Categories » Cyberwarfare

Bits Blog: Symantec Discovers ‘Regin’ Spy Code Lurking on Computer Networks

The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.



Continue reading

Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer

Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found. The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptograph… Continue reading

NSA Director: China Can Damage US Power Grid

NSA Director: China can damage US power grid

Soldiers, Spies, Cyberwarriors: ‘@War’ In The Internet Age

“One if by land, two if by sea” wouldn’t work these days — not when your adversary can knock out your power grid with an team of cyberforces. Today’s armies have a new front to monitor. Continue reading

Stuxnet Worm Infected High-Profile Targets before Hitting Iran Nukes

List of “patients zero” shows cyber weapon broke into—not out of—Natanz. Continue reading

An Unprecedented Look at Stuxnet, the World’s First Digital Weapon

An Unprecedented Look at Stuxnet, the World’s First Digital Weapon

In an excerpt from her new book, “Countdown to Zero Day,” WIRED’s Kim Zetter describes the dark path the world’s first digital weapon took to reach its target in Iran.

The post An Unprecedented Look at Stuxnet, the World’s First Digital Weapon appeared first on WIRED.



Continue reading

Hackers Gather for Cyberwar in an Intense 48-Hour Sim

Hackers Gather for Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world’s preeminent cyber attack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics. It is a training ground for front-line operators in a rapidly evolving form of warfare in which network administrators at banks, electrical plants and government offices are as crucial to a country’s defense as uniformed troops.

The post Hackers Gather for Cyberwar in an Intense 48-Hour Sim appeared first on WIRED.



Continue reading

Army Cyber Chief: Let’s Get Closer To Industry- 11 September 2014

11 September 2014- Defense News Army Cyber Chief: Let’s Get Closer To Industry

ISIS Cyber Capability Judged More ‘Aspirational’ Than Operational- 17 September 2014

17 September 2014- FCW ISIS cyber capability judged more ‘aspirational’ than operational

Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’- 19 September 2014

19 September 2014- Security Week Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’

Hackers Penetrated Systems of Key Defense Contractors- 18 September 2014

18 September 2014- Help Net Security Hackers penetrated systems of key defense contractors

US Naval Academy Works on Accrediting Cyber Major- 8 September 2014

8 September 2014- The Washington Times US Naval Academy Works on Accrediting Cyber major

North Korea Cyber Warfare Capabilities Exposed- 2 September 2014

2 September 2014- ZDNet North Korea cyber warfare capabilities exposed

Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?- 21 August 2014

21 August 2014- CTOVision Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?

Iran’s Emergence as a Cyber Power- 20 August 2014

20 August 2014- Strategic Studies Institute Iran’s Emergence as a Cyber Power

NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack- 31 August 2014

31 August 2014- New York Times NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack

Does the White House’s Cybersecurity Czar Need to Be a Coder? He Says No.- 22 August 2014

22 August 2014- The Washington Post Does the White House’s cybersecurity czar need to be a coder? He says no.

In Supersecret Cyberwar Game, Civilian-sector Techies Pummel Active-duty Cyberwarriors- 4 August 2014

4 August 2014- Military Times In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors

CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them- 6 August 2014

6 August 2014- Wired CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them

Dragonfly: Western Energy Companies Under Sabotage Threat- 30 June 2014

30 June 2014- Symantec Dragonfly: Western Energy Companies Under Sabotage Threat