Items Tagged with "Attacks"


850c7a8a30fa40cf01a9db756b49155a

Cybersecurity and the U.S. House of Nonsense

June 02, 2011 Added by:J. Oquendo

When it comes to mission critical, sensitive information, why are government officials using anything outside of vetted networks, connections, and / or software. This is not only puzzling but borders on outright stupidity and negligence...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Sony Rep to Testify for Congress About Network Breach

June 01, 2011 Added by:Headlines

"We do not know who was responsible for the intrusion; nor do we know precisely the amount of information that was taken... These gaps in what we know are not for lack of trying by experts, but rather an unfortunate testament to the skill of those who perpetrated the attacks..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Improvised Cyber Exploitation Devices

May 31, 2011 Added by:J. Oquendo

It should come as no surprise that ModSecurity is not an offensive tool. Far from it however, I am going to use it as a method to redirect my targets over to my Metasploit machine. My goal is to explain the use a of defensive tool for offensive purposes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon: Cyber Attacks Considered Act of War

May 31, 2011 Added by:Headlines

The report concludes that the Laws of Armed Conflict should also extend to the cyberspace field of operations. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said an unidentified military official...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO: Cyber Defense and the New Strategic Concept

May 27, 2011 Added by:Headlines

Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Sony's Catastrophic Security Problem - The End Game

May 26, 2011 Added by:Rafal Los

Hacking incidents tend to have a short-term impact on a business and rarely impact the long-term viability of a large organization. What I suspect may happen here is an event or exfiltration of data so catastrophic that it may actually impact Sony's long-term viability...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Sony Networks Hit Twice More By Hackers

May 23, 2011 Added by:Headlines

"It is nearly impossible to run a totally secure Web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO's Mutual Defense Doctrine Applies to Cyberspace

May 17, 2011 Added by:Headlines

"Cyberspace activities can have effects extending beyond networks; such events may require responses in self-defense. Likewise, interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Re-Analyzing Cyberdeterrence and Cyberwarfare

May 15, 2011 Added by:J. Oquendo

Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Just How Overrated is Cyberspace Doomsday?

May 12, 2011 Added by:J. Oquendo

These environments are very complex. There would need to be years of reconnaissance with heavy financial investments to pull off a successful attack. Any attacker would have to cross their fingers and hope that their target did not upgrade, migrate, or change software...

Comments  (5)

44a2e0804995faf8d2e3b084a1e2db1d

U.S. Redefines Cyberspace in an Effort to Deny Cyberwar?

May 10, 2011 Added by:Don Eijndhoven

The attacks on the Pentagon networks, the plundering of its email servers, the 2007 attacks on Estonia, the 2008 attacks on Georgia and the 2009 attacks on both the US as well as South Korea should sway any sane person from the notion that cyberwar denial will solve the problem...

Comments  (5)

F520f65cba281c31e29c857faa651872

Chinese Hackers Are Hungry for Information

May 06, 2011 Added by:Rahul Neel Mani

Stuart McClure, Senior Vice President at McAfee co-authored his best-selling book Hacking Exposed: Network Security Secrets & Solutions 12 years ago. In an interview with Varun Aggarwal, he talks about how things have changed since then as he launched the new edition of his book...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Planning Third Attack on Sony Networks

May 06, 2011 Added by:Headlines

A third attack is planned against Sony's Web site. The people involved plan to publicize all or some of the information, which could include customer names, credit card numbers, and addresses, according to the source. The hackers claim they currently have access to some of Sony's servers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Multi-platform Java Botnet Targets Widows and Mac OSX

May 06, 2011 Added by:Headlines

Multi-platform malware is not entirely new, but with the increasing popularity of Apple products in the marketplace, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Nine Deadly Cyberwarfare Sins

May 05, 2011 Added by:J. Oquendo

In a conventional war, superpowers still have deterrents: nuclear weapons, financial fallout and so on. In a cyberwar, there is nothing more than imagined deterrents because as an attacker, anonymity will reign supreme. Deterrents do not apply on the cyber battlefield...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Do You Really Know What’s on Your Network?

May 05, 2011 Added by:Global Knowledge

A simple Android app called Caribou is able to open doors with a simple push of a button once the IP address of the server is identified. When you think of the number of access card systems installed in HOA’s and businesses across the nation, the enormity of the risk becomes easily apparent...

Comments  (0)

Page « < 28 - 29 - 30 - 31 - 32 > »