Cyber Strategies for a World at War



SvTech World

The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

“The Dark Web poses new and formidable challenges for law enforcement agencies around the world”


The Dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term “deep web” is mistakenly used to refer specifically to the dark web.



Darknet websites are accessible only through networks such as Tor (“The Onion Router”) and I2P (“Invisible Internet Project”).Tor browser and Tor-accessible sites are…

View original post 750 more words

Filed under: cyber

Preview Film: Hacker (2016)

New Kid on the Blog

Nama Callan McAuliffe mulai dikenal oleh publik Hollywood sebagai aktor remaja saat tampil di I Am Number Four (2011). Cowok kelahiran tahun 1995 itu kemudian sempat menyabet Young Artist Award 2014, sebagai aktor pendukung terbaik, berkat perannya sebagai Jay Gatsby muda di The Great Gatsby (2013) yang dibintangi oleh Leonardo DiCaprio.

Awal tahun ini, McAuliffe kembali menghiasi layar lebar sebagai pemeran utama lewat film thriller bertajuk Hacker. Film yang di Amerika Serikat dirilis dengan judul Anonymous tersebut mulai tayang di bioskop-bioskop Indonesia sejak hari Jumat (20/1) yang lalu.

View original post 301 more words

Filed under: cyber

How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument

South China Sea Research

Authors: Gary King, Jennifer Pan, Margaret E. Roberts

American Political Science Review, 14 January 2017


The Chinese government has long been suspected of hiring as many as 2,000,000 people to surreptitiously insert huge numbers of pseudonymous and other deceptive writings into the stream of real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called “50c party” posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of the vast majority of posts openly accused on social media of being 50c. Yet, almost no systematic empirical evidence exists for this claim, or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the…

View original post 637 more words

Filed under: cyber

BBC News – US hackers attacked military websites, says China’s defence ministry

To Inform is to Influence

A Chinese tanker soldier with the People's Lib... A Chinese tanker soldier with the People’s Liberation Army (Photo credit: Wikipedia)

Oh, yes.  Republic of China, thank you for following my script.

BBC News – US hackers attacked military websites, says China’s defence ministry.

Hackers from the US have repeatedly launched attacks on two Chinese military websites, including that of the Defence Ministry, officials say.

The sites were subject to about 144,000 hacking attacks each month last year, two thirds of which came from the US, according to China’s defence ministry.

The issue of cyber hacking has strained relations between the two countries.

Earlier this month a US cyber security firm said a secretive Chinese military unit was behind “prolific hacking”.

Mandiant said that Unit 61398 was believed to have “systematically stolen hundreds of terabytes of data” from at least 141 organisations around the world.

The White House has said that it has taken its concerns about cyber-theft…

View original post 346 more words

Filed under: cyber

China just made VPNs illegal

To Inform is to Influence

China’s Ministry of Industry and Information Technology announced the new rules on Sunday, as reported by the South China Morning Post. Calling it a “clean-up” of the country’s internet connections, the Ministry said the new rules would go live immediately and be in place until March 31st, 2018.

VPNs are already subject to government scrutiny and interference in China. The most recent, large-scale  crackdown on VPNs happened in March 2016, during the National People’s Congress meeting in Beijing, SCMP says.

As The Washington Post points out, China’s new VPN and cable regulations are purposefully vague. It’s unclear how the government will implement or enforce these rules, but the language in the announcement suggests Chinese officials are taking aim at companies who provide VPN services to individual citizens, rather than professionals working for multinational corporations in the country.

Last week, in stark contrast to the Ministry’s new VPN rules…

View original post 125 more words

Filed under: cyber

Virtual Reality Technology offers Great Risks as well as Great Rewards

Writing for the Web

Manus Virtual Reality Technology An advertisement for Manus Virtual Reality gloves and headset. Posted to Wikimedia commons by Manus VR.

Immersive virtual reality technology, once a concept limited to science-fiction, has made great strides in recent years. This technology may one day be “the next big thing” in areas like entertainment, education, and even healthcare.

