Cyber warfare

FireEye World War C report – Nation-state driven cyber attacksFireEye World War C report – Nation-state driven cyber attacks

FireEye World War C report – Nation-state driven cyber attacks

FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven…

12 years ago
Iran hacked US Navy ComputersIran hacked US Navy Computers

Iran hacked US Navy Computers

US officials revealed that Iran hacked unclassified Navy computers in recent weeks in an escalation of cyber attacks against US infrastructures. The…

12 years ago
Chinese hackers increasingly attracted to the drone technologyChinese hackers increasingly attracted to the drone technology

Chinese hackers increasingly attracted to the drone technology

Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before!…

12 years ago
CBMEN, DARPA’s peer-to-peer technology for battlefieldCBMEN, DARPA’s peer-to-peer technology for battlefield

CBMEN, DARPA’s peer-to-peer technology for battlefield

DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield…

12 years ago
Syrian Electronic Army hit NYT and TwitterSyrian Electronic Army hit NYT and Twitter

Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost…

12 years ago
Information Warfare, Russia, New Zeland…it is arms raceInformation Warfare, Russia, New Zeland…it is arms race

Information Warfare, Russia, New Zeland…it is arms race

Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia…

12 years ago
The cyber capabilities of Iran can hit USThe cyber capabilities of Iran can hit US

The cyber capabilities of Iran can hit US

A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States" states that Iran has sufficient…

12 years ago
Credit Card Redirection, the evolution of phishingCredit Card Redirection, the evolution of phishing

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With…

12 years ago
Hackers hit South Korea also spread spyware to steal military secretsHackers hit South Korea also spread spyware to steal military secrets

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military…

12 years ago
Watering hole attacks and exploit kits – Indian gov site caseWatering hole attacks and exploit kits – Indian gov site case

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised…

12 years ago