www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Videos
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SCWC 24/7
SC Awards U.S.
Editorial Webcasts
Vendor Webcasts
SC World Congress NYC
SC Congress Canada
Podcasts
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
Cyberwarfare
Cyberwarfare dismissed! OECD speaks, others retweet
Charles Jeter, ESET cybercrime investigator January 19, 2011
Refuting the recent downplay of cyberwarfare as a threat with well-thought analysis.
Stuxnet, Farewell Dossier, Cyberwar and WikiLeaks Wrapup
Charles Jeter, ESET cybercrime investigator January 19, 2011
Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.
Cyberwarfare Roshambo: th3j35t3r Profiled
Charles Jeter, ESET cybercrime investigator January 12, 2011
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Hired guns: Cyberwar PsyOps, Part 2
Charles Jeter, ESET cybercrime investigator January 11, 2011
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
Hired guns: Cyberwar PsyOps, Part 1
Charles Jeter, Cybercrime investigator January 11, 2011
What is the balance of privacy and free speech in a globalized information society? Will Saudi Arabia and other Middle East countries with restrictive policies be next in line for cyber attacks attributed to Operation Payback?
Hired Guns: What's in the name CyberPMC or CyberPSC?
Charles Jeter, ESET cybercrime investigator January 10, 2011
In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
Who will be to blame for the loss of a cyberwar?
Charles Jeter, ESET cybercrime investigator January 06, 2011
Cyberwarfare is the boogeyman of 2011. If the risks are real, who holds responsibility for collapses of the power grid and communication networks?
Hired guns: Cyberwarfare and cyber-mercs
Charles Jeter, ESET cybercrime investigator January 06, 2011
Whether the trend of privatizing military resources is good or not, it is already happening.
Future crimes: Are WikiLeaks, piracy and malware related?
Charles Jeter, ESET cybercrime investigator December 14, 2010
Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
Stuxnet's persistent legacy: Cybersecurity is blended security
Charles Jeter, ESET cybercrime investigator December 09, 2010
Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari's recent assassination? What are the game-changing physical security considerations for chief information officers?
Stuxnet: Precursor to kinetic warfare?
Charles Jeter, ESET cybercrime investigator December 01, 2010
Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.
Future Crimes: Will the lights stay on past 2013?
Charles Jeter, ESET cybercrime investigator November 15, 2010
Stuxnet has radically changed the global perception of cyberwarfare leveraging internet-connected SCADA vulnerabilities of critical infrastructure. Will the lights stay on or are we in for trouble?
Stuxnet: Lessons not yet learned?
Charles Jeter, ESET cybercrime investigator November 03, 2010
According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.
Cyberespionage: Raids from afar
Greg Masters
November 01, 2010
The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
Stuxnet: Cyber warfare's game-changer, Part Two
Charles Jeter, ESET cybercrime investigator October 14, 2010
Is Stuxnet cyber warfare's Trinity Test?
Stuxnet: Cyber warfare's game-changer, Part One
Charles Jeter, ESET cybercrime investigator October 14, 2010
Is Stuxnet cyber warfare's Trinity Test?
From sci-fi to Stuxnet: Exploding gas pipelines and the Farewell Dossier
Charles Jeter, ESET cybercrime investigator September 30, 2010
Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.
Stuxnet should serve as wake-up call, say experts
Angela Moscaritolo
September 28, 2010
The Stuxnet worm should serve as a wake-up call that cyberwarfare is a reality, experts said.
Entrapment: Somebody told me to do it, officer
Charles Jeter, ESET cybercrime investigator September 22, 2010
Is a sting merely legitimized social engineering? Why cops don't have to tell you they're cops - online or off.
Leading Stuxnet theory points toward sabotage and SCADA inside players
Charles Jeter, ESET cybercrime investigator September 17, 2010
IACS researcher says, Welcome to cyberwar
Email worm traced back to cyber-jihad group
Dan Kaplan
September 13, 2010
The person responsible for the "Here you have" email worm, which wreaked havoc last week on businesses across the United States, may be part of a cyber-jihad group wanting to hack into U.S. Army IT systems.
Previously classified: malware's role in Pentagon attack
Charles Jeter, ESET cybercrime investigator August 26, 2010
Whether or not we all believe in cyberwarfare, others on this blue-green world do.
Senate Committee passes major cybersecurity legislation
Angela Moscaritolo
June 25, 2010
A U.S. Senate committee unanimously passed a cybersecurity bill, which would grant the president emergency power over critical infrastructure networks.
Canada feeling heat to join anti-cyber warfare force
James Hale
June 22, 2010
As during the Cold War, pressure is being applied to get Canada to join an international anti-cyber warfare organization.
Senate bill would expand government cybersecurity role
Angela Moscaritolo
June 15, 2010
A Senate Committee is set to consider a bill that would grant the president emergency power over critical infrastructure networks, in addition to createcybersecurity offices within the White House and U.S. Department of Homeland Security (DHS).
RSA Conference: Cyberwarfare panel says it's time to unite
Sean Martin March 05, 2010
Cyberwarfare is set to grow with devastating consequence, capitalizing on the historical separation between government and industry and the lack of shared visibility within and across these two sectors.
U.S. Navy establishes new Cyber Command
Angela Moscaritolo
February 02, 2010
The newly established U.S. Fleet Cyber Command is responsible for defending Navy networks against cyberattacks and ensuring military objectives can be carried out in cyberspace.
Report says U.S. needs new approach for security
Angela Moscaritolo
February 01, 2010
A new report authored by retired Gen. Eugene Habiger of the U.S. Air Force finds that that the public and private sector must deploy secure systems that are properly tested and certified to withstand sophisticated cyberattacks.
Report: Cyberattacks against the U.S. "rising sharply"
Angela Moscaritolo
November 20, 2009
During just the first half 2009, there were 43, 785 cyberattack incidents against the DoD, a new report states. If this volume is maintained for the rest of the year, it will represent a 60 percent increase over 2008.
Gov't executives cite unstructured data as top concern
Angela Moscaritolo
November 18, 2009
Seventy-nine percent of federal government IT executives surveyed recently said unstructured data increases the security risk within their organization.
Latest News
Cyberwarfare dismissed! OECD speaks, others retweet
Report: Toolkits now used in the majority of cyberattacks
Oracle releases 66 fixes in its quarterly patch cycle
Stuxnet, Farewell Dossier, Cyberwar and WikiLeaks Wrapup
Microsoft releases free secure development tool
2011: A security manager's wish list
AT&T; iPad hackers arrested, facing federal charges
Ready for 2011? Five questions for CISOs
Hackers may have stolen South Carolina employees' data
Prominent government and educations sites hijacked
Most Popular
Most Emailed
Most Recent
Palin hacker begins time in prison, not halfway house
Views regarding PCI compliance are mostly positive
Cyberwarfare Roshambo: th3j35t3r Profiled
Welcome to the SC Awards Blog
Microsoft releases free secure development tool
AT&T; iPad hackers arrested, facing federal charges
2011: A security manager's wish list
Hackers may have stolen South Carolina employees' data
Prominent government and educations sites hijacked
Ready for 2011? Five questions for CISOs
Red Flags Rule will not apply to certain professions
NSA breaks ground on $1.2 bil cybersecurity facility
More Mac malware common on 2011 prediction lists
Android trojan sign of mobile malware evolution
Innovate to survive
Honda warns customers of email database breach
Microsoft upset over Google researcher's tool release
Views regarding PCI compliance are mostly positive
NYC bus tour company's database hacked of credit card info
Learning from Assange
Cyberwarfare dismissed! OECD speaks, others retweet
Report: Toolkits now used in the majority of cyberattacks
Oracle releases 66 fixes in its quarterly patch cycle
Stuxnet, Farewell Dossier, Cyberwar and WikiLeaks Wrapup
Microsoft releases free secure development tool
2011: A security manager's wish list
AT&T; iPad hackers arrested, facing federal charges
Ready for 2011? Five questions for CISOs
Hackers may have stolen South Carolina employees' data
Prominent government and educations sites hijacked
Popular Topics
Breaches & Exposures
Browsers And Security
Cyber Attack
Cyber War
Cyberattack
Cybercrime
Cyberwarfare
Data Leakage Prevention
DDoS
Email Security
EMP
Finance
Government
HILF
Insider Threat
Malware
Mergers & Acquisitions
Mobile Devices
Mobile Endpoint Security
Patch Management
Phishing
Retail
SCADA
Social Media
Vulnerabilities & Flaws
Sponsored Links