Cyber warfare

Israeli Defense computer hacked via spear phishing attackIsraeli Defense computer hacked via spear phishing attack

Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15…

11 years ago
Perception of cyberwarfare in US Defence and societyPerception of cyberwarfare in US Defence and society

Perception of cyberwarfare in US Defence and society

Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare…

11 years ago
CDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for freeCDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for free

CDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for free

CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is…

11 years ago
NATO has constituted Cyber Response TeamsNATO has constituted Cyber Response Teams

NATO has constituted Cyber Response Teams

The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance…

11 years ago
NSA – A bios malware can remotely destroy any US systemNSA – A bios malware can remotely destroy any US system

NSA – A bios malware can remotely destroy any US system

During a CBS Interview show "60 Minutes", The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a…

11 years ago
Near East – new heaven for bulletproof hosting providers, first effects of cyberwarNear East – new heaven for bulletproof hosting providers, first effects of cyberwar

Near East – new heaven for bulletproof hosting providers, first effects of cyberwar

Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon ... Countries that represent the new…

11 years ago
Zero-day vulnerability exploits, too precious commoditiesZero-day vulnerability exploits, too precious commodities

Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled "The Known Unknowns" to explain dynamics behind the market of zero-day exploits. Last week…

11 years ago
Cyber warfare – Why we need to define a model of conflict?Cyber warfare – Why we need to define a model of conflict?

Cyber warfare – Why we need to define a model of conflict?

Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the…

11 years ago
Malware can infect system using Inaudible Audio signalsMalware can infect system using Inaudible Audio signals

Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio…

11 years ago
Israel and Saudi Arabia are plotting a cyber weapon worse than StuxnetIsrael and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program…

11 years ago