As with all new technology, there is almost as much potential for harm as there is for growth. But is the potential for harm enough to outweigh the benefits?

View original post 416 more words

Filed under: cyber

Hacktivism – Chaotic Good or Chaotic Danger?

Writing for the Web


The Digital Age has given rise to a unique new type of activism, called hacktivism. One of this week’s articles defines hacktivism as “is the use of computer technology to achieve a political agenda through legally ambiguous means.”

A simple vector image of a suit. This is commonly used as the logo of Anonymous, a well-known hactivist group.

The problem is, many people disagree on whether “hackitvism” is a platform for positive social change or yet another danger of the digital age.

View original post 366 more words

Filed under: cyber

The U.S. Needs A Preemptive Cyber Warfare Doctrine


Preempt, Disrupt, Defeat Adversaries in Cyberspace

cyberwarfare1The United States has suffered yet another major cyber attack. On October 21, 2016, major corporations and the U.S. government’s servers fell under a malicious and widespread attack from hackers that are believed to have been associated with Russia. Several social media sites, the New York Times, and Spotify all suffered outages because of a Denial of Service attack (DOS).

This is the most typical kind of cyber attack that nations engage in. Essentially, they overwhelm a server and force it to shut down. The U.S. is under constant cyber attack. The fact that the Russians may have done this is not surprising, either. They have constantly led the way in attacking America’s networks. The thing about cyber war, also, is that there is a blurring of lines between what constitutes civilian targets and strictly military ones. Yet, the margin for error is far smaller…

View original post 2,062 more words

Filed under: cyber

Top 10 Passwords of 2016 Revealed

Easy Cyber - Security Made Simple

I know I’m banging on about passwords again, but this is important people! If you check this story out, you’ll see that of the top 10 passwords used last year, 4 were 6 characters or less, and hardly any of the top 20 are new or different to previous years. The top password of 2016 was 123456.

I talked in a previous article about why passwords were important, and this recent list just goes to demonstrate that. Apart from anything else, the bad guys take lists like this and use the results as the first passwords they try when they try to get into systems. If you’ve got a machine checking these it will literally take a fraction of a second to break in.

I recently signed up to a new social media website, and was amazed when it told me my password couldn’t be more than 10…

View original post 145 more words

Filed under: cyber

How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument

To Inform is to Influence

screen-shot-2017-01-19-at-9-57-54-pmGary King, Jennifer Pan, and Margaret E. Roberts. Forthcoming. “How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument.” American Political Science Review, 2017.


The Chinese government has long been suspected of hiring as many as 2,000,000 people to surreptitiously insert huge numbers of pseudonymous and other deceptive writings into the stream of real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called “50c party” posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of the vast majority of posts openly accused on social media of being 50c. Yet, almost no systematic empirical evidence exists for this claim, or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large scale empirical analysis of this…

View original post 180 more words

Filed under: cyber

Means, goals and consequences of the pro-Kremlin disinformation campaign

To Inform is to Influence

The EU’s East StratCom Task Force was set up by EU High Representative Federica Mogherini in 2015, in response to a request from all 28 EU Heads of Government to “address Russia’s ongoing disinformation campaigns”. It is a team of eleven communications and Russian language experts, who also seek to improve communication on EU policies towards the Eastern Neighbourhood and to strengthen media plurality in the region, especially in the Russian language.

The Task Force’s flagship products are its weekly Disinformation Review of pro-Kremlin disinformation stories and its social media accounts @EUvsDisinfo and EU vs Disinformation.

There is no doubt that the pro-Kremlin disinformation campaign is an orchestrated strategy, delivering the same disinformation stories in as many languages as possible, through as many channels as possible, and as often as possible. Our conclusion is based on 15 months of daily collection of data on disinformation: more…

View original post 1,089 more words

Filed under: cyber

President Trump Says No Computers Are Safe from Hackers!

Security. Privacy. Support.

Newly inaugurated President Donald Trump says that “no computer is safe” when it comes to keeping information private. He expressed growing skepticism about the overall security of online communications. His administration is likely to use the unsafe internet often for everything from day-to-day planning to international relations.


