ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Cyberwarfare Will Explode In 2020 (Because It’s Cheap, Easy And Effective) | #CyberSecurity

Cyberwarfare Will Explode In 2020 (Because It’s Cheap, Easy And Effective) | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Let’s cut right to the chase:  the number of severity of cyberattacks will explode in 2020.  Cyberwarfare has now leveled the playing field in industry, in government, and in national defense:  why spend ten or fifteen billion dollars on an aircraft carrier when you can disable it digitally?  Why spend billions on new product R&D when you can hack into your competition’s strategic plans?  Why not just phish around municipalities for a quick $100K?    

Cyberwarfare is a cost-effective solution to all sorts of problems – and opportunities:  cyberwar-fare is a revenue stream, a new business model, digital transformation with its own unique flavor.  I’ve written about this before in several different ways, with all sorts of warnings.  Not that I’m sounding a quiet alarm.  The whole world is warning anyone who will listen about cyberwarfare.  But regardless of inexplicably unheeded warnings, I predict 2020 will be different – much worse than it’s ever been.  Why?  Simply because it’s the cheapest, easiest, fastest and most effective form of warfare we’ve ever seen, and because cyberwarfare defenses are more vulnerable than they’ve ever been.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

Let’s cut right to the chase:  the number of severity of cyberattacks will explode in 2020.  Cyberwarfare has now leveled the playing field in industry, in government, and in national defense:  why spend ten or fifteen billion dollars on an aircraft carrier when you can disable it digitally?  Why spend billions on new product R&D when you can hack into your competition’s strategic plans?  Why not just phish around municipalities for a quick $100K?    

Cyberwarfare is a cost-effective solution to all sorts of problems – and opportunities:  cyberwar-fare is a revenue stream, a new business model, digital transformation with its own unique flavor.  I’ve written about this before in several different ways, with all sorts of warnings.  Not that I’m sounding a quiet alarm.  The whole world is warning anyone who will listen about cyberwarfare.  But regardless of inexplicably unheeded warnings, I predict 2020 will be different – much worse than it’s ever been.  Why?  Simply because it’s the cheapest, easiest, fastest and most effective form of warfare we’ve ever seen, and because cyberwarfare defenses are more vulnerable than they’ve ever been.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: USA legen iranische Computer lahm | #CyberSecurity 

Cyberwar: USA legen iranische Computer lahm | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it

Die USA haben ein iranisches Militärsystem gehackt und stillgelegt. Das berichten US-Medien. Der Iran wiederum setze bei seinen IT-Angriffen auf Täuschung.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

Die USA haben ein iranisches Militärsystem gehackt und stillgelegt. Das berichten US-Medien. Der Iran wiederum setze bei seinen IT-Angriffen auf Täuschung.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwarfare is taking to the skies, aboard drones | #CyberSecurity #Awareness 

Cyberwarfare is taking to the skies, aboard drones | #CyberSecurity #Awareness  | ICT Security-Sécurité PC et Internet | Scoop.it

Cyberwarfare is taking to the skies, aboard drones

Hovering computers will make it increasingly possible to hack equipment that doesn’t connect directly to the internet.

 

The drones: Cyberscoop rounded up a selection of drones that hack into networks. Take your pick: flying wiretaps for mobile networks, home-brew devices that turn off smart bulbs, or giants with 20-foot wingspans that meddle with Wi-Fi networks.

 

What the experts say: “This market is about to blow up,” Francis Brown of thecybersecurity firm Bishop Fox told Cyberscoop. “Everyone is dumping money into this.”

 

Why it matters: It’s often assumed that devices that don’t directly connect to the internet are relatively sheltered from attack. While it’s not straightforward, hovering a drone close to a vehicle or building could enable people to hack devices that use wireless communication but were once thought relatively safe.

 

Hack backs: It’s also worth noting that drones, with wireless connections and precarious modes of travel, are highly susceptible to being hacked out of the sky, too.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=Drones

 

 

Gust MEES's insight:

Cyberwarfare is taking to the skies, aboard drones

Hovering computers will make it increasingly possible to hack equipment that doesn’t connect directly to the internet.

 

The drones: Cyberscoop rounded up a selection of drones that hack into networks. Take your pick: flying wiretaps for mobile networks, home-brew devices that turn off smart bulbs, or giants with 20-foot wingspans that meddle with Wi-Fi networks.

 

What the experts say: “This market is about to blow up,” Francis Brown of thecybersecurity firm Bishop Fox told Cyberscoop. “Everyone is dumping money into this.”

