ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar 

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity manual examines how international law applies to cyberwarfare

Cybersecurity manual examines how international law applies to cyberwarfare | ICT Security-Sécurité PC et Internet | Scoop.it
A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply.

 

Read more:

http://news.techworld.com/security/3379202/cybersecurity-manual-examines-how-international-law-applies-cyberwarfare/?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Teaching the shadowy art of cyber war

Teaching the shadowy art of cyber war | ICT Security-Sécurité PC et Internet | Scoop.it

As the Air Force faces up to the threat of attacks on computer networks and communications, it has developed a new ===> cyber war school <=== at Nellis Air Force Base designed to fight guerrilla tactics of cyber-terrorists.

 

Gust MEES: a MUST READ!

 

Read more:

http://www.lasvegassun.com/news/2012/jul/06/learning-art-cyber-war/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Massive Web of Fake Identities and Websites Controlled Flame Malware

A Massive Web of Fake Identities and Websites Controlled Flame Malware | ICT Security-Sécurité PC et Internet | Scoop.it
The attackers behind the complex Flame cyberespionage toolkit, believed to be a state-sponsored operation, used an extensive list of fake id...

 

Read more, interesting to know...

http://www.wired.com/threatlevel/2012/06/flame-command-and-control/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame proves cyberwarfare is active

Flame proves cyberwarfare is active | ICT Security-Sécurité PC et Internet | Scoop.it
Cyberwarfare is an emotive and contentious issue. But the emergence of an extensive and sophisticated attack toolkit, Flame, apparently targeted against Iran removes all doubt:

 

                      ===> cyberwar is here and active. <===

 

Image credit:

http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

 

Read more:

http://www.infosecurity-magazine.com/view/26037/flame-proves-cyberwarfare-is-active-/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers infiltrate US government nuclear network

Hackers infiltrate US government nuclear network | ICT Security-Sécurité PC et Internet | Scoop.it

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.


According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.


A subsequent statement given to FoxNews.com appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2213690/hackers-infiltrate-us-government-nuclear-network?utm_campaign=V3_co_uk&amp;utm_source=Twitter&amp;utm_medium=Twitterfeed

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber WarFare country-by-country analysis

Cyber WarFare country-by-country analysis | ICT Security-Sécurité PC et Internet | Scoop.it

Relying exclusively on open source information, task is to assess the relative capabilities of certain countries identified in the literature (China, India, Iran, North Korea, Pakistan, and Russia) to wage an effective cyber attack against an adversary.

 

The words “effective cyberattack” by no means translate into the proverbial “take down” of the Internet; on the contrary,such attacks might involve intrusions into unprotected networks for the purpose of compromising data tables, degrading communications, interrupting commerce, or impairing critical infrastructures (such as transportation or medical and emergency services) in such a way that trust is undermined at the expense of a smoothly running economy and society.

 

Read more:

http://cyberwarzone.com/cyberwarfare/cyber-warfare-country-country-analysis

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.?

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.? | ICT Security-Sécurité PC et Internet | Scoop.it
A computer worm developed by the U.S. and Israel, intended to attack Iran, was found in workstations at a factory the federal government considers critical.

 

===> If this doesn't scare you, it should. <===

 

Read more:

http://allthingsd.com/20120704/born-on-the-4th-of-july-will-there-be-collateral-damage-in-cyberwar/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Obama Ordered Wave of Cyberattacks Against Iran

Obama Ordered Wave of Cyberattacks Against Iran | ICT Security-Sécurité PC et Internet | Scoop.it
Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

 

Read more:

http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=3&amp;pagewanted=1&amp;pagewanted=all

 

No comment yet.