Trump rarely uses email or computers, despite his frequent tweeting. Websites that aren’t scanned for vulnerabilities like trojans, viruses and other malware are cyber security accidents just waiting to happen. PCI compliant security scans check for more than 75,500 known vulnerabilities used by hackers to disrupt e-commerce and steal consumer identities.

“You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I’ll tell you what: No computer is safe,” Trump told reporters during his annual New Year’s Eve bash. “I don’t care what they say.” With only 14% of e-commerce entities passing their…

View original post 18 more words

Filed under: cyber

Indian Cyber Soldiers

News Awakening

In this new era, digital revolution Internet is taking over. With the increased digitalization also increasing cyber threats. These Indian talents providing cyber security solutions all over the world effectively and making the world ponder over India.

Trisneet Arora

He is an Indian author and cyber security expert. He wrote books on cyber security, ethical hacking and web defence. He is the Founder and CEO of an IT Security Company called TAC Security.


In 2012 Trisneet Arora started his own company named Trisneet Arora Cyber Security Services (TACSS) and wrote two books named ‘Voice of Hackers’ and ‘The Hacking Era’. In no time he started helping with his company CBI, Punjab, Gujarat police.

TACSS provide services like providing security to servers data, Cyber Financial Crimes, Helping Police in investigations and etc.

In 2013, TAC Security started thier first branch in Mohali. His clients are from all around the world. Thier…

View original post 279 more words

Filed under: cyber

Africa’s Own Cyber Robin Hood: Meet Hamza Bendelladj The Algerian Man Who Hacked Over $400Million From American Banks And Donated It To Poor Africans


Hamza Bendelladj was dubbed the ‘happy hacker’ because he was photographed smiling after he was taken into custody in Bangkok [EPA]

Depending on who you ask, Hamza Bendelladj is either a Robin Hood-esque hero or a cyber-age hoodlum.

The 27-year-old Algerian computer science graduate will be sentenced on Tuesday in a US court for using a computer virus to steal money from more than 200 American banks and financial institutions. He then reportedly gave millions of dollars to Palestinian charities.

Bendelladj, who is alleged to be the co-creator of a banking trojan horse called SpyEye, was indicted in absentia by US authorities in 2011. The program – a malware toolkit that saw its popularity peak between 2009 and 2011 – is believed to have infected more than 1.4 million computers in the US and elsewhere, according to Wired, a San Francisco-based technology magazine. The software enabled users to steal login…

View original post 612 more words

Filed under: cyber

Digital images become perfect tool for biometric hacking

Sun & Shield

In 2014, a hacker made news when he was able to use electronic images of Germany’s Defense Minister to recreate a thumbprint and accurate retinal image that could be used to hack biometric authentication. All he needed were high resolution images taken with a digital camera and off-the-shelf software.  A study recently done in Japan reiterated the possibility of being hacked using digital images.

devil-horns-hand-signalIn the study, researchers found they could clone any person’s fingerprints if they had a photograph of them taken from a distance of 10 feet or less where the subject displayed the underside of their fingers or hand, such as when flashing the peace sign, devil’s horns, or bunny ears. It’s enough to make anyone hesitate about having photos posted of themselves on social media.

However, the engadget article featuring these findings points out that a hacker must “go through the process of building an accurate…

View original post 215 more words

Filed under: cyber

The Best 8 Movies To Watch If You Love Hacking.


TV shows have more options of showing hackers and hacking in right perspective as they have ample screen time compared to movies which have to cramp everything up in the 2 hours of runtime.  In this article, we bring out the top TV shows which have hacking as the central theme and try to picture hackers and the glamorous art of hacking in the right perspective.

Top 8 best TV series which show hackers in correct perspective

#1 Mr. Robot :

Mr. Robot Poster

Mr.Robot has become a cult TV show for millions of its followers. “Mr. Robot” is probably the first TV show that accurately portrays an elite hacker group that uses computers, mobile devices, different technologies, programming and social engineering to penetrate secure networks and take down evil corporations, all the while trying to remain anonymous. It shows code being written in Python, IRC chats and Raspberry PI computers, just to name…

View original post 456 more words

Filed under: cyber

5 Things Employees Do That Expose Your Network To Hackers

Naija Good Bastard

Hackers are having a field day in this present digital era because many organizations are moving their businesses from offline to online. This automatically makes them susceptible to hackers especially if their security is weak. Regardless, before hackers have access to your network, there must be a loophole which they will take advantage of. Oftentimes, than not, it is the online activities of some employees that allow hackers easy access to your network. Jumia Travel, identify 5 things employees do that expose your network to hackers. You can put checks in place to streamline the online activities of your employees.

They use weak password

This is one of the crudest things employees do which using a weak password or the same password for all their accounts. For example, using a password like 1234 or QWERTY is the simplest way to invite hackers. It may be difficult for you to…

View original post 250 more words

Filed under: cyber

FBI Hacked, Again! Programmer Leaks Data After Agency Failed to Patch Its Site



It appears like the FBI has been hacked, at the end of the day!

A programmer, utilizing Twitter handle CyberZeist, has asserted to have hacked the FBI’s site ( and released individual record data of a few FBI specialists publically.

CyberZeist had at first uncovered the defect on 22 December, giving the FBI time to fix the helplessness in its site’s code before making the information open.

The programmer abused a zero-day defenselessness in the Plone CMS, an Open Source Content Management programming utilized by FBI to host its site, and released individual information of 155 FBI authorities to Pastebin, including their names, passwords, and email accounts.

CyberZeist tweeted numerous screenshots as confirmation of his cases, demonstrating his unapproved access to server and database documents utilizing a zero-day neighborhood record consideration sort powerlessness influencing its python modules.

Programmer likewise found that the FBI’s site is facilitated on a virtual machine…

View original post 392 more words

Filed under: cyber

Hackers can listen your voice over Facebook voice messages sent over chat



A great many people abhor writing long messages while talking on informing applications, yet on account of voice recording highlight gave by WhatsApp and Facebook Messenger, which makes it much simpler for clients to send longer messages that for the most part incorporates a considerable measure of writing exertion.

In the event that you too have a propensity for sending sound clasp, rather than writing long messages, to your companions over Facebook Messenger, you are defenseless to a straightforward man-in-the-center (MITM) assault that could release your private sound clasps to the assailants.

Also troubling is that the issue is still not fixed by the online networking goliath.

Egyptian security scientist Mohamed A. Baset informed The Hacker News concerning an imperfection in Facebook Messenger’s sound clasp recording highlight that could professedly permit any man-in-the-center assailant to get your sound clasp documents from Facebook’s server and listen to your own voice messages.

View original post 452 more words

Filed under: cyber

2017 Technology Trends

POTs and PANs

Alexander_Crystal_SeerI usually take a look once a year at the technology trends that will be affecting the coming year. There have been so many other topics of interest lately that I didn’t quite get around to this by the end of last year. But here are the trends that I think will be the most noticeable and influential in 2017:

The Hackers are Winning. Possibly the biggest news all year will be continued security breaches that show that, for now, the hackers are winning. The traditional ways of securing data behind firewalls is clearly not effective and firms from the biggest with the most sophisticated security to the simplest small businesses are getting hacked – and sometimes the simplest methods of hacking (such as phishing for passwords) are still being effective.

These things run in cycles and there will be new solutions tried to stop hacking. The most interesting…

View original post 581 more words

Filed under: cyber

How Russian cyberwar hackers invaded the U.S.


A filing cabinet broken into in 1972 as part of the Watergate burglary sits beside a computer server that Russian hackers breached during the 2016 presidential campaign

❝ When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally, to the help desk.

His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named “the Dukes,” a cyberespionage team linked to the Russian government…

❝ Yared Tamene, the tech-support contractor at the D.N.C. who fielded the call, was no expert in cyberattacks. His first moves were to check Google for “the Dukes” and conduct a cursory search of the D.N.C. computer system logs to look for hints of such a cyberintrusion. By his own account…

View original post 206 more words

Filed under: cyber

Six agencies, federal cops, investigate Russia paying for pro-Trump hackers


“Oh, Look. This one has Donald’s name engraved on it.”

