Blog Posts Tagged with "Cyberwar"

76e662e7786bf88946bd6c010c03ac65

Cyderworld as political domain

May 29, 2013 Added by:Jarno Limnéll

Cyber has very often been called the fifth dimension of warfare in today´s world. However, the reality is different. A major misconception is that the logic of cyber war takes place on a different domain, such as a fifth domain, that is totally separate and disconnected from all other forms of warfare, be it land, sea or air space.

Comments  (1)

76e662e7786bf88946bd6c010c03ac65

The Danger of Mixing Cyber Espionage with Cyber Warfare

May 22, 2013 Added by:Jarno Limnéll

Cyber espionage does not equate with cyber warfare. Espionage may be carried out by multiple actors for manifold reasons. It does not automatically relate to warfare and plays only a minor part in the vast realm of war.

Comments  (6)

Ffc4103a877b409fd8d6da8f854f617e

Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Cyber Security Goes Ballistic

April 16, 2013 Added by:Jarno Limnéll

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

Comments  (0)

Da3ca2c61c4790bcbd81ebf28318d10a

Sun Tzu and the Art of Cyber-War

March 21, 2013 Added by:Krypt3ia

The overall tactics put forth by the Art of War are applicable because this is warfare we are talking about no matter the landscape (electronic) that we are fighting it in.

Comments  (2)

3e35900ae6facc6c146a85c435c71d82

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

March 16, 2013 Added by:Ben Rothke

The notion of advanced persistent threats (APT) and cyber warfare has reached the mainstream press. As nation states are attacking corporate networks, the need to take defensive action is an imperative.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

From Cyber Quarrelling to Cyber Diplomacy

March 15, 2013 Added by:Jarno Limnéll

Cyber quarrelling ‒ lately practiced by the US and China ‒ makes the need for increased openness and international cooperation in the domain clearly evident...

Comments  (1)

306708aaf995cf6a77d3083885b60907

Symantec Uncovers Earliest Known Version of Stuxnet (Version 0.5)

February 26, 2013 Added by:Mike Lennon

According to Symantec, Stuxnet Version 0.5, an earlier and less sophisticated version of Stuxnet, was designed to close crucial valves that feed uranium hexafluoride gas into the centrifuges, causing serious damage to the centrifuges and the uranium enrichment system as a whole.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Electronic Warfare and Cyber – Uncomfortable Cousins?

January 18, 2013 Added by:Joel Harding

I know the Chinese recently held a military exercise under constrained conditions, they even advertised it ex post facto. Why don’t we? I would see that as the perfect opportunity to increase the cross-pollination, knowledge and appreciation between Electronic Warfare and cyber...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

The Interim Years of Cyberspace - The Quick(er) Version

January 15, 2013 Added by:Robert M. Lee

A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New attacks against banking, cyber Jihad or cyber warfare acts?

December 22, 2012 Added by:Pierluigi Paganini

The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Iran, the cyber shooting range, new malware detected

December 19, 2012 Added by:Pierluigi Paganini

Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...

Comments  (4)

296634767383f056e82787fcb3b94864

The "January Effect" - An Annual Phenomenon Since 2009

December 16, 2012 Added by:Jeffrey Carr

A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Israel’s Cyber Defenses Protect Government Sites from 44 Million Attacks

December 11, 2012 Added by:Dan Dieterle

Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Who Needs Words for Wars?

December 09, 2012 Added by:Jayson Wylie

This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »