Your new post is loading...
Your new post is loading...
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences. Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online. The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them. Learn more / En savoir plus / Mehr erfahren: http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
|
Scooped by
Gust MEES
|
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden. Learn more / En savoir plus / Mehr erfahren: http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
More than one thousand energy firms are said to have been targeted by internet hackers, with particular interest in compromising industrial control systems.
There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.
|
Scooped by
Gust MEES
|
Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on his mind as he gazes over...
|
Scooped by
Gust MEES
|
‘Cyber ecosystem’ could mimic dynamics of the human immune system to isolate and contain threats robotically. The federal government is strategizing to build a virtual community that would prompt computers worldwide to instantly, en mass, suppress cyberattacks, sometimes without humans at the keyboard. ===> The so-called "cyber ecosystem" would take “collective action” to galvanize cooperation among networks, external devices, and consumers, the Obama administration announced today. <=== “Computer systems, devices, applications and users will automatically work together in near real time to anticipate and prevent cyberattacks, automatically respond to attacks while continuing normal operations, evolve to address new threats, limit the spread of attacks across participating devices,” as well as share timely security information, a government research solicitation stated. The Homeland Security Department and National Institute of Standards and Technology are seeking public input on the potential benefits and challenges of the approach before forging ahead with construction. “This information will help DHS and NIST develop future cyber ecosystem security capabilities and an implementation strategy that will strengthen the security of critical infrastructures, federal information systems and the private sector,” the bulletin stated. Read more: http://www.nextgov.com/emerging-tech/2012/09/get-ready-computers-worldwide-automatically-smother-cyber-strikes/57977/
|
Scooped by
Gust MEES
|
Nations are developing disruptive offensive software — at great potential risk. Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory. Read more: http://www.nytimes.com/2012/09/10/opinion/a-new-kind-of-warfare.html?_r=2
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
US Air Force Wants to Enhance Its Cyber Warfare Capabilities... The US Military has been successfully using cyber weapons for quite some time now, a speech held by Marine Lieutenant General Richard P. Mills at the AFCEA TechNet Land Forces conference revealed the other day. As it turns out, the US Air Force is also looking to enhance its cyber capabilities. ===> They explicitly say that they’re interested in cyberspace technologies that could help them destroy, deny, degrade, disrupt, deceive, corrupt or usurp the enemy’s ability to “use the cyberspace domain for his advantage.” <=== Read more: http://news.softpedia.com/news/US-Air-Force-Wants-to-Enhance-Its-Cyber-Warfare-Capabilities-288751.shtml?utm_source=dlvr.it&utm_medium=twitter
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
What is cyberwar?
At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.
What does cyberwarfare look like?
Cyberwar is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.
Governments and nation states are now officially training for cyberwarfare: An inside look
Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and TechRepublic takes you inside.
Read More
Governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences. Learn more / En savoir plus / Mehr erfahren: https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.
|
Scooped by
Gust MEES
|
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:
We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? Learn more / En savoir plus / Mehr erfahren: http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.
|
Scooped by
Gust MEES
|
Britain is building an army to wage war by hurling computer hackers at its enemies. Defence Secretary Philip Hammond said the country is recruiting "hundreds" of hackers at a cost of up to £500 mil...
|
Scooped by
Gust MEES
|
DARPA postpones release of official solicitation. Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations. “Due to an unanticipated and overwhelming response from industry and academia, DARPA has rescheduled the Plan X Proposers’ Day Workshop,” agency officials announced Sept. 5. Two sessions with researchers and defense contractors—one classified and one non-classified—originally were slated for Sept. 27, but have now been moved to Oct. 15 and 16. “The second day will be a repeat of the first day to accommodate the remaining attendees,” the notice said. The request for proposals, originally scheduled for release at the end of this month, is expected to be published in October instead. The surge of interest highlights a community emerging around offensive security technology. Plan X is a Pentagon initiative to develop computer architecture that monitors damage in “dynamic, contested, and hostile network environments,” adaptively defends against attacks, and performs “weapon deployment,” contracting documents indicate. The program is not funding malware or tools that hunt down vulnerabilities, but the resulting computer architecture will likely serve as the framework for their deployment. Read more: http://www.nextgov.com/defense/2012/09/pentagon-receives-overwhelming-response-plan-x-cyber-offensive/57961/
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites. Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau to parliament for approval. In the six months to June, hackers launched more than one million attacks on the bureau's website, making it one of the most heavily targeted government sites, the paper said. Read more: http://www.securityweek.com/taiwan-step-cyberwar-capabilities-report?utm_source=dlvr.it&utm_medium=twitter
|
Scooped by
Gust MEES
|
The Air Force Life Cycle Management Center (AFLCMC) posted a broad agency announcement [PDF] last week calling on contractors to submit concept papers detailing technological demonstrations of ‘cyberspace warfare operations’ (CWO) capabilities. The Air Force is looking to obtain CWO capabilities falling into a number of categories including: ‘cyberspace warfare attack’ and ‘cyberspace warfare support.’ The broad agency announcement defines ‘cyberspace warfare attack’ capabilities as those which would give them the ability to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.” Read more: http://threatpost.com.mx/en_us/blogs/air-force-opnely-seeking-cyber-weapons-082812
|
There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.
Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.
The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/
https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare
https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...