❝ The FBI and five other law enforcement and intelligence agencies have collaborated for months in an investigation into Russian attempts to influence the November election, including whether money from the Kremlin covertly aided President-elect Donald Trump…

The agencies involved in the inquiry are the FBI, the CIA, the National Security Agency, the Justice Department, the Treasury Department’s Financial Crimes Enforcement Network and representatives of the director of national intelligence…

❝ Investigators are examining how money may have moved from the Kremlin to covertly help Trump win, the two sources said. One of the allegations involves whether a system for routinely paying thousands of Russian-American pensioners may have been used to pay some email hackers in the United States or to supply money to intermediaries who would then pay the hackers…two sources said.

The informal, inter-agency working group began to…

View original post 174 more words

Filed under: cyber

An American Solution to Cyber Insecurity

Bryen's Blog News

If Donald Trump wants to take one important, indeed, vital step he will create a well-funded new Cyber Security Agency that is free of NSA and other deeply compromised interests.

by Stephen Bryen

The possible solution to escalating cyber insecurity has been staring us in the face for a long time.  But the road has not been taken because most companies that manufacture electronics today build the stuff in Asia, primarily in China.  This has created an unprecedented risk, because China is not at all adverse to bugging just about any product they can get their hands on.  Consequently everything from computers, cameras, routers, flash memories and smart TVs are potential targets for the Chinese government to exploit.

But, as any half decent cyber expert can tell you, when you put a backdoor, or a bot, or just a hole in the code, once discovered it can be exploited by…

View original post 1,126 more words

Filed under: cyber

War Games: The March of Military Tech

Moving Towards The Future

Throughout history, times of war have always caused us a society to enter a period of rapid technological advancement. In the aim of defeating an opposing force military forces work hard to engineer more reliable and efficient ways of killing people. While the circumstances behind these developments are perhaps correctly) seen as barbaric, many of these innovations have found uses outside of the battlefield. The most important of these was the American governments development of data communications network known as ARPANET. Its purpose was to be used as a potential method for communication in the event of a nuclear attack during the Cold War. This system eventually developed into what we now know as the internet.

internet.jpg Depiction of the modern internet (

In more recent times, military technology has moved towards taking away the human element of warfare. The most obvious example of this trend is the proliferation…

View original post 252 more words

Filed under: cyber warfare

Testing, Testing: Ethically Testing for Usability

Riley Hakenson - Writing for the Web

Usability can be defined as how easy it is for users of all abilities to access a site and navigate it easily. Aspects of usability range from easy visibility -colors and animations can impact this, for instance- to the amount of physical work required to use the site. Testing for usability may seem like a straightforward process. After all, it is simply a test of whether or not users can access and navigate the site. The problem comes with testing the site for differently-abled people and whether or not the way this testing is done is ethical.

“Should We Conduct this Usability Study? Ethics Considerations in Evaluations” is an article which discusses this issue specifically. It looks at different user demographics and how the abilities of these demographics impact a site’s usage. The first example the article uses is a user with osteoarthritis and how testing a site’s usability may…

View original post 208 more words

Filed under: cyber warfare

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]




Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]


  • An error has occurred; the feed is probably down. Try again later.


Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]



“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]



The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2016/08/23 Ushering in a New Generation of Low-Cost, Networked, Nuclear-Radiation Detectors August 23, 2016
    A DARPA program aimed at preventing attacks involving radiological "dirty bombs" and other nuclear threats has successfully developed and demonstrated a network of smartphone-sized mobile devices that can detect the tiniest traces of radioactive materials. Combined with larger detectors along major roadways, bridges, other fixed infrastructure, and […]
  • 2016/08/19 Microsystems Technology Office to host Office-Wide Proposers Day August 19, 2016
    Nothing is more iconic of today's high technology than the semiconductor chips inside our computers, phones, military systems, household appliances, fitness monitors, and even birthday cards and pets. Since its inception in 1992, DARPA's Microsystems Technology Office (MTO) has helped create and prevent strategic surprise through investments in com […]
  • 2016/08/15 Enabling Extreme New Designs for Optics and Imagers August 15, 2016
    Developers of imaging systems have long been beholden to certain rules of optics designs so well established and seemingly immutable as to be treated as virtual "laws" of physics. One widely considered pillar of optical design, for example, is that imaging systems must be built from a series of complex and precisely manufactured optical elements ar […]
  • 2016/08/11 Wanted: Ideas for Protecting Against Small Unmanned Air Systems August 11, 2016
    The rapid evolution of small unmanned air systems (sUAS) technologies is fueling the exponential growth of the commercial drone sector, creating new asymmetric threats for warfighters. sUASs' size and low cost enable novel concepts of employment that present challenges to current defense systems. These emerging irregular systems and concepts of operatio […]
  • 2016/08/05 Living Structural Materials Could Open New Horizons for Engineers and Architects August 5, 2016
    The structural materials that are currently used to construct homes, buildings, and infrastructure are expensive to produce and transport, wear out due to age and damage, and have limited ability to respond to changes in their immediate surroundings. Living biological materials-bone, skin, bark, and coral, for example-have attributes that provide advantages […]


RSS Cyber News (Google)

  • ​Cyber experts to brief Australian political leaders - ZDNet January 23, 2017
    ZDNet​Cyber experts to brief Australian political leadersZDNetAustralian Prime Minister Malcolm Turnbull will be put through his paces by cyber defence experts on Tuesday, as he and his cybersecurity assistant Dan Tehan visit the Australian Signals Directorate to learn about the nation's offensive and defensive ...Labor accuses Malcolm Turnbull of putti […]
  • Saudi Arabia warns on cyber defense as Shamoon resurfaces - Reuters January 23, 2017
    ReutersSaudi Arabia warns on cyber defense as Shamoon resurfacesReutersThe Shamoon hackers were likely working on behalf of the Iranian government in the 2012 campaign and the more-recent attacks, said Adam Meyers, vice president with cyber security firm CrowdStrike. "It's likely they will continue," he said. State ...Shamoon return prompts Sa […]
  • Incredible 1266% jump in cyber fraud as criminals switch to new tactics to steal your cash - how to stay safe - January 24, 2017 1266% jump in cyber fraud as criminals switch to new tactics to steal your cash - how to stay UK forensic partner Hitesh Patel said: "Both public and private organisations openly acknowledge that cyber-attacks are one of the most prevalent and high-impact risks they face, and yet many operate on the basis […]
  • SEC probing Yahoo over previously disclosed cyber breach - CNBC January 23, 2017
    CNBCSEC probing Yahoo over previously disclosed cyber breachCNBCSecurities industry rules require companies to disclose cyber breaches to investors. Although the SEC has long-standing guidance on when publicly traded companies should report hacking incidents, companies that have experienced known breaches often ...Regulators launch probe into Yahoo over cybe […]
  • As attacks grow, EU mulls banking stress tests for cyber risks - Reuters January 23, 2017
    ReutersAs attacks grow, EU mulls banking stress tests for cyber risksReutersBut complex cyber attacks have kept rising, as revealed in November by SWIFT in a letter to client banks and by the theft of 2.5 million pounds ($3 million) from Tesco Plc's banking arm in the first mass hacking of accounts at a Western lender. Banks ...Lloyds Said to Suffer Cyb […]
  • GSTN arming itself against potential cyber attacks - Economic Times January 24, 2017
    Economic TimesGSTN arming itself against potential cyber attacksEconomic TimesBENGALURU|NEW DELHI: In order to make the technology infrastructure of the country's largest tax reform completely fool proof against any cyber-attacks, the Goods and Services Tax Network (GSTN), the agency that is in charge of the technological ...and more »
  • Southeast Asia Begins to Prepare for Cyber War; India Turns to AI - Huffington Post January 24, 2017
    Huffington PostSoutheast Asia Begins to Prepare for Cyber War; India Turns to AIHuffington PostBy AsiaToday reporter Lee Mi-hyun - Voices urging to prepare for cyber warfare is growing in Southeast Asia, which has weak information security against cyber threats. India has turned its attention to artificial intelligence (AI) in preparation for ...and more »
  • Possible candidates for OFPP, cyber czar emerge - January 23, 2017
    FederalNewsRadio.comPossible candidates for OFPP, cyber czar“During my service as the U.S. chief information security officer, I have focused on execution of best practices to better manage our cyber risk posture. Frankly, we don't need more policies, we need to execute the ones we have and eliminate the ones ...
  • White House to End Defense Sequester, Boost Military's Cyber Capabilities - Washington Free Beacon January 23, 2017
    Washington Free BeaconWhite House to End Defense Sequester, Boost Military's Cyber CapabilitiesWashington Free BeaconDonald Trump's administration will end the defense sequester and direct U.S. military leaders to develop defensive and offensive cyber capabilities to bolster the armed forces. The military budget, missile defense, and cyber defense […]
  • Naval Academy uses hacking, cyber events to shape classes - January 23, 2017
    CapitalGazette.comNaval Academy uses hacking, cyber events to shape classesCapitalGazette.comThe major first became available to the Class of 2016, where 27 midshipmen graduated in May with degrees in cyber operations. This year, 46 seniors will graduate in the major. Tortora said the academy takes an "all, many and few approach" with the ...


