India is keeping a wary eye on China's rapid global ascent. Unresolved border issues that resulted in the Sino-Indian War of 1962 have been heating up again in recent years.
23 July 2011
The #China Challenge: A strategic vision for #US-India relations
HED:Report: Iran resorting to rip and replace to kill off Stuxnet infections
Link: http://bit.ly/qAXtc6
#Iran resorting to rip and replace to kill off #Stuxnet infections
Reports that Iran had recovered from the infection of the Stuxnet worm may have been overblown, as a new report suggests the country is being forced to replace thousands of expensive centrifuges damaged by the worm.
The "Internet in a Suitcase"
#Spies Connected to #China Said to Have Carried Out #Hacking of #IMF Computers
Link: http://bit.ly/ntWnTx
Phone #hacking: how #NoW scandal has changed UK's image in the world
Link: http://bit.ly/onWvtl
Let's stop the billions lost to #hackers & #cyber thieves
July 23, 2011, 10:43 a.m.
#Norway attacks: Details emerge in #Oslo bombing, camp shooting
July 23, 2011, 10:43 a.m.
Leon Panetta: Next "Pearl Harbor" could come from #cyberattack
Link: http://bit.ly/qAOygM
A #hacking crime wave in #cyberspace
Link: http://bit.ly/q9VW3x
Dasient to Release New Research on Emerging Mobile #Hacker Threats in Android Apps
Link: http://bit.ly/r22cf7
#Apple Laptops Vulnerable To #Hack That Kills Or Corrupts Batteries
Link: http://bit.ly/q7wtPj
#BlackHat 2011: Researchers demonstrate #Android hack
Link: http://bit.ly/phIEbj
22 July 2011
#Whitehat Targets #Chrome OS at #BlackHat
Link: http://bit.ly/q2ASJh
#Cyberwar Strategy: Will Dual-Hatted #NSA Plug Holes in Leaky #Pentagon?
The DoD cyberspace strategy calls for five strategic initiatives to sustain "good cyber hygiene," but also maintains a destructive cyberattack could be considered an "act of war." While it also further empowers the NSA, will even the super spy agency be able to plug all the holes in DoD?
Link: http://bit.ly/mUFUtT#Sony Sued by #ZurichAmerican Insurance Over #PlayStation #Hacking Coverage
Link: http://bit.ly/qmgtzW
#German national #cybersecurity centre attacked by #hackers
Just a few weeks after German authorities opened a national Cyber Defense Centre in Bonn, it was attacked by hackers and now officials are struggling to arrest all of those involved.
Link: http://bit.ly/qUQOSmEmbedded Web Servers Exposing Organizations To #Cyberattack
Link: http://bit.ly/ne4yaa
New #cybersecurity risk management application for industrial control systems
Link: http://bit.ly/o3lfjp
Notorious #LulzSec #Hacker 'Tflow' Released on Bail
Link: http://bit.ly/nNrG49
Corporate Security Chiefs Focus on ‘Human’ Side of #Cybercrime
It's no surprise that corporate IT leaders are focused on preventing data loss, especially given the recent attacks on Sony, Epsilon, Citigroup and Lockheed Martin. What is surprising, however, is where IT security chiefs see the biggest danger.
In a survey hosted by the Tuck School of Business at Dartmouth, almost 80% of participating chief information security officers said they were more worried about human, rather than technological, holes in their IT infrastructure.
--
Be sure to check out the latest issue of the CYBERWAR NEWS MORNING REPORT for daily updates on cyberwarfare, information security and hacker news.
The technical capabilities of cyberspace have grown so rapidly that they have quickly overwhelmed countries' ability to defend their networks—and in our case, the Defense Dept.'s ability to defend its networks—as the tools for communicating in a digital realm have just exploded. And what you see today are countries, individuals, and groups exploring the ability to do reconnaissance on the networks. What that really represents is the initial stages. That's where we are. We have to first ensure our defense and be prepared to do this quickly.
Be sure to check out the latest issue of the CYBERWAR NEWS MORNING REPORT for daily updates on cyberwarfare, information security and hacker news.
CyberWarNews Morning Report is out!
Euro Hawk #UAV lands in Germany after 22hour flight
Tactical NAV Smartphone App Directs #UAV – Thwarts #Taliban Attack
On June 28, a private contractor located near Kabul came under insurgent fire while located in an area where he and his American contractors were working. The contractor immediately called the International Security Assistance Force (ISAF) tactical operations center (TOC) for military support, and ISAF personnel then quickly responded by requesting the military grid reference system (MGRS) grid coordinates to the insurgent threat.
However, the contractor was not equipped with a military GPS device or a 1:50,000-scale map to give the proper MGRS coordinates to the TOC. Instead, the contractor used Tactical NAV on his iPhone, and was able to quickly and accurately provide the assisting military personnel with his location, and also the location where the insurgent fire was coming from. As a result, an unmanned aerial vehicle (UAV) was dispatched to survey the perimeter of the base, and the insurgent attack was thwarted.
