Blog Posts Tagged with "Attribution"


I Know Who You Hacked Last Summer - Attribution 101

August 18, 2011 Added by:J. Oquendo

The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."

Comments  (7)


How to Be A Private Sector Cyber Mercenary

August 01, 2011 Added by:Kevin McAleavey

Gen. Michael Hayden, former NSA and CIA Director under President Bush, suggested Friday that mercenaries could be the solution to the growing number of digital break-ins. So what happens if we give the "go order" on these only to find out that they bombed a kindergarten with an infected machine?

Comments  (3)


Understanding Offensive Security

June 30, 2011 Added by:Danny Lieberman

“National security authorities may not even acknowledge that their interests align with a company that has suffered a cyber attack; therefore, companies must think about retaliation..."

Comments  (17)


U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)


Lack of Attribution Undermines Clarke's China Warning

June 19, 2011 Added by:J. Oquendo

Richard Clarke should take from the lessons learned via Iraq: Not everything is what it seems. When it comes to a cyber intrusion, all anyone can ever claim is that a computer from "some country" was the source of the attack. The reality is, the attacker could be anyone in the world....

Comments  (0)


Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)


Cyber Warfare Decomposition... Fail

March 23, 2011 Added by:J. Oquendo

Administrators and engineers can and should take an altogether different approach to security. We may never be able to stop random attackers from knocking on our door, we can however stop answering the door. This is another failure from security management right on down to the engineering level...

Comments  (2)


Chinese Officials Deny Role in Attacks on South Korea

March 10, 2011 Added by:Headlines

"You can never judge the origin of attackers from the computer's IP address. A professional hacker can launch cyber attacks from everywhere and disguise himself to be any country's citizens," an anonymous Chinese hacker told the Global Times...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »