Blog Posts - Cyberwarfare



Canada : Communication Security Establishment's cyberwarfare toolbox revealed

Top-secret documents obtained by the CBC show Canada's electronic spy agency has developed a vast arsenal of cyberwarfare tools alongside its U.S. and British counterparts to hack into computers and phones in many parts of the world, including in...
by Actualité Distincte on Mar 23, 2015

NSA leaks suggest Iran learned cyberwarfare from US attacks

The US government and various security researchers have connected Iran to a number of egregious cyberattacks in the past, including one launched against the Navy. And based on a 2013 NSA document leaked by Edward Snowden that The Intercept has just p...
by engadget on Feb 10, 2015

US launching a new cyberwarfare agency in wake of Sony attacks

We already have the NSA, FBI, DHS and NCTC, but the White House feels that we're still an acronym-heavy department short in the cyber warfare stakes. That's why, later today, the president's counterterrorism chief will announce a new outfit that's de...
by engadget on Feb 10, 2015

NSA brags about turning the tables on cyberwarfare hackers

How confident is the National Security Agency about its ability to wage cyberwarfare? Enough so that it's bragging about it. A new round of Edward Snowden leaks published by Der Spiegel reveal that the institution has not only been gearing up for a f...
by engadget on Jan 17, 2015

Lightning Strikes Twice: Most DDoS Attackers Come Back to the Same Crime Scene

After launching a successful DDoS attack, what is stopping a hacker from going after the same victim again? The initial DDoS trends of 2014 show that DDoS attacks are on the rise. These attacks affect both first-time victims and repeat victims. There...
by TechSling on Jul 14, 2014

American Businesses in China Feel Heat of a Cyberdispute

Following the Justice Department’s indictment of five members of the Chinese Army on economic cyberespionage charges, Chinese government agencies are reviewing their use of IBM servers — an example of the growing threat of retaliation aga...
by Eastasianews on May 31, 2014

Hacking Charges Threaten Further Damage to Chinese-American Relations

Administration officials said that the United States acted after President Xi Jinping brushed off President Obama’s demands to curb the hacking.
by Eastasianews on May 21, 2014

threatTRANSFORM Open Source App Jumpstarts STIX-Based Threat Data Classification

FOR IMMEDIATE RELEASE Free Press Release Submission threattransform.com     Press Release Distribution The creators of threatTRANSFORM today announced the release of their open source application designed to streamline the creation, comp...
by Free PR Online on May 5, 2014

News Analysis: Wrong Guesses About North Korea Leave U.S. Struggling to Adjust

Almost everything American intelligence agencies and North Korea-watchers thought they understood two years ago about Kim Jong-un, the North’s young leader, turns out to have been wrong.
by Eastasianews on Apr 24, 2014

Could Russia Use Cyberwarfare to Further Destabilize Ukraine?

Eastern Ukraine is full of rioters ready to separate from their nation’s government in Kiev — at least, that’s the... The post Could Russia Use Cyberwarfare to Further Destabilize Ukraine? appeared first on INFOTEMEN.
by infotemen on Apr 14, 2014

Microsoft Patch Tuesday bids adieu to Windows XP

Microsoft will no longer issue security patches for Windows XP This month’s “Patch Tuesday” includes the final round of security fixes Microsoft will issue for Windows XP, potentially leaving millions that continue to use the OS ope...

U.S. and China Clash Over Contested Islands

A dispute between Beijing and Tokyo has prompted Defense Secretary Chuck Hagel to warn that the United States would honor treaty obligations to defend its allies.
by Eastasianews on Apr 8, 2014

Cyber Pearl Harbor: Why hasn’t a mega attack happened?

Despite many warnings, no major attack has taken place on the United States. So it is logical to ask why this hasn’t happened yet, and if it ever will. For the past few years, US officials have warned of a coming mega cyber attack against critical...
by Free PR Online on Aug 23, 2013

Jihadis, hackers join forces to launch cyberattacks on United States

By Shaun Waterman Middle East- and North Africa-based criminal hackers are preparing cyberattacks this week against the websites of high-profile U.S. government agencies, banks and other companies, according to the Department of Homeland Security. Th...
by Iran Aware on May 6, 2013

The Future of Cyber Threats

Cyber threats appear as quickly as new technologies themselves, and with computers now being such a critical part of our infrastructure – from our smartphones and cars to national energy systems and even prisons – the potential for damage is cata...
by The Trembling Uterus on Mar 3, 2013

Cyber Threats History: A New Cold War (Present)

This is the decade of cloud computing, the rise of hacktivism and the birth of real cyberwarfare. Who knows what else is going to happen? Cyber attacks continue to rise at a great pace, increasing 42 percent in 2012 from the previous year and IT secu...
by The Trembling Uterus on Feb 26, 2013

Cyber Threats History: A New World (2000s)

In this new decade, the average consumer is persuaded to use the credit card on the Internet for purchases, raising the risks of cyber theft. Insurance policies are offered by most credit cards companies and former hackers are hired by the industry t...
by The Trembling Uterus on Feb 6, 2013

Cyber Threats History: The Internet Expansion (1990s)

Although hacking expanded and enjoyed glorification during the 80s, a divide was forming within the hacking community by the end of the decade. The hacker principle of “freedom of technology” was changing, and a younger generation interested in i...
by The Trembling Uterus on Jan 14, 2013

The 6 Craziest Job Openings in the Military Domain

Military-Industrial Artist Let’s face it, your artistic talent is going to waste working for minimum wage at that coffee bar. And you’re not exactly using your top-secret security clearance either, brewing up mochaccinos. Luckily, there&#...
by GIZMORATI on Dec 28, 2012

Cyber Threats History: Rise of the Hacker Culture (1980s)

After John Draper and his electronic whistling abilities gained a wide audience, there was a major shift in computing and hacking enjoyed a golden era of sorts in the 1980s. Society started becoming aware of hackers as computers became increasingly a...
by The Trembling Uterus on Oct 25, 2012


Trending Topics

Close