 

Why it matters: It’s often assumed that devices that don’t directly connect to the internet are relatively sheltered from attack. While it’s not straightforward, hovering a drone close to a vehicle or building could enable people to hack devices that use wireless communication but were once thought relatively safe.

 

Hack backs: It’s also worth noting that drones, with wireless connections and precarious modes of travel, are highly susceptible to being hacked out of the sky, too.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=Drones

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker-Angriff auf das Internet an sich: Probt ein Staat den Cyberkrieg? | #CyberSecurity #CyberWar 

Hacker-Angriff auf das Internet an sich: Probt ein Staat den Cyberkrieg? | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it
Ohne das Internet geht heute fast nichts mehr, nahezu alles hängt irgendwie am Netz. Private, geschäftliche und auch staatliche Kommunikation ist ohne das World Wide Web beinahe undenkbar geworden. Aber auch Straßenverkehr, Handel und Infrastruktur sind ohne das Internet völlig lahmgelegt. Das Internet ist für das Funktionieren eines Landes genauso essenziell wichtig wie das Strom- oder Straßennetz. Und damit ist es ein taktisches Ziel in potenziellen Kriegen. Genau darauf scheint sich ein unbekannter Staat nun intensiv vorzubereiten.


Davor warnt der renommierte Sicherheitsforscher Bruce Schneier. In einem Eintrag des Sicherheitsblogs "Lawfare Blog" berichtet der vom "Economist" schon als "Sicherheits-Guru" gerühmte Schneier über mysteriöse Angriffe auf die Grundpfeiler des Internets an sich. Eine ganze Reihe von sicherheitsrelevanten Firmen und Webseiten sei in den letzten beiden Jahren Opfer gezielter Attacken geworden, erklärt Schneier. Als hätte jemand vor, die Infrastruktur des Internets lahmzulegen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:
Ohne das Internet geht heute fast nichts mehr, nahezu alles hängt irgendwie am Netz. Private, geschäftliche und auch staatliche Kommunikation ist ohne das World Wide Web beinahe undenkbar geworden. Aber auch Straßenverkehr, Handel und Infrastruktur sind ohne das Internet völlig lahmgelegt. Das Internet ist für das Funktionieren eines Landes genauso essenziell wichtig wie das Strom- oder Straßennetz. Und damit ist es ein taktisches Ziel in potenziellen Kriegen. Genau darauf scheint sich ein unbekannter Staat nun intensiv vorzubereiten.


Davor warnt der renommierte Sicherheitsforscher Bruce Schneier. In einem Eintrag des Sicherheitsblogs "Lawfare Blog" berichtet der vom "Economist" schon als "Sicherheits-Guru" gerühmte Schneier über mysteriöse Angriffe auf die Grundpfeiler des Internets an sich. Eine ganze Reihe von sicherheitsrelevanten Firmen und Webseiten sei in den letzten beiden Jahren Opfer gezielter Attacken geworden, erklärt Schneier. Als hätte jemand vor, die Infrastruktur des Internets lahmzulegen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers | ICT Security-Sécurité PC et Internet | Scoop.it

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

Gust MEES's insight:

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare | ICT Security-Sécurité PC et Internet | Scoop.it
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

Gust MEES's insight:
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CyberSecurity, business, cyberwarfare, critical infrastructure | Homeland Security News Wire

CyberSecurity, business, cyberwarfare, critical infrastructure | Homeland Security News Wire | ICT Security-Sécurité PC et Internet | Scoop.it
The draft guide provides detailed example solutions using multiple products that achieve the same result, and instructions for implementers and security engineers, including examples of all the necessary components and installation, configuration and integration.
NIST notes that the draft guide also maps security characteristics to guidance and best practices from NIST and other standards organizations, and to North American Electric Reliability Corporation’s Critical Infrastructure Protection standards. The guide is modular and suitable for organizations of all sizes, including corporate and regional business offices, power generation plants and substations. They can adopt this solution or one that adheres to these guidelines in whole, or use the guide as a starting point for tailoring and implementing parts of a solution.
The draft guide can be found on the NCCoE Web site.


Learn more:


https://nccoe.nist.gov/projects/use_cases/idam


Gust MEES's insight:

The draft guide provides detailed example solutions using multiple products that achieve the same result, and instructions for implementers and security engineers, including examples of all the necessary components and installation, configuration and integration.

NIST notes that the draft guide also maps security characteristics to guidance and best practices from NIST and other standards organizations, and to North American Electric Reliability Corporation’s Critical Infrastructure Protection standards. The guide is modular and suitable for organizations of all sizes, including corporate and regional business offices, power generation plants and substations. They can adopt this solution or one that adheres to these guidelines in whole, or use the guide as a starting point for tailoring and implementing parts of a solution.

