

Comments  (0)


Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)


Malware Wars! Cyber-Wars! Cyber-Espionage-Wars! Oh My...

August 11, 2012 Added by:Infosec Island Admin

We have opened Pandora’s box and there is no way to get what has escaped back in. We have given the weapon framework away due to the nature of the carrier. Even if Gauss is encrypted, it will be broken and then what? Unlike traditional weapons that destroy themselves, the malware we have sent can be reverse engineered...

Comments  (0)


State Sponsored Malware Takes Over Mars Rover

August 10, 2012 Added by:J. Oquendo

Many companies will omit many details and shift-slash-skew agendas to meet their concerns. Those concerns will ALWAYS be financial ones. At this point it is obvious that they and only they are capable of detecting the unseen, unheard of, undetectable, uberfilthware capable of infecting curiousity on Mars...

Comments  (1)


Yourikan Claims Ninety-One Iranian Websites Hacked

August 07, 2012 Added by:Headlines

Pro-Israeli hacker Yourikan (you-r!-k@n) is claiming to have hacked and defaced as many as ninety-one Iranian websites including government, education and business targets in protest of Iran's continued pursuit of nuclear weapons and support for terrorist activities targeting Israel...

Comments  (0)


Huawei and Cyber Espionage: A Question of Trust But Verify

August 06, 2012 Added by:Infosec Island Admin

We, the US, have unfortunately set ourselves up in a “pay less” mindset that has ha the military buying cheap hardware for missile systems that in the end, failed to launch. Do you want to have the same happen to your router or other hardware that your company relies on? Never mind the whole espionage thing...

Comments  (0)


What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)


Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)


Cyber: Boundless Nonsense

July 31, 2012 Added by:Don Eijndhoven

What is neutral behavior in the context of cyber warfare? Are you, as a neutral country obliged to drop all traffic between these two waring nations that crosses your networks? And if you’re not, are you obliged to make sure none of the cyber attacks are originating from compromised systems within your borders?

Comments  (8)


Mahdi and AC/DC: The Middle East as a Shooting Range

July 30, 2012 Added by:Pierluigi Paganini

In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...

Comments  (2)


All is Fair in Love and Cyber War

July 27, 2012 Added by:Jayson Wylie

Whether it is financial fraud, economic damage, R&D or Intellectual property loss, espionage for a competitive edge or turning the centrifuges on high, these are all instances of code that cause damage, and it’s too late to say who started it...

Comments  (0)


UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)


English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »