ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].

Gust MEES's insight:

Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].


No comment yet.
Scooped by Gust MEES
Scoop.it!

Dragonfly hackers target over 1000 Western energy firms

Dragonfly hackers target over 1000 Western energy firms | ICT Security-Sécurité PC et Internet | Scoop.it
More than one thousand energy firms are said to have been targeted by internet hackers, with particular interest in compromising industrial control systems.


There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


Gust MEES's insight:

There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How Does Cyber Warfare Work?

How Does Cyber Warfare Work? | ICT Security-Sécurité PC et Internet | Scoop.it
How does cyber warfare work? This question was originally answered on Quora by Andy Manoske.

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Gust MEES's insight:

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

Gust MEES's curator insight, July 22, 2013 7:35 AM

 

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

Scooped by Gust MEES
Scoop.it!

It’s global cyber war out there

It’s global cyber war out there | ICT Security-Sécurité PC et Internet | Scoop.it
Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on his mind as he gazes over...
Gust MEES's insight:

Check out also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cybercrime+cost+%24110+billion+last+year

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cyberwar...

 

http://www.scoop.it/t/securite-pc-et-internet?tag=cyberwarfare

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive | ICT Security-Sécurité PC et Internet | Scoop.it
DARPA postpones release of official solicitation.

 

Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations.

 

“Due to an unanticipated and overwhelming response from industry and academia, DARPA has rescheduled the Plan X Proposers’ Day Workshop,” agency officials announced Sept. 5.

 

Two sessions with researchers and defense contractors—one classified and one non-classified—originally were slated for Sept. 27, but have now been moved to Oct. 15 and 16. “The second day will be a repeat of the first day to accommodate the remaining attendees,” the notice said. The request for proposals, originally scheduled for release at the end of this month, is expected to be published in October instead.

 

The surge of interest highlights a community emerging around offensive security technology. Plan X is a Pentagon initiative to develop computer architecture that monitors damage in “dynamic, contested, and hostile network environments,” adaptively defends against attacks, and performs “weapon deployment,” contracting documents indicate. The program is not funding malware or tools that hunt down vulnerabilities, but the resulting computer architecture will likely serve as the framework for their deployment.

 

Read more:

http://www.nextgov.com/defense/2012/09/pentagon-receives-overwhelming-response-plan-x-cyber-offensive/57961/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Japan to set up cyberdefense unit by 2013

Japan to set up cyberdefense unit by 2013 | ICT Security-Sécurité PC et Internet | Scoop.it
Summary: Country's defense ministry to recruit 100 people for task force to fend off cyberattacks, to gather information on computer viruses for analysis and study methods of counterattack.

 

Read more:

http://www.zdnet.com/japan-to-set-up-cyberdefense-unit-by-2013-7000003941/?

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity manual examines how international law applies to cyberwarfare

Cybersecurity manual examines how international law applies to cyberwarfare | ICT Security-Sécurité PC et Internet | Scoop.it
A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply.

 

Read more:

http://news.techworld.com/security/3379202/cybersecurity-manual-examines-how-international-law-applies-cyberwarfare/?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Taiwan to Step Up Cyberwar Capabilities

Taiwan to Step Up Cyberwar Capabilities | ICT Security-Sécurité PC et Internet | Scoop.it
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites.

 

Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau to parliament for approval.

 

In the six months to June, hackers launched more than one million attacks on the bureau's website, making it one of the most heavily targeted government sites, the paper said.

 

Read more:

http://www.securityweek.com/taiwan-step-cyberwar-capabilities-report?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Air Force Openly Seeking Cyber-Weapons

Air Force Openly Seeking Cyber-Weapons | ICT Security-Sécurité PC et Internet | Scoop.it
The Air Force Life Cycle Management Center (AFLCMC) posted a broad agency announcement [PDF] last week calling on contractors to submit concept papers detailing technological demonstrations of ‘cyberspace warfare operations’ (CWO) capabilities.

 

The Air Force is looking to obtain CWO capabilities falling into a number of categories including: ‘cyberspace warfare attack’ and ‘cyberspace warfare support.’

 

The broad agency announcement defines ‘cyberspace warfare attack’ capabilities as those which would give them the ability to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.”

 

Read more:

http://threatpost.com.mx/en_us/blogs/air-force-opnely-seeking-cyber-weapons-082812

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

US Air Force Wants to Enhance Its Cyber Warfare Capabilities

US Air Force Wants to Enhance Its Cyber Warfare Capabilities | ICT Security-Sécurité PC et Internet | Scoop.it
US Air Force Wants to Enhance Its Cyber Warfare Capabilities...

 

The US Military has been successfully using cyber weapons for quite some time now, a speech held by Marine Lieutenant General Richard P. Mills at the AFCEA TechNet Land Forces conference revealed the other day. As it turns out, the US Air Force is also looking to enhance its cyber capabilities.

 

===> They explicitly say that they’re interested in cyberspace technologies that could help them destroy, deny, degrade, disrupt, deceive, corrupt or usurp the enemy’s ability to “use the cyberspace domain for his advantage.” <===

 

Read more:

http://news.softpedia.com/news/US-Air-Force-Wants-to-Enhance-Its-Cyber-Warfare-Capabilities-288751.shtml?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Prepare for offensive cyberwar, say MPs

Prepare for offensive cyberwar, say MPs | ICT Security-Sécurité PC et Internet | Scoop.it
“The Intelligence and Security Committee says defending against cyber attacks is no longer enough,” reports the BBC, commenting on the committee’s newly published Annual Report 2011–2012.

 

 

 

Read more:

http://www.infosecurity-magazine.com/view/27029/prepare-for-offensive-cyberwar-say-mps/?utm_source=twitterfeed&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The cyber arms race is beginning

The cyber arms race is beginning | ICT Security-Sécurité PC et Internet | Scoop.it
Security expect Mikko Hypponen on how Stuxnet and other targeted cyberattacks are the first steps in a cyber arms race.

 

Stuxnet was obviously a game changer. But what does it mean in the long term? I think we are now seeing the very first steps of a new arms race: The cyber arms race.

 

Just like modern hi-tech research revolutionised military operations over the last 50 years, we are going to see a new revolution, focusing on information operations and cyber warfare. This revolution is underway and it's happening right now.

 

We haven't seen real online warfare yet, of course. This is because thankfully we haven't lately seen wars between technically advanced nations. But any future crisis is likely to have a cyber component as well.

 

Read more "A MUST" to understand the importance about IT-Security and Cyber-Security:

http://www.bbc.co.uk/news/technology-18825742#?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

L’Inde prête à se doter de cyber-armes

L’Inde prête à se doter de cyber-armes | ICT Security-Sécurité PC et Internet | Scoop.it
Après la cyberdéfense, plusieurs Etats, dont l’Inde, s’apprêteraient à présent à développer un arsenal de cyber-armes. La faute à Stuxnet et Flame, des programmes présentés comme étant des armes mises au point par des pays.

 

Lire plus :

http://www.zdnet.fr/actualites/l-inde-prete-a-se-doter-de-cyber-armes-39772725.htm#xtor=EPR-105

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Russia attacks U.S. oil and gas companies in massive hack

Russia attacks U.S. oil and gas companies in massive hack | ICT Security-Sécurité PC et Internet | Scoop.it
Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.
Gust MEES's insight:

Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.


No comment yet.
Scooped by Gust MEES
Scoop.it!

UK to hire hundreds of hackers for new £500m cyber-battalion

UK to hire hundreds of hackers for new £500m cyber-battalion | ICT Security-Sécurité PC et Internet | Scoop.it
Britain is building an army to wage war by hurling computer hackers at its enemies. Defence Secretary Philip Hammond said the country is recruiting "hundreds" of hackers at a cost of up to £500 mil...
Gust MEES's insight:

 

Instead of bombs and bullets, the new cyber regiment will fashion lethal computer worms and viruses to wipe out enemy targets.


And again a new word to add to the Cybersecurity dictionary ===> cyber-battalion...



No comment yet.
Scooped by Gust MEES
Scoop.it!

Eugene Kaspersky And Mikko Hypponen Talk Red October And The Future Of Cyber Warfare At DLD

Eugene Kaspersky And Mikko Hypponen Talk Red October And The Future Of Cyber Warfare At DLD | ICT Security-Sécurité PC et Internet | Scoop.it
What is the consequence of cyber warfare slowly becoming increasingly common?

 

The “happy hacker” of the 80s and 90s, he said, is long gone. Instead, we now have to deal with criminals who try to make money from their malware and botnets, hacktivists who try to protest and governments attacking their own citizens and other governments for espionage and full-scale cyber warfare.


As for cyber warfare in general, one thing Hypponen especially stressed is the difference between cyber espionage and cyber warfare. Spying, said Hypponen, is not warfare. “Warfare is something different,” he said. “It’s when you start using malware, viruses and backdoors to target our critical infrastructure.” Today, he argued we are seeing the very first stages of a global cyber arms race. We are now seeing many other governments besides U.S. and Israel jump on the same bandwagon and now that other countries see that these attacks are successful, they want to jump on the bandwagon, too.


Gust MEES's insight:

Read more, a MUST!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers infiltrate US government nuclear network

Hackers infiltrate US government nuclear network | ICT Security-Sécurité PC et Internet | Scoop.it

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.


According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.


A subsequent statement given to FoxNews.com appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2213690/hackers-infiltrate-us-government-nuclear-network?utm_campaign=V3_co_uk&amp;utm_source=Twitter&amp;utm_medium=Twitterfeed

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Get ready for computers worldwide to automatically smother cyber strikes

Get ready for computers worldwide to automatically smother cyber strikes | ICT Security-Sécurité PC et Internet | Scoop.it
‘Cyber ecosystem’ could mimic dynamics of the human immune system to isolate and contain threats robotically.

 

The federal government is strategizing to build a virtual community that would prompt computers worldwide to instantly, en mass, suppress cyberattacks, sometimes without humans at the keyboard.

 

===> The so-called "cyber ecosystem" would take “collective action” to galvanize cooperation among networks, external devices, and consumers, the Obama administration announced today. <===

 

“Computer systems, devices, applications and users will automatically work together in near real time to anticipate and prevent cyberattacks, automatically respond to attacks while continuing normal operations, evolve to address new threats, limit the spread of attacks across participating devices,” as well as share timely security information, a government research solicitation stated.

 

The Homeland Security Department and National Institute of Standards and Technology are seeking public input on the potential benefits and challenges of the approach before forging ahead with construction.

 

“This information will help DHS and NIST develop future cyber ecosystem security capabilities and an implementation strategy that will strengthen the security of critical infrastructures, federal information systems and the private sector,” the bulletin stated.

 

Read more:

http://www.nextgov.com/emerging-tech/2012/09/get-ready-computers-worldwide-automatically-smother-cyber-strikes/57977/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A New Kind of Warfare

A New Kind of Warfare | ICT Security-Sécurité PC et Internet | Scoop.it
Nations are developing disruptive offensive software — at great potential risk.

 

Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory.

 

Read more:

http://www.nytimes.com/2012/09/10/opinion/a-new-kind-of-warfare.html?_r=2

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber WarFare country-by-country analysis

Cyber WarFare country-by-country analysis | ICT Security-Sécurité PC et Internet | Scoop.it

Relying exclusively on open source information, task is to assess the relative capabilities of certain countries identified in the literature (China, India, Iran, North Korea, Pakistan, and Russia) to wage an effective cyber attack against an adversary.

 

The words “effective cyberattack” by no means translate into the proverbial “take down” of the Internet; on the contrary,such attacks might involve intrusions into unprotected networks for the purpose of compromising data tables, degrading communications, interrupting commerce, or impairing critical infrastructures (such as transportation or medical and emergency services) in such a way that trust is undermined at the expense of a smoothly running economy and society.

 

Read more:

http://cyberwarzone.com/cyberwarfare/cyber-warfare-country-country-analysis

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A who's who of Mideast-targeted malware

A who's who of Mideast-targeted malware | ICT Security-Sécurité PC et Internet | Scoop.it
What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common? Read this blog post by Elinor Mills on Security & Privacy.

 

Read more:

http://news.cnet.com/8301-1009_3-57503949-83/a-whos-who-of-mideast-targeted-malware/?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Teaching the shadowy art of cyber war

Teaching the shadowy art of cyber war | ICT Security-Sécurité PC et Internet | Scoop.it

As the Air Force faces up to the threat of attacks on computer networks and communications, it has developed a new ===> cyber war school <=== at Nellis Air Force Base designed to fight guerrilla tactics of cyber-terrorists.

 

Gust MEES: a MUST READ!

 

Read more:

http://www.lasvegassun.com/news/2012/jul/06/learning-art-cyber-war/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Gauss: Abnormal Distribution

Gauss: Abnormal Distribution | ICT Security-Sécurité PC et Internet | Scoop.it
While analyzing the Flame malware that we detected in May 2012, Kaspersky Lab experts identified some distinguishing features of Flame's modules.

 

Based on those features, we discovered that in 2009, the first variant of the Stuxnet worm included a module that was created based on the Flame platform. This indicates that there was some form of collaboration between the groups that developed the Flame and Tilded (Stuxnet/Duqu) platforms.

 

Based on the results of a detailed analysis of Flame, we continued to actively search for new, unknown components. A more in-depth analysis conducted in June 2012 resulted in the discovery of a new, previously unknown malware platform that uses a modular structure resembling that of Flame, a similar code base and system for communicating to C&C servers, as well as numerous other similarities to Flame.

 

In our opinion, all of this clearly indicates that the new platform which we discovered and which we called 'Gauss,' is another example of a cyber-espionage toolkit based on the Flame platform.

 

Read more:

http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution#1

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Defense expert: US should hire hackers to conduct cyberwarfare

Defense expert: US should hire hackers to conduct cyberwarfare | ICT Security-Sécurité PC et Internet | Scoop.it
Summary: Defense analyst John Arquilla believes the U.S. should stop prosecuting elite hackers and instead hire them to wage an online war against terrorists as well as other American enemies. He argues if the U.S.should stop prosecuting elite hackers and instead hire them to wage an online war against terrorists as well as other American enemies. He argues if the U.S. played its card rights with hackers, the war on terror would have been long over.

 

Read more:

http://www.zdnet.com/defense-expert-us-should-hire-hackers-to-conduct-cyberwarfare-7000000920/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.?

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.? | ICT Security-Sécurité PC et Internet | Scoop.it
A computer worm developed by the U.S. and Israel, intended to attack Iran, was found in workstations at a factory the federal government considers critical.

 

===> If this doesn't scare you, it should. <===

 

Read more:

http://allthingsd.com/20120704/born-on-the-4th-of-july-will-there-be-collateral-damage-in-cyberwar/

 

No comment yet.