Items Tagged with "Cyberwar"


800ca77bf7ad76b2a830356569e524b7

How to Fight and Win the New Cyberwar

August 13, 2012

We are losing the cyberwar. What we are doing now not won't work and can't work because the net-centric defense approach is fundamentally flawed. This presentation includes a history of the battlefield because it's important to understand how we got in this mess in order for us to craft an effective solution...

Comments  (5)

0ff0a77035f9569943049ed3e980bb0d

Hacktivists and Open Source Warfare

August 13, 2012

Recorded PowerPoint presentation on Hacktivists, their motivations, and open source warfare given at the NATO CyCon by Treadstone 71...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Gauss: Evidence of Ongoing Cyberwar and Espionage Campaigns

August 13, 2012 Added by:Pierluigi Paganini

Gauss collects network interface information, BIOS characteristics and computer drive details. Many ignore the aspect of modularity of the agent which may receive supplementary modules developed using the info acquired directly on the targets to conduct attacks against critical infrastructure...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

7fef78c47060974e0b8392e305f0daf0

Malware Wars! Cyber-Wars! Cyber-Espionage-Wars! Oh My...

August 11, 2012 Added by:Infosec Island Admin

We have opened Pandora’s box and there is no way to get what has escaped back in. We have given the weapon framework away due to the nature of the carrier. Even if Gauss is encrypted, it will be broken and then what? Unlike traditional weapons that destroy themselves, the malware we have sent can be reverse engineered...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

State Sponsored Malware Takes Over Mars Rover

August 10, 2012 Added by:J. Oquendo

Many companies will omit many details and shift-slash-skew agendas to meet their concerns. Those concerns will ALWAYS be financial ones. At this point it is obvious that they and only they are capable of detecting the unseen, unheard of, undetectable, uberfilthware capable of infecting curiousity on Mars...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Yourikan Claims Ninety-One Iranian Websites Hacked

August 07, 2012 Added by:Headlines

Pro-Israeli hacker Yourikan (you-r!-k@n) is claiming to have hacked and defaced as many as ninety-one Iranian websites including government, education and business targets in protest of Iran's continued pursuit of nuclear weapons and support for terrorist activities targeting Israel...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Huawei and Cyber Espionage: A Question of Trust But Verify

August 06, 2012 Added by:Infosec Island Admin

We, the US, have unfortunately set ourselves up in a “pay less” mindset that has ha the military buying cheap hardware for missile systems that in the end, failed to launch. Do you want to have the same happen to your router or other hardware that your company relies on? Never mind the whole espionage thing...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber: Boundless Nonsense

July 31, 2012 Added by:Don Eijndhoven

What is neutral behavior in the context of cyber warfare? Are you, as a neutral country obliged to drop all traffic between these two waring nations that crosses your networks? And if you’re not, are you obliged to make sure none of the cyber attacks are originating from compromised systems within your borders?

Comments  (8)

03b2ceb73723f8b53cd533e4fba898ee

Mahdi and AC/DC: The Middle East as a Shooting Range

July 30, 2012 Added by:Pierluigi Paganini

In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...

Comments  (2)

54a9b7b662bfb0f0445d1661d7ed180b

All is Fair in Love and Cyber War

July 27, 2012 Added by:Jayson Wylie

Whether it is financial fraud, economic damage, R&D or Intellectual property loss, espionage for a competitive edge or turning the centrifuges on high, these are all instances of code that cause damage, and it’s too late to say who started it...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »