A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

I’ll see your cyberwar and raise you a nuclear response

Richard A. Clarke, the chairman of Good Harbor Security Risk Management, was special adviser to the president for cybersecurity in the George W. Bush administration. Steve Andreasen, a consultant to the Nuclear Threat Initiative, was the National Security Council’s staff director for defense policy and arms control from 1993 to 2001.

“We will


China Denies Latest U.S. Cyber Attacks


China has denied fresh US claims it is sponsoring cyber-attacks and said the countries should cooperate against the global threat of computer crime.

The accusations in the latest Pentagon report on the Chinese military are “irresponsible and harmful to the mutual trust between the sides, Senior Col. Wang Xinjun, a People’s Liberation Army researcher,


Anonymous Claims Cyber Attacks on Israel

Hacktivist group Anonymous has launched a second massive cyber attack against Israel, dubbed #OpIsrael. Israel declared there haven’t been any major disruptions so far.

Anonymous threatened to “disrupt and erase Israel from cyberspace” in protest over its mistreatment of Palestinians.

Dozens of Israeli websites were unavailable as of early Sunday, with one of the


Cyberattack on South Korea traced to U.S. and Europe

Some of the malicious software that paralyzed computer networks at major South Korean banks and TV broadcasters last week originated in the United States and three European countries, authorities in Seoul said Monday.

“We traced some IP [Internet protocol] addresses found on [affected] computer networks to overseas sources like the U.S. and a few European


N. Korea Suspected in Cyberattack Against S. Korea


SEOUL, SOUTH KOREA Investigators have traced a coordinated cyberattack that paralyzed tens of thousands of computers at six South Korean banks and media companies to a Chinese Internet Protocol address, authorities in Seoul said Thursday.

IP addresses, which are unique to each computer connected to the Internet, can easily be manipulated by hackers operating


Anonymous Planning Cyber Attack on Israel

Hacktivist group Anonymous, along with numerous other hackers, is planning a massive cyber-attack on Israel, threatening to “erase” the country from Internet. Israel is apparently taking the threats seriously, with defensive preparations underway.

“Hacktivists Starting Cyber Attack against Israel on 7th of April,” Anonymous wrote on Twitter, calling on hackers around the world


U.S. Prepared to Retaliate for Chinese Hacking

As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.

According to officials familiar with the plans, the White House


Anonymous Declares Cyberwar on Israel, Posts Personal Info Online

Internet hacktivist group Anonymous has declared cyberwar on Israel, posting personal data of five thousand Israeli officials online.

­The group used their site to address a message to the Israeli government before linking to the page with names, ID numbers and personal emails of 5,000 officials.

The message said: “It has come to our


Israel Targeted with Mass Cyber Attacks Over Gaza


JERUSALEM: Israel admitted Sunday it has been targeted in a mass cyber-warfare campaign that has witnessed millions of attempts to hack state websites since the start of its Gaza offensive four days ago.

Finance Minister Yuval Steinitz told reporters the government had been forced to wage war on “a second front” — of cyber


Army Prepares Offensive Cyber Attacks


Senior Army officials said Tuesday that it is working to develop the service’s offensive cyber warfare capabilities to go along with its cyber security capabilities to allow soldier to launch as well as detect and defeat threats.

Military service leaders have spoken in detail about their ability to protect their networks. They have repeatedly


Iran Actively Conducting Destructive Cyber Attacks



U.S. authorities believe that Iranian-based hackers were responsible for cyber attacks that devastated Persian Gulf oil and gas companies, a former U.S. government official said. Just hours later, Defense Secretary Leon Panetta said the cyber threat from Iran has grown, and he declared that the Pentagon is prepared to take action if American


FBI Warning: Cyber Threat Bigger than Ever

Despite the increased frequency and severity of online crime and espionage in 2011, many American corporations and consumers are still not taking the threat seriously, the FBI’s top cyber official said Thursday.

The risk posed by criminal hackers is “existential, meaning it could eliminate whole companies,” said Shawn Henry, the FBI’s executive assistant


DoD: Cyber 3.0 Cybercommandos


“Cyber 3.0” is the name of the new strategy described by U.S. Deputy Defense Secretary William Lynn at the RSA security conference Tuesday. It’s a five-part plan that will involve equipping military networks with active defenses, ensuring civilian networks are adequately protected, and marshaling the nation’s technological and human resources to maintain its


TSA Data Analyst Planned Cyber Attack

A former Transportation Security Administration contractor is being charged in Colorado for allegedly injecting malicious code into a government network used for screening airport security workers and others.

The malicious code, a logic bomb installed last October, was designed to cause damage and disrupt data on servers on an undisclosed date but was caught by


Cyber Attack on U.S., S. Korean Governments

Cyber attacks that have crippled the Web sites of several major American and South Korean government agencies since the July 4th holiday weekend appear to have been launched by a hostile group or government, South Korea’s main government spy agency said on Wednesday.

Although the National Intelligence Service did not identify whom they believed


Obama Describes Cyber Security Plan

President Obama declared Friday that the country’s disparate efforts to “deter, prevent, detect and defend” against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of “private-sector networks” and the Internet traffic that has become the backbone of American


NSA DHS to Cooperate on Cyber Security

National Security Agency (NSA) head Lt. Gen. Keith Alexander announced during his speech at the RSA Conference 2009 that the NSA cannot take on the job of enforcing cyber security alone for the federal government networks. In fact, he wishes to cooperate with the United States Department of Homeland Security (DHS) in the development and


China’s GhostNet

Researchers in Toronto have released a document that describes what may be the first real evidence of a government-operated cyber-espionage network in action. In a ten-month investigation, the team documented the operation of what they dubbed GhostNet, and its various worldwide infection.

The existence and operation of massive, coordinated, government-affiliated online espionage networks


Congress Warns of China’s Cyber Pursuits

China has developed a sophisticated cyber warfare program and stepped up its capacity to penetrate US computer networks to extract sensitive information, a US congressional panel warned on Thursday.”China has an active cyber espionage program,” the US-China Economic and Security Review Commission said in its annual report to the US Congress. “China is targeting


Cyber warfare needs Rules of Engagement

Click to Enlarge

The rapid advancement of cyber attacks and the emergence of cyber warfare have caught government and military leaders around the world off guard. Decision making in time requiring defensive measures or military crisis is guided by doctrine and rules of engagement, but in the case of cyber attacks and


sharethis_button(); }?>