A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

U.S. Army: Cyber Operations Budget Disclosed

It’s not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber security, in particular majority of states is pushing research and development activities on both defense and offense cyber capabilities.



Iran Actively Conducting Destructive Cyber Attacks



U.S. authorities believe that Iranian-based hackers were responsible for cyber attacks that devastated Persian Gulf oil and gas companies, a former U.S. government official said. Just hours later, Defense Secretary Leon Panetta said the cyber threat from Iran has grown, and he declared that the Pentagon is prepared to take action if American


Obeying the Golden Rule…NOT

Remember the Golden Rule? “Do unto others as you would have them do unto you.” It’s not normally regarded as a cardinal rule of foreign policy; in that realm, “an eye for an eye” seems closer to the norm. But lately I’ve been thinking that Americans ought to reflect a bit more on the long-term


NSA to Defend Defense Contractor Networks

The National Security Agency is working with Internet service providers to deploy a new generation of tools to scan e-mail and other digital traffic with the goal of thwarting cyberattacks against defense firms by foreign adversaries, senior defense and industry officials say.

The novel program, which began last month on a voluntary,


Hackers Targeting U.S. Infrastructure

Power Plant Control Room

Just hours before reports emerged that hackers were for the first time attempting to take over specific infrastructure plants, a former CIA director told ABC News that weaknesses in critical infrastructure systems in the U.S. were among the country’s greatest threats to national security.

“One of [the


NATO Warns Cyber Attackers of Retaliation

NATO is considering the use of military force against enemies who launch cyber attacks on its member states.

The move follows a series of Russian-linked hacking against Nato members and warnings from intelligence services of the growing threat from China.

A team of Nato experts led by Madeleine Albright, the former US secretary


Biggest Threat to an Open Internet: U.S. Intelligence Community

The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence.


McConnell’s not dangerous because he knows anything about SQL injection hacks, but because he knows about social engineering. He’s the nice-seeming guy who’s willing and able


Massive Cyber Attacks Uncovered

More than 75,000 computer systems at nearly 2,500 companies in the United States and around the world have been hacked in what appears to be one of the largest and most sophisticated attacks by cyber criminals discovered to date, according to a northern Virginia security firm.

The attack, which began in late 2008


Obama Describes Cyber Security Plan

President Obama declared Friday that the country’s disparate efforts to “deter, prevent, detect and defend” against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of “private-sector networks” and the Internet traffic that has become the backbone of American


U.S. Feds Warn of Cyber Security Meltdown

Computer attacks pose the biggest risk “from a national security perspective, other than a weapon of mass destruction or a bomb in one of our major cities,” said Shawn Henry, assistant director of the FBI’s cyber division told the International Conference on Cyber Security in New York . According to multiple reports Henry


China Pissed Over U.S. Congressional Report

China had a less than happy reaction to a US congressional report that accused Beijing of developing sophisticated cyber warfare and militarising its space program. The annual China report to Congress of the US-China Economic and Security Review Commission was aimed at misleading the public and impeding bilateral cooperation, foreign ministry spokesman Qin


Cyber warfare needs Rules of Engagement

Click to Enlarge

The rapid advancement of cyber attacks and the emergence of cyber warfare have caught government and military leaders around the world off guard. Decision making in time requiring defensive measures or military crisis is guided by doctrine and rules of engagement, but in the case of cyber attacks and


Military wants Internet patrol

internet patrol

You would have figured that the NSA and its far reaching Echelon System would have already been covering these bases, not to mention the Air Force and It’s new cyberwarfre and information awareness branch.

In a solicitation posted on the Web last week, the U.S. Army’s Fifth Signal Command in Mannheim,


Air Force Seeks Complete Computer Control

The Air Force wants a suite of hacker tools, to give it “access” to — and “full control” of — any kind of computer there is. And once the info warriors are in, the Air Force wants them to keep tabs on their “adversaries’ information infrastructure completely undetected.” The government is growing increasingly interested in


Information Warfare Push

The Pentagon is to spend $30 Billion building a super secret “National Cyber Range” in order to prepare for all out cyber warfare by using it to conduct mock online battles with realistic info-warriors.

The Defense Advanced Research Projects Agency (DARPA), previously responsible for the development of electronic surveillance programs such as More…

sharethis_button(); }?>