Right to privacy puts eyes on #infosec
Link: http://bit.ly/oQmoOU
US has strong interest in helping India prevent terror
On cyber security, he said, US has been taking all possible measures to prevent cyber attacks and has been cooperating with India over the issue.
Link: http://bit.ly/nuPDDm
#China-Based Spies Said to Be Behind #Hacking of #IMF Computers
Link: http://bit.ly/ntWnTx
Color-coding #China's #hackers
Link: http://bit.ly/ptscxQ
Dutch give details on 4 #Anonymous #hacker arrests
Link: http://bit.ly/o235ZA
#Anonymous says #NATO is victim of #hacking
The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.
Link: http://bit.ly/oMjCch#Cyberwar Threat Will Force Pentagon to Buy Computers Faster and Change Culture
There is no doubt that the Pentagon is gearing up for a cyber war and they're planning to purchase new computers with the speed and efficiency that would make Google proud.
Link: http://bit.ly/nQAnsi21 July 2011
Watch out for the Chinese e-bomb!
U.S. defense secrets stolen in #cyberattacks
U.S. Deputy Defense Secretary William Lynn says hackers have infiltrated defense industry computers and stolen 24,000 files, adding that this is not the first time. (July 14) (CBS News)
Link: http://bit.ly/oBtmfe#Cyberattacks: #Hackers Take Aim at Small Businesses
Link: http://bit.ly/pRBIdg
Phone #hackers allegedly hit #Taliban
The group declared Wednesday that text messages announcing Omar's death from heart failure were fake, and said the phone logs of its main spokesmen, together with the Taliban website, had apparently been tampered with.
US #Cyberwar Plan Has New Focus on Deterrence
The military must move from defending against major cyberattacks to deterring assaults by letting enemies know the U.S. is willing to retaliate with its own virtual weapons or military force, a top general said Thursday.
Congress demands #cyberdefense details while #DOD aims for ambiguity
The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.
#NATO Web site #hacked by# Anonymous
The group calling itself Anonymous on Thursday claimed credit for hacking into NATO servers and stealing 1 gigabyte of sensitive information as part of its campaign to harass and humiliate prominent targets.
What are power companies doing to protect their #networks from #cyberattacks?
#Russia opts for universal anti #cybercrime convention
Seoul to build traffic control tower resistant to #cyberattacks
Nation's #cyberwar against intruders goes local
Kratos Receives $15 Million Award to Continue Critical Support
#Hacket stole #Toshiba customers' emails & passwords
#India Signs Agreement With US To Improve #CyberSecurity
Amid widespread headlines about cyber warfare andhacking around the world, the U.S. and India have signed an agreement yesterday to allow both nations to coordinate and collaborate on cyber security issues.
#China Number One in Internet Use and #Hacking
FBI casts broad net in #Anonymous crackdown
Are the authorities quashing protest rights or defeating cyber criminals? Perhaps a bit of both
Arrests Could Show #Anonymous Might Not Be Exactly That
War in Afghanistan enters #cyberspace asTech-savvy Taliban phones #hacked
KABUL: The war in Afghanistan entered cyberspace on Wednesday when the tech-savvy Taliban said their phones, email and website had been hacked to spread a false report that the movement's spiritual leader, Mullah Omar, was dead.
20 July 2011
Rumor About NSA-Google Alliance to Stay Just That
Malicious firmware designed into PC components may be next front in #cyberwar
DHS acknowledges potential for malicious firmware in IT components built overseas
Latest issue of CyberWarNews Morning Report is out!
Google: Your Computer Appears to Be Infected
Tech Weekly: Patents, a stealth internet, Bigpoint on social gaming
16 arrested for Anonymous-branded cyber attacks
Link: CyberWarNews Morning Report
FOX NEWS: 16 Suspected #Anonymous #Hackers Arrested in Nationwide Sweep
Read more: http://www.foxnews.com/scitech/2011/07/19/exclusive-fbi-search-warrants-nationwide-hunt-anonymous/#ixzz1SevsLMM4
Video: #Cybersecurity: Assessing the Nation's Ability to Address the Growing #CyberThreat
--
---
San Antonio is ready to become a #cyberdefense city
"President (Barack) Obama has made defending our nation's communication and information networks and networks all over the world one of its top priorities," Mayor Julián Castro said at the third annual Cyber Security Caucus Summit. "San Antonio ... will be ready to rise to the challenge."
Not only does the city have two nationally accredited cybersecurity programs, the University of Texas at San Antonio and Our Lady of the Lake University, it's home to the National Security Agency's cryptology center, the 24th Air Force at Lackland AFB, and a host of private defense contracting firms involved in cybersecurity.
--
---
Spear Phishing Leaves a Bloody Wound
Once criminal hackers get a person's username and email address, they can begin to launch a targeted spear phish scam.
Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with "account update" or other ruses.
--
---
Can Bitcoin survive after #hack?
--
---
Computers Are Weapons of War
Estonia's government computer networks, blocked them from
functioning, and brought the Estonian government to a
standstill...
--
---
Deputy Defense Secretary William J. Lynn says #cyberthreat grows more destructive
"Most of what we see today is exploitation -- that's theft, stealing secrets, either commercial or military," Lynn told Ray Suarez on "PBS Newshour." "(But) we know the tools exist to destroy things, to destroy physical property, to destroy networks, to destroy data, maybe even take human lives."
Senators: US needs to define acts of #cyberwar
U.S. officials have yet to define what cyber-attacks against American networks amount to acts of war, according to several top senators and a Pentagon nominee.
"We've got to figure that out pretty quick," Senate Armed Services Committee Chairman Carl Levin (D-Mich.) said Tuesday.
--
---
19 July 2011
These Fake Chinese Microchips Were Made To Disarm U.S. Missiles
Last year, the U.S. Navy bought 59,000 microchips for use in everything from missiles to transponders that turned out to be counterfeits from China.
Wired reports the chips weren't only low-quality fakes, they had been made with a "back-door" and could have been remotely shut down at any time.
--
---
Latest issue of CyberWarNews Morning Report is available!
Marine General Calls for Stronger Offense in U.S. Cyber-Security Strategy
Skype vulnerability issue will be fixed this week
Anonymous Hacks Murdoch's Sun Web Site
Get latest issue here: http://paper.li/CyberWar_News/1309523449---
Fwd: In #cyberwar circles, "advanced persistent threat" is euphemism for Chinese state-sponsored #hacking
A very detailed and informative article on current cyberwar issues:
--
---
--
---
In #cyberwar circles, "advanced persistent threat" is euphamism for Chinese state-sponsored #hacking
A very detailed and informative article on current cyberwar issues:
--
---
Reddit Co-Founder Charged With Data Theft #cybercrime
--
---
Murdoch's Sun newspaper hit by #hackers
--
---
Celebs used to lure people in #cyberscams
--
---
FBI Executes Search Warrants in New York, Calif. in Hunt for 'Anonymous' #Hackers
Read more: http://www.foxnews.com/scitech/2011/07/19/exclusive-fbi-search-warrants-nationwide-hunt-anonymous/#ixzz1SZEfUKM7
--
---
EU mulling plans for new rules on data breach notifications
With news about data leaks surfacing on a regular basis, the European Union is considering a set of 'practical rules' governing how they should be handled. Experts say transparency is necessary when leaks happen.
--
---
Anticipating the Pearl Harbor #cyberwar of the digital age
--
---
United States and India Sign #Cybersecurity Agreement
--
---
18 July 2011
#Hackers Targeting Critical Infrastructure
IT security — a non-issue many years ago — is nowadays a major concern and should be part of the business strategy of every critical infrastructure facility. With the increasing networking of all kinds of SCADA systems over the Internet and/or public networks, any device with an IP address is globally accessible.
New Alliance #ICSPA To Fight #CyberCrime Globally
Check out the latest issue of #CyberWar News Morning Report
Widespread site compromise leading to Zeus
First look inside the military's cyber war room
Latest Microsoft Security Intelligence Report (SIR v.10) is available for review
available. Investigation of the current threat landscape.
It analyzes exploits, vulnerabilities, and malware based on data from
over 600 million systems worldwide, as well as internet services, and
three Microsoft Security Centers.
Cyber Criminals Switch to Alternative Second-Level Domains After Google Ban
migrating to alternative bulk domain providers, making it harder for
both Google and the rest of the world to block the malicious sites en
masse.
#Anonymous, #DOD Strategy, Microsoft Patch Tuesday Lead Week's Security News
Link: http://bit.ly/qc160q
The false cries and fog of #cyberwar
#Hacker creates hand mounted #laser weapon
book fantasy: a hand-mounted laser that burns hot and bright enough to
blind a human or set flesh on fire.
http://www.rawstory.com/rawreplay/2011/07/hand-mounted-laser-could-be-used-as-weapon/
Predicting the Great #CyberWar
tried to envision it in a piece for Wired Magazine, The Great Cyberwar
of 2002, in which a loose coalition of rogue states, terrorist groups
and drug cartels team up to prod the United States into a war with
China and Russia by knocking out power grids, blowing up chemical
plants and causing airliners to collide in midair.
http://allthingsd.com/20110716/cyberwar-its-not-fiction-anymore/?mod=tweet
#China military deploys first communications #UAV during naval exercise
as a node for a Chinese military communications network, relaying
"large numbers of information packets" among Chinese forces. When an
'enemy' aircraft approached, the ground control station initiated a
"counter-surveillance deployment plan", and by reducing its altitude
and initiating radio silence the Silver Eagle evaded detection..
#Anonymous Working On #AnonPlus: A Facebook For #Hackers, Non-Hackers Alike
2011: The Year of the #Hacker and #Malware
Predictions that 2011 would be the year of malware and cybercrime have certainly panned out, with the website of Australia's SBS TV network the latest to suffer hacker infiltration.