Information Warfare

Moving threat landscape: The reality beyond the cyberwarfare

It started quietly as a probability not a reality. Now within months cyberwarfare has become a reality plausible as the…

9 years ago

G7 DECLARATION ON RESPONSIBLE STATES BEHAVIOR IN CYBERSPACE

Presented the voluntary, non-binding norms of State behavior during peacetime in the G7 DECLARATION ON RESPONSIBLE STATES BEHAVIOR IN CYBERSPACE. The…

9 years ago

German Military to Launch the Bundeswehr’s new Cyber and Information Space Command

Today the German Military is going to launch a cyber command, the Bundeswehr's new Cyber and Information Space (CIR) Command.…

9 years ago

President Donald Trump is going to extend by one year the Executive Order 13694

US President Trump is extending by one year special powers introduced by President Obama with the Executive Order 13694 on…

9 years ago

Exclusive: Dirty Political Spying Attempt behind the FHAPPI Campaign: all the details in the interview with @unixfreaxjp

The role of China (PRC) in the worldwide cyber espionage game of conditioning political life: when reserved information are brandished…

9 years ago

South Korea targeted by a cyber espionage campaign, experts blame Norks

South Korea is once against under attack, alleged nation-state hackers have launched a sophisticated cyber espionage campaign on organizations in…

9 years ago

For the second time in a few months Montenegro suffered massive and prolonged cyberattacks

For the second time in a few months Montenegro suffered massive and prolonged cyberattacks against government and media websites. According…

9 years ago

IBM shares details on the attack chain for the Shamoon malware

Security experts at IBM published a report that includes precious details on the attack chain of the dreader Shamoon cyberweapon.…

9 years ago

NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace

NATO's Cooperative Cyber Defense Centre of Excellence (CCDCOE) has published 'Tallinn Manual 2.0 on the International Law Applicable to Cyber…

9 years ago

Possible Information warfare scenarios behind the Shamoon resurrection

The dreaded Shamoon has resurrected, which are possible political and technological scenarios behind the recent wave of attacks? The dreaded…

9 years ago

This website uses cookies.