RSS Cyber War News (Bing)

  • Saudi Arabia warns on cyber defense as Shamoon resurfaces January 23, 2017
    KHOBAR, Saudi Arabia Saudi Arabia on Monday warned organizations in the kingdom to be on the alert for the Shamoon virus, which cripples computers by wiping their disks, as the labor ministry said it had been attacked and a chemicals firm reported a ...
  • Labor accuses Malcolm Turnbull of putting politics ahead of cyber security January 23, 2017
    Prime minister says Labor, Nick Xenophon and Greens were all invited to a briefing, but they have no record of this and only found out through the media Labor has accused Malcolm Turnbull of putting his own political purposes ahead of national security by ...
  • Cyber experts to brief Australian political leaders (ZDNet) January 23, 2017
    Australian Prime Minister Malcolm Turnbull will be put through his paces by cyber defence experts on Tuesday, as he and his cybersecurity assistant Dan Tehan visit the Australian Signals Directorate to learn about the nation's offensive and defensive ...
  • Lloyds cyber-attack details emerge January 23, 2017
    Lloyds Bank was the target of a cyber-attack nearly two weeks ago which stopped a substantial number of customers using their online accounts. The breakdown in service from the group, including Halifax and Bank of Scotland, came after the websites were ...
  • India turns to AI as cyber warfare threats grow January 23, 2017
    "We use artificial intelligence (AI) to look for patterns in the past to predict future behaviour," says Tarun Wig as he explains why he hopes his company Innefu can do more business with India's government. "Cyber warfare isn't a movie, it's happening ...
  • Lloyds Said to Have Suffered Cyber Attack on Bank’s U.K. Systems January 23, 2017
    Lloyds Banking Group Plc was hit by a cyber attack that disrupted online services for customers two weeks ago, a person with knowledge of the matter said, amid mounting concern over the threat hackers pose to major banks. Exclusive insights on technology ...
  • Cyber attack forces Sundance box office to shut down January 23, 2017
    An exterior view of the Egyptian Theater at the 2017 Sundance Film Festival on January 20, 2017 in Park City, Utah. The Sundance Film Festival suffered its first cyber attack this weekend when its box office system was temporarily shut down. “Sundance ...
  • Effective ICS cyber defense methods January 23, 2017
    Cyber defense risks are on the top of concern for every manager operating manufacturing and critical infrastructure. The solutions for protecting the Confidentiality, Integrity and Availability (C-I-A) of IT systems are widely understood and accepted by ...
  • EU follows UK lead and considers plans to test bank defences against a cyber attack January 23, 2017
    The EU is contemplating plans to test banks' ability to repel cyber attacks in an initiative that would mirror measures already put in place by the Bank of England. Cyber and technological-enabled attacks have been on the Bank of England's radar since 2013 ...
  • Cyber Surveillance - Friend or Foe? January 23, 2017
    Following the revelation of the NSA's massive data collection efforts by Edward Snowden in 2013, the nation – and in fact, the world at large – engaged in discussions about the efficacy and morality behind warrantless government surveillance.


RSS Cyber Tag (Icerocket)

  • As attacks grow, EU mulls banking stress tests for cyber risks January 24, 2017
    Date: 23-01-2017 Source: Reuters The European Union is considering testing banks‘ defenses against cyber attacks, EU officials and sources said, as concerns grow about the industry’s vulnerability to hacking. Cyber attacks against banks have been growing in numbers and sophistication in recent years ...
  • (USA-TX-San Antonio) Information Systems Security Manager January 24, 2017
    Kforce is seeking an Information Systems Security Manager in San Antonio, TX.Summary:In this position, the ideal candidate will be managing a team of security personnel who safeguard the company's information assets. The position will work with information security leadership to develop strategies a ...
  • 【Cyber Shop 39】Twitterまとめ投稿 2017/01/24 January 24, 2017
    CyberShop39_69 『2017年01月23日【Cyber Shop 39】のつぶやき』 01/24 00:..
  • Bildt och andra hökar skriver brev till Trump January 24, 2017
    In English further down. Detta brev från främst tidigare framträdande politiker, som vädjar till president Trump om minst kallt krig mot Rysslan, har publicerats i Washington Post. Washington Post 10/1 Jag publicerar det översatt av mig, samt även den engelska grundversionen. Avslutande kommentar av ...
  • ■ヨネックス■CYBER STAR NANO V NEXTAGE TYPE Ti■7W■21■S■NANO HI-SPEED 500■中古■1円~ January 24, 2017
    ■ヨネックス■CYBER STAR NANO V NEXTAGE TYPE Ti■7W■21■S■NANO HI-SPEED 500■中古■1円~ >>楽天市場 ..
  • Satan Ransomware-as-a-Service makes it easy to dabble in cyber extortion January 24, 2017
    A new form of Ransomware-as-a-Service that allows users to customize their campaigns has been discovered on the dark web. Called Satan, as in the prince of darkness, the RaaS platform is able to create a customized ransomware payload that encrypts a victim’s files with RSA-2048 bit and AES-256 bit e ...
    Duncan Riley
  • 7 Major Foreign Policy Challenges Facing President Donald Trump January 24, 2017
    By JUSTIN FISHEL The 45th President of the United States, Donald J. Trump, has inherited a number of daunting foreign policy challenges spanning the globe from the Middle East through East Asia. Trump tweeted this morning that “THE WORK BEGINS!” yet many of his top foreign policy positions have yet ...
  • Norton Research: parents worry about online bullying January 24, 2017
    Norton by Symantec has released findings from the 2016 Norton Cyber Security Insights Report: Family Edition, which sheds light on New Zealand parents' perceptions of cyberbullying and the preventative measures they are putting in place to protect their children.
  • (USA-TX-Austin) Regional Sales Manager - SIS Western US January 24, 2017
    **Regional Sales Manager - SIS Western US** Location **US-Remote-West** Job ID **11482** Apply Now **Verint Situational Intelligence Solutions Overview:** Verint Situational Intelligence Solutions (SIS) is a leading provider of Enterprise VMS and Situational Awareness solutions for Mission Critical ...
  • Yahoo beats Wall Street view, sees Verizon deal closing in Q2 January 24, 2017
    The USD 4.8 billion Verizon transaction had originally been expected to close in the first quarter but was delayed by the disclosure of two major cyber breaches that exposed information from more than a billion Yahoo accounts.


RSS Cyberwar Tag (Wordpress)


The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment



In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]



Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]