- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Cyberwarfare
The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.
Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found. The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptograph… Continue reading
NSA Director: China can damage US power grid
“One if by land, two if by sea” wouldn’t work these days — not when your adversary can knock out your power grid with an team of cyberforces. Today’s armies have a new front to monitor. Continue reading
List of “patients zero” shows cyber weapon broke into—not out of—Natanz. Continue reading
In an excerpt from her new book, “Countdown to Zero Day,” WIRED’s Kim Zetter describes the dark path the world’s first digital weapon took to reach its target in Iran.
The post An Unprecedented Look at Stuxnet, the World’s First Digital Weapon appeared first on WIRED.
Locked Shields is among the world’s preeminent cyber attack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics. It is a training ground for front-line operators in a rapidly evolving form of warfare in which network administrators at banks, electrical plants and government offices are as crucial to a country’s defense as uniformed troops.
The post Hackers Gather for Cyberwar in an Intense 48-Hour Sim appeared first on WIRED.
11 September 2014- Defense News Army Cyber Chief: Let’s Get Closer To Industry
17 September 2014- FCW ISIS cyber capability judged more ‘aspirational’ than operational
19 September 2014- Security Week Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’
18 September 2014- Help Net Security Hackers penetrated systems of key defense contractors
8 September 2014- The Washington Times US Naval Academy Works on Accrediting Cyber major
2 September 2014- ZDNet North Korea cyber warfare capabilities exposed
Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?- 21 August 2014
21 August 2014- CTOVision Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?
20 August 2014- Strategic Studies Institute Iran’s Emergence as a Cyber Power
31 August 2014- New York Times NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack
22 August 2014- The Washington Post Does the White House’s cybersecurity czar need to be a coder? He says no.
In Supersecret Cyberwar Game, Civilian-sector Techies Pummel Active-duty Cyberwarriors- 4 August 2014
4 August 2014- Military Times In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors
6 August 2014- Wired CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them
30 June 2014- Symantec Dragonfly: Western Energy Companies Under Sabotage Threat