Cyber warfare

NSA – A bios malware can remotely destroy any US system

During a CBS Interview show "60 Minutes", The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a…

12 years ago

Near East – new heaven for bulletproof hosting providers, first effects of cyberwar

Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon ... Countries that represent the new…

12 years ago

Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled "The Known Unknowns" to explain dynamics behind the market of zero-day exploits. Last week…

12 years ago

Cyber warfare – Why we need to define a model of conflict?

Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the…

12 years ago

Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio…

12 years ago

Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program…

12 years ago

Stuxnet infected the network of Russian nuclear facility

Eugene Kaspersky revealed that a staffer at the unnamed nuclear Russian plant informed him of the infection of internal network…

12 years ago

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa…

12 years ago

Android Wroba banking trojan targeted Korean users

The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean…

12 years ago

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

12 years ago

This website uses cookies.