The draft guide can be found on the NCCoE Web site.


Learn more:


https://nccoe.nist.gov/projects/use_cases/idam



No comment yet.
Scooped by Gust MEES
Scoop.it!

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].

Gust MEES's insight:

Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].


No comment yet.
Scooped by Gust MEES
Scoop.it!

Dragonfly hackers target over 1000 Western energy firms

Dragonfly hackers target over 1000 Western energy firms | ICT Security-Sécurité PC et Internet | Scoop.it
More than one thousand energy firms are said to have been targeted by internet hackers, with particular interest in compromising industrial control systems.


There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


Gust MEES's insight:

There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How Does Cyber Warfare Work?

How Does Cyber Warfare Work? | ICT Security-Sécurité PC et Internet | Scoop.it
How does cyber warfare work? This question was originally answered on Quora by Andy Manoske.

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Gust MEES's insight:

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

Gust MEES's curator insight, July 22, 2013 7:35 AM

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

Scooped by Gust MEES
Scoop.it!

It’s global cyber war out there

It’s global cyber war out there | ICT Security-Sécurité PC et Internet | Scoop.it
Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on his mind as he gazes over...
Gust MEES's insight:

Check out also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cybercrime+cost+%24110+billion+last+year

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cyberwar...

 

http://www.scoop.it/t/securite-pc-et-internet?tag=cyberwarfare

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive | ICT Security-Sécurité PC et Internet | Scoop.it
DARPA postpones release of official solicitation.

 

Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations.

 

“Due to an unanticipated and overwhelming response from industry and academia, DARPA has rescheduled the Plan X Proposers’ Day Workshop,” agency officials announced Sept. 5.

 

Two sessions with researchers and defense contractors—one classified and one non-classified—originally were slated for Sept. 27, but have now been moved to Oct. 15 and 16. “The second day will be a repeat of the first day to accommodate the remaining attendees,” the notice said. The request for proposals, originally scheduled for release at the end of this month, is expected to be published in October instead.

 

The surge of interest highlights a community emerging around offensive security technology. Plan X is a Pentagon initiative to develop computer architecture that monitors damage in “dynamic, contested, and hostile network environments,” adaptively defends against attacks, and performs “weapon deployment,” contracting documents indicate. The program is not funding malware or tools that hunt down vulnerabilities, but the resulting computer architecture will likely serve as the framework for their deployment.

 

Read more:

http://www.nextgov.com/defense/2012/09/pentagon-receives-overwhelming-response-plan-x-cyber-offensive/57961/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar 

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwarfare escalation just took a new and dangerous turn | #CyberSecurity

Cyberwarfare escalation just took a new and dangerous turn | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

The rhetoric surrounding cyberwarfare has ratcheted up again, potentially creating an unwelcome development in an area where misunderstanding and confusion could easily lead to escalation.

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.

The New York Times has reported that the US has escalated its plans to place malware in Russia power networks, in response to similar and ongoing online incursions by Russia-backed hackers.

This is the latest development in online hostilities involving power grids; energy companies have long been the targets of cyber-espionage, but in recent years the intent has switched from spying to creating outages.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:

The rhetoric surrounding cyberwarfare has ratcheted up again, potentially creating an unwelcome development in an area where misunderstanding and confusion could easily lead to escalation.

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.

The New York Times has reported that the US has escalated its plans to place malware in Russia power networks, in response to similar and ongoing online incursions by Russia-backed hackers.

This is the latest development in online hostilities involving power grids; energy companies have long been the targets of cyber-espionage, but in recent years the intent has switched from spying to creating outages.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: A guide to the frightening future of online conflict | #CyberSecurity 

Cyberwar: A guide to the frightening future of online conflict | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
What is cyberwar?

At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.

What does cyberwarfare look like?

Cyberwar is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.


Governments and nation states are now officially training for cyberwarfare: An inside look

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and TechRepublic takes you inside.

Read More

Governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:
What is cyberwar?

At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.

What does cyberwarfare look like?

Cyberwar is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.


Governments and nation states are now officially training for cyberwarfare: An inside look

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and TechRepublic takes you inside.

