Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

China Labels U.S. as Worlds Biggest Cyber Villain

China’s official news agency has slammed the United States as the world’s “biggest villain” following new revelations about Washington’s cyber espionage against Chinese companies and institutions.

“These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber

More…

Seoul Claims North Developed Huge Cyber Army

South Korean defense minister Kim Kwan-jin reckons Pyongyang has 3,000 highly trained hackers tasked with stealing military secrets and disrupting systems.

N.Korean Rally Goers Raise Fists in Condemnation

In a warning clearly designed to set the alarm bells ringing in Seoul, Kim said that Seoul’s near neighbour to the north poses a clear threat

More…

U.S. and Russia’s Cyber Hotline

As leaked details of ongoing network surveillance and espionage programs by the National Security Agency (NSA) continue to stir up international concern about how deep US intelligence is reaching into IT operations worldwide, Russia and the US have taken steps to cooperate on cybersecurity—or at least prevent an accidental cyberwar.

During talks at the

More…

U.S. Government May be Worlds Most Prolific Hacker

cyber-attack

The United States government is investing tens of millions of dollars each year on offensive hacking operations in order to exploit vulnerabilities in the computers of its adversaries, Reuters reports.

air force cyber command

 

According to an in-depth article published Friday by journalist Joseph Menn, the US and its Department of Defense contractors

More…

U.S. Army: Cyber Operations Budget Disclosed

It’s not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber security, in particular majority of states is pushing research and development activities on both defense and offense cyber capabilities.

air-force-cyber-command

More…

Confirmed: North Responsible for South Korean Cyber Attack

CYBERATTACK

North Korea was responsible for a Cyberattack that shut down tens of thousands of computers and servers at South Korean broadcasters and banks last month, officials in Seoul said Wednesday, noting that an initial investigation pointed to a military-run spy agency as the culprit.

A South Korean police officer of the National Police Agency

More…

U.S. to Increase Web and Email Monitoring

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and

More…

NATO Report: Killing Hackers OK

hacking book cover

A landmark document created at the request of NATO has proposed a set of rules for how international cyberwarfare should be conducted. Written by 20 experts in conjunction with the International Committee of the Red Cross and the US Cyber Command, theTallinn Manual on the International Law Applicable to Cyber Warfare analyzes the

More…

Iran Actively Conducting Destructive Cyber Attacks

air-force-cyber-command

air-force-cyber-command

U.S. authorities believe that Iranian-based hackers were responsible for cyber attacks that devastated Persian Gulf oil and gas companies, a former U.S. government official said. Just hours later, Defense Secretary Leon Panetta said the cyber threat from Iran has grown, and he declared that the Pentagon is prepared to take action if American

More…

Warnings of a Cyber Apocalypse

After his lab discovered Flame, “the most sophisticated cyber weapon yet unleashed,” Eugene Kaspersky believes that the evolving threat of “cyber terrorism” could spell the end of life on Earth as we know it.

­Doomsday scenarios are a common occurrence in 2012, but coming from a steely-eyed realist like Eugene Kaspersky, his calls for a

More…

Obeying the Golden Rule…NOT

Remember the Golden Rule? “Do unto others as you would have them do unto you.” It’s not normally regarded as a cardinal rule of foreign policy; in that realm, “an eye for an eye” seems closer to the norm. But lately I’ve been thinking that Americans ought to reflect a bit more on the long-term

More…

New Joint Cyber Divison run by Northcom, NORAD

A new cyber division, jointly managed by the North American Aerospace Defense Command (NORAD) and U.S. Northern Command’s (Northcom) Operations Division, is up and running after approval by Defense Secretary Leon Panetta earlier this month.

The U.S. Northern Command Joint Cyber Center (JCC) has three main missions: improving cyber domain situational awareness, improving the

More…

Proposal for U.S. Internet I.D.

President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today.

It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet, White House Cybersecurity Coordinator

More…

British Airways Employee Charged in Terror Plot

A British Airways computer expert who allegedly offered to cover for cabin crew in the event of a strike appeared in court today charged with plotting suicide bombings.

Rajib Karim, who was born in Bangladesh but now lives in Newcastle upon Tyne, faced three charges under counter-terrorism legislation.

The 30-year-old is accused of planning his

More…

Obama Describes Cyber Security Plan

President Obama declared Friday that the country’s disparate efforts to “deter, prevent, detect and defend” against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of “private-sector networks” and the Internet traffic that has become the backbone of American

More…

sharethis_button(); }?>