The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military Expert on Information Warfare. The Obama Administration will assign the command of NSA to Michael S. Rogers, presently the U.S Navy’s Cyber Security Chief, will be the new Director of the National Security Agency (NSA) and […]
Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar attack and attackers breached the email accounts of its staff accessing to documents on law enforcement inquiries. Reuters agency […]
Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare to the US citizens? In this post I desire to put together a series of useful information to better understand the perception of cyber threats on both US Government and population. Cyberwarfare is considerable today […]
CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is out. Don’t miss it. SPONSORED BY RSA CONFERENCE 2014 Read each FLIPBOOK edition electronically, online and flip through the page: CYBER WARNINGS E-MAGAZINE: DECEMBER 2013 CYBER DEFENSE MAGAZINE: ANNUAL EDITION FOR 2013 Download a color PDF […]
The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance in the case of cyber attacks. NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a […]
During a CBS Interview show “60 Minutes”, The NSA Director General Alexander and the Information Assurance Director Plunkett claimed a foreign government has developed a BIOS based malware that can remotely destroy any computer. Senior National Security Agency (NSA) officials have revealed to CBS American television newsmagazine “60 Minutes” that a foreign government has tried […]
Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon … Countries that represent the new heaven for cybercriminals IntelCrawler: «Near East – new heaven for bulletproof hosting providers, first effects of war on cyberspace in action» Los-Angeles CA– The US based cyber and risk intelligence provider IntelCrawler has announced […]
NSS Labs issued the report titled “The Known Unknowns” to explain dynamics behind the market of zero-day exploits. Last week I discussed about the necessity to define a model for “cyber conflict” to qualify the principal issues related to the use of cyber tools and cyber weapons in an Information Warfare context, today I decided […]
Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the “model of conflict” and rules for the actors. Cyber war and cyber information warfare are two terms very inflated used to describe the current disputes within the cyberspace. To explain the effect of acts of […]
German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio signals. The shocking news that it is possible to infect a computer with Inaudible Audio signals is circulating within the security community has been circulating for several weeks between denials and confirmations. In October the […]