Read More

Governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

An unknown state may be running drills for taking down the entire internet | #CyberSecurity 

An unknown state may be running drills for taking down the entire internet | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher and blogger Bruce Schneier has a new essay up, arguing that there’s a single body out there carrying out a systematic attempt to test the defenses of the internet’s fundamental infrastructure, presumably with the intention of one day breaking those defenses. While the sources for the article are anonymous, they hardly need naming since Schneier makes it clear that his research has collected insight from virtually all major internet companies, from large service providers like AT&T all the way to organizing bodies like Verisign or potentially even ICANN itself. Somebody is searching for weaknesses in the sorts of places that many assume you’d only attack for one reason: crashing all or a large portion of the internet.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:
Security researcher and blogger Bruce Schneier has a new essay up, arguing that there’s a single body out there carrying out a systematic attempt to test the defenses of the internet’s fundamental infrastructure, presumably with the intention of one day breaking those defenses. While the sources for the article are anonymous, they hardly need naming since Schneier makes it clear that his research has collected insight from virtually all major internet companies, from large service providers like AT&T all the way to organizing bodies like Verisign or potentially even ICANN itself. Somebody is searching for weaknesses in the sorts of places that many assume you’d only attack for one reason: crashing all or a large portion of the internet.

 

Learn more / En savoir plus / Mehr erfahren:

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA bloßgestellt: Hacker veröffentlichen geheime Überwachungstools | #CyberSecurity #Cyberwar #Cyberespionage 

NSA bloßgestellt: Hacker veröffentlichen geheime Überwachungstools | #CyberSecurity #Cyberwar #Cyberespionage  | ICT Security-Sécurité PC et Internet | Scoop.it
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.

 

 
Gust MEES's insight:
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Fog of Cyberwar: Now theft and sabotage instead of just spying | #Cyberespionage #CyberSecurity

The Fog of Cyberwar: Now theft and sabotage instead of just spying | #Cyberespionage #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why the next World War will be a cyberwar first, and a shooting war second | ZDNet

Why the next World War will be a cyberwar first, and a shooting war second | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
Opinion: The US already has lost the first battles, and may not have the national will to defend itself in the inevitable global conflict to come. David Gewirtz looks at the geopolitical implications of cyberwarfare.




Learn more:


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Opinion: The US already has lost the first battles, and may not have the national will to defend itself in the inevitable global conflict to come. David Gewirtz looks at the geopolitical implications of cyberwarfare.


Learn more:


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Russia attacks U.S. oil and gas companies in massive hack

Russia attacks U.S. oil and gas companies in massive hack | ICT Security-Sécurité PC et Internet | Scoop.it
Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.
Gust MEES's insight:

Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.


No comment yet.
Scooped by Gust MEES
Scoop.it!

UK to hire hundreds of hackers for new £500m cyber-battalion

UK to hire hundreds of hackers for new £500m cyber-battalion | ICT Security-Sécurité PC et Internet | Scoop.it
Britain is building an army to wage war by hurling computer hackers at its enemies. Defence Secretary Philip Hammond said the country is recruiting "hundreds" of hackers at a cost of up to £500 mil...
Gust MEES's insight:

 

Instead of bombs and bullets, the new cyber regiment will fashion lethal computer worms and viruses to wipe out enemy targets.


And again a new word to add to the Cybersecurity dictionary ===> cyber-battalion...



No comment yet.
Scooped by Gust MEES
Scoop.it!

Eugene Kaspersky And Mikko Hypponen Talk Red October And The Future Of Cyber Warfare At DLD

Eugene Kaspersky And Mikko Hypponen Talk Red October And The Future Of Cyber Warfare At DLD | ICT Security-Sécurité PC et Internet | Scoop.it
What is the consequence of cyber warfare slowly becoming increasingly common?

 

The “happy hacker” of the 80s and 90s, he said, is long gone. Instead, we now have to deal with criminals who try to make money from their malware and botnets, hacktivists who try to protest and governments attacking their own citizens and other governments for espionage and full-scale cyber warfare.


As for cyber warfare in general, one thing Hypponen especially stressed is the difference between cyber espionage and cyber warfare. Spying, said Hypponen, is not warfare. “Warfare is something different,” he said. “It’s when you start using malware, viruses and backdoors to target our critical infrastructure.” Today, he argued we are seeing the very first stages of a global cyber arms race. We are now seeing many other governments besides U.S. and Israel jump on the same bandwagon and now that other countries see that these attacks are successful, they want to jump on the bandwagon, too.


Gust MEES's insight:

Read more, a MUST!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers infiltrate US government nuclear network

Hackers infiltrate US government nuclear network | ICT Security-Sécurité PC et Internet | Scoop.it

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.


According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.


A subsequent statement given to FoxNews.com appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2213690/hackers-infiltrate-us-government-nuclear-network?utm_campaign=V3_co_uk&utm_source=Twitter&utm_medium=Twitterfeed

 

No comment yet.