Items Tagged with "Cyber Warfare"


69dafe8b58066478aea48f3d0f384820

Chinese Documentary Reveals Cyber Attack Software

August 23, 2011 Added by:Headlines

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Calls for Innovation to Protect DoD Systems

August 22, 2011 Added by:Headlines

"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Israeli Cyber Command Plans to Cripple Iran in Cyberspace

August 09, 2011 Added by:Headlines

"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.S. and China are Engaged in a Cyber Cold War

July 29, 2011 Added by:Headlines

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Report: DOD in the Midst of a Global Cyberspace Crisis

July 27, 2011 Added by:Headlines

According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Web Application Attacks Can Peak at 25,000 an Hour

July 25, 2011 Added by:Headlines

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Deliver Cyber War Policy Brief

July 22, 2011 Added by:Headlines

"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Still Struggling With Stuxnet Virus Infestation

July 21, 2011 Added by:Headlines

"Tehran never did overcome the disruptions caused by Stuxnet or restore its centrifuges to smooth and normal operation as was claimed. Indeed, Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

69dafe8b58066478aea48f3d0f384820

Pentagon Admits Largest-Ever Cyber Theft to Date

July 14, 2011 Added by:Headlines

"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Team Inject0r: The Multinational Connection

July 07, 2011 Added by:Infosec Island Admin

If it was state sponsored hacking as the China connection really does lead me to believe, then we have a new problem, or perhaps this has been the case all along - that the state sponsored hackers have been within Anonymous, using them as cover. "Inj3ctor" has ties to Chinese hackers...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

McAfee: Attacks on South Korea Likely Cyberwar Exercise

July 06, 2011 Added by:Headlines

"This may have been a test of South Korea’s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers... the attack itself was very limited and may have been utilized to test and observe how quickly the attack would be discovered, reverse engineered, and mitigated..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China: There is No Cyber War With the United States

June 22, 2011 Added by:Headlines

"The U.S. military is hastening to seize the commanding military heights... and another Internet war is being pushed to a stormy peak. To protect [China's] Internet security, we must accelerate Internet defense development and accelerate steps to make a strong Internet army..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

InfraGard: Cyberwar Declaration on the Horizon

June 20, 2011 Added by:Headlines

"What does our government or other governments think is an effective deterrent or response to an all out cyber attack? Since we have no good definitions or protocols, I do think that the attack on Lockheed Martin is a sign of the future..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »