Blog Posts Tagged with "Attribution"

850c7a8a30fa40cf01a9db756b49155a

I Know Who You Hacked Last Summer - Attribution 101

August 18, 2011 Added by:J. Oquendo

The media, security companies, and the “Cybersecurity Industrial Complex” labels almost all attacks as Advanced Persistent Threats almost always originating from China. The mechanism for identifying the attackers is always the same: "The attacker came from the following IP address..."

Comments  (7)

Ba829a6cb97f554ffb0272cd3d6c18a7

How to Be A Private Sector Cyber Mercenary

August 01, 2011 Added by:Kevin McAleavey

Gen. Michael Hayden, former NSA and CIA Director under President Bush, suggested Friday that mercenaries could be the solution to the growing number of digital break-ins. So what happens if we give the "go order" on these only to find out that they bombed a kindergarten with an infected machine?

Comments  (3)

959779642e6e758563e80b5d83150a9f

Understanding Offensive Security

June 30, 2011 Added by:Danny Lieberman

“National security authorities may not even acknowledge that their interests align with a company that has suffered a cyber attack; therefore, companies must think about retaliation..."

Comments  (17)

69dafe8b58066478aea48f3d0f384820

U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Lack of Attribution Undermines Clarke's China Warning

June 19, 2011 Added by:J. Oquendo

Richard Clarke should take from the lessons learned via Iraq: Not everything is what it seems. When it comes to a cyber intrusion, all anyone can ever claim is that a computer from "some country" was the source of the attack. The reality is, the attacker could be anyone in the world....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyber Warfare Decomposition... Fail

March 23, 2011 Added by:J. Oquendo

Administrators and engineers can and should take an altogether different approach to security. We may never be able to stop random attackers from knocking on our door, we can however stop answering the door. This is another failure from security management right on down to the engineering level...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Chinese Officials Deny Role in Attacks on South Korea

March 10, 2011 Added by:Headlines

"You can never judge the origin of attackers from the computer's IP address. A professional hacker can launch cyber attacks from everywhere and disguise himself to be any country's citizens," an anonymous Chinese hacker told the Global Times...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »