www.fgks.org   »   [go: up one dir, main page]

 Cyberwarfare

Cyberwarfare dismissed! OECD speaks, others retweet

Charles Jeter, ESET cybercrime investigator January 19, 2011

Refuting the recent downplay of cyberwarfare as a threat with well-thought analysis.
 

Stuxnet, Farewell Dossier, Cyberwar and WikiLeaks Wrapup

Charles Jeter, ESET cybercrime investigator January 19, 2011

Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.
 

Cyberwarfare Roshambo: th3j35t3r Profiled

Charles Jeter, ESET cybercrime investigator January 12, 2011

One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
 

Hired guns: Cyberwar PsyOps, Part 2

Charles Jeter, ESET cybercrime investigator January 11, 2011

Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
 

Hired guns: Cyberwar PsyOps, Part 1

Charles Jeter, Cybercrime investigator January 11, 2011

What is the balance of privacy and free speech in a globalized information society? Will Saudi Arabia and other Middle East countries with restrictive policies be next in line for cyber attacks attributed to Operation Payback?
 

Hired Guns: What's in the name CyberPMC or CyberPSC?

Charles Jeter, ESET cybercrime investigator January 10, 2011

In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
 

Who will be to blame for the loss of a cyberwar?

Charles Jeter, ESET cybercrime investigator January 06, 2011

Cyberwarfare is the boogeyman of 2011. If the risks are real, who holds responsibility for collapses of the power grid and communication networks?
 

Hired guns: Cyberwarfare and cyber-mercs

Charles Jeter, ESET cybercrime investigator January 06, 2011

Whether the trend of privatizing military resources is good or not, it is already happening.
 

Future crimes: Are WikiLeaks, piracy and malware related?

Charles Jeter, ESET cybercrime investigator December 14, 2010

Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
 

Stuxnet's persistent legacy: Cybersecurity is blended security

Charles Jeter, ESET cybercrime investigator December 09, 2010

Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari's recent assassination? What are the game-changing physical security considerations for chief information officers?
 

Stuxnet: Precursor to kinetic warfare?

Charles Jeter, ESET cybercrime investigator December 01, 2010

Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.
 

Future Crimes: Will the lights stay on past 2013?

Charles Jeter, ESET cybercrime investigator November 15, 2010

Stuxnet has radically changed the global perception of cyberwarfare leveraging internet-connected SCADA vulnerabilities of critical infrastructure. Will the lights stay on or are we in for trouble?
 

Stuxnet: Lessons not yet learned?

Charles Jeter, ESET cybercrime investigator November 03, 2010

According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.
 

Cyberespionage: Raids from afar

Greg Masters November 01, 2010

The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
 

Stuxnet: Cyber warfare's game-changer, Part Two

Charles Jeter, ESET cybercrime investigator October 14, 2010

Is Stuxnet cyber warfare's Trinity Test?
 

Stuxnet: Cyber warfare's game-changer, Part One

Charles Jeter, ESET cybercrime investigator October 14, 2010

Is Stuxnet cyber warfare's Trinity Test?
 

From sci-fi to Stuxnet: Exploding gas pipelines and the Farewell Dossier

Charles Jeter, ESET cybercrime investigator September 30, 2010

Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.
 

Stuxnet should serve as wake-up call, say experts

Angela Moscaritolo September 28, 2010

The Stuxnet worm should serve as a wake-up call that cyberwarfare is a reality, experts said.
 

Entrapment: Somebody told me to do it, officer

Charles Jeter, ESET cybercrime investigator September 22, 2010

Is a sting merely legitimized social engineering? Why cops don't have to tell you they're cops - online or off.
 

Leading Stuxnet theory points toward sabotage and SCADA inside players

Charles Jeter, ESET cybercrime investigator September 17, 2010

IACS researcher says, Welcome to cyberwar
 

Email worm traced back to cyber-jihad group

Dan Kaplan September 13, 2010

The person responsible for the "Here you have" email worm, which wreaked havoc last week on businesses across the United States, may be part of a cyber-jihad group wanting to hack into U.S. Army IT systems.
 

Previously classified: malware's role in Pentagon attack

Charles Jeter, ESET cybercrime investigator August 26, 2010

Whether or not we all believe in cyberwarfare, others on this blue-green world do.
 

Senate Committee passes major cybersecurity legislation

Angela Moscaritolo June 25, 2010

A U.S. Senate committee unanimously passed a cybersecurity bill, which would grant the president emergency power over critical infrastructure networks.
 

Canada feeling heat to join anti-cyber warfare force

James Hale June 22, 2010

As during the Cold War, pressure is being applied to get Canada to join an international anti-cyber warfare organization.
 

Senate bill would expand government cybersecurity role

Angela Moscaritolo June 15, 2010

A Senate Committee is set to consider a bill that would grant the president emergency power over critical infrastructure networks, in addition to createcybersecurity offices within the White House and U.S. Department of Homeland Security (DHS).
 

RSA Conference: Cyberwarfare panel says it's time to unite

Sean Martin March 05, 2010

Cyberwarfare is set to grow with devastating consequence, capitalizing on the historical separation between government and industry and the lack of shared visibility within and across these two sectors.
 

U.S. Navy establishes new Cyber Command

Angela Moscaritolo February 02, 2010

The newly established U.S. Fleet Cyber Command is responsible for defending Navy networks against cyberattacks and ensuring military objectives can be carried out in cyberspace.
 

Report says U.S. needs new approach for security

Angela Moscaritolo February 01, 2010

A new report authored by retired Gen. Eugene Habiger of the U.S. Air Force finds that that the public and private sector must deploy secure systems that are properly tested and certified to withstand sophisticated cyberattacks.
 

Report: Cyberattacks against the U.S. "rising sharply"

Angela Moscaritolo November 20, 2009

During just the first half 2009, there were 43, 785 cyberattack incidents against the DoD, a new report states. If this volume is maintained for the rest of the year, it will represent a 60 percent increase over 2008.
 

Gov't executives cite unstructured data as top concern

Angela Moscaritolo November 18, 2009

Seventy-nine percent of federal government IT executives surveyed recently said unstructured data increases the security risk within their organization.