Chinese Cyber Cod...
Follow
Find
46.2K views | +1 today
Chinese Cyber Code Conflict
Chinese Cyber Code Conflict
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

The Active Defense Folly: Exploring The Cyberwar Doctrine Debate | SecurityWeek.Com

The Active Defense Folly: Exploring The Cyberwar Doctrine Debate | SecurityWeek.Com | Chinese Cyber Code Conflict | Scoop.it
The US Government adapting a Cyberwar Doctrine to provide guidance and instruction on dealing with cyber threats and cyber operations does not rule out or prevent the creation of an international agreement or treaty.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Mystery Man at Memorial Events (Updated)

Mystery Man at Memorial Events (Updated) | Chinese Cyber Code Conflict | Scoop.it
UPDATE:  Yonhap, citing an unnamed South Korean [ROK] government source,  reported on 18 December (Tuesday) that the mystery man at the memorial events is most likely Choe Chun Sik, who serves as D...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

“It was Just a Virus” – Full Data Breaches through Malicious Attachments

“It was Just a Virus” – Full Data Breaches through Malicious Attachments | Chinese Cyber Code Conflict | Scoop.it
If a malware file is allowed to execute, and it collects all of the personal files off of a system and sends them to a remote hacker, was your company hacked or did you “just have a virus?&#8...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Dexter malware's source still unknown, connection to Zeus disputed

Dexter malware's source still unknown, connection to Zeus disputed | Chinese Cyber Code Conflict | Scoop.it
Point-of-sale malware may have compromised 'tens of thousands' of credit cards
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Army Cyber Command Working Cyber Attacks into Standard Attack Options

Army Cyber Command Working Cyber Attacks into Standard Attack Options | Chinese Cyber Code Conflict | Scoop.it
The US Army Cyber Command (ARCYBER) is working on the doctrine to include cyber attacks as a standard attack option in times of conflict. According to Colonel Thomas Goss, chief of the command’s St...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

SANS NetWars tests cybersecurity pros against peers

SANS NetWars tests cybersecurity pros against peers | Chinese Cyber Code Conflict | Scoop.it
Organizers played "Eye of the Tiger" and "We are the Champions" over the loudspeakers as participants in the SANS Institute's NetWars Tournament of Champions sat down at their laptops and prepared for action.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Information Warfare: Cyber War Tools For The Infantry

Information Warfare: Cyber War Tools For The Infantry | Chinese Cyber Code Conflict | Scoop.it
December 18, 2012: The US Department of Defense is asking American firms for help in developing better tools for quickly analyzing captured electronic data (cell phones, storage devices, and specialized military electronics) This is nothing new...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Are Instagram users dumb f*cks too? » CounterMeasures

Are Instagram users dumb f*cks too? » CounterMeasures | Chinese Cyber Code Conflict | Scoop.it
Rik Ferguson, Director of Security Research & Communication at Trend Micro, blogs about current security issues.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Echelon Spy Network Secrets To Be Revealed in Megaupload Copyright Case - Hit & Run : Reason.com

Echelon Spy Network Secrets To Be Revealed in Megaupload Copyright Case - Hit & Run : Reason.com | Chinese Cyber Code Conflict | Scoop.it
There was a lot of buzz a decade or so ago about Echelon, an international electronic surveillance network said to link the United States, Canada, Britain,
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Anonymous continues its hack offensive against Westboro Baptist Church

Anonymous continues its hack offensive against Westboro Baptist Church | Chinese Cyber Code Conflict | Scoop.it
Anonymous's wrath may have extended to DDoS attacks and obtaining WBC SSNs.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

World Internet Users Statistics Usage and World Population Stats

Internet World Stats, Population and Internet Users in all countries and usage in all regions of the world. The Internet Big Picture.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

How USAF Blew $1B on Logistics System

How USAF Blew $1B on Logistics System | Chinese Cyber Code Conflict | Scoop.it
The Air Force’s controller, Jamie Morin, admitted publicly in April that the service spent seven years and $1 billion on a logistics management system that had “negligible” capability.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

DOJ Plans To Indict State-Sponsored Cyber Attackers

DOJ Plans To Indict State-Sponsored Cyber Attackers | Chinese Cyber Code Conflict | Scoop.it
In an intriguing push against the ever-increasing number of foreign-governments sponsored cyber attacks against U.S. companies, the U.S.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Korean Cyber espionage attack Targets Russia

Korean Cyber espionage attack Targets Russia | Chinese Cyber Code Conflict | Scoop.it
Korean Cyber espionage attack Targets Russia
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

2012 infosec review: Focus on crime, not cyberwar | ZDNet

2012 infosec review: Focus on crime, not cyberwar | ZDNet | Chinese Cyber Code Conflict | Scoop.it
Cyberwar is overhyped. The clear and present danger is the increase in criminal activity. And while mobile devices are vulnerable, they may also represent our chance to get information security right.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

SMS Botnet 'SpamSoldier' Lures Victims With Fake Games

SMS Botnet 'SpamSoldier' Lures Victims With Fake Games | Chinese Cyber Code Conflict | Scoop.it
As botnets go, the Android SMS botnet was "an unsophisticated attack," Andrew Conway, a security researcher with Cloudmark, wrote on the company blog Dec. 16.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Infosecurity - Chapro – new Apache malware ultimately delivering Zbot

A newly discovered malicious Apache module injects an iFrame into webpages it serves, sending visitors to a separate server hosting a Sweet Orange exploit pack that currently attempts to deliver Zbot.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

North Korea’s Nuclear Theater | 38 North: Informed Analysis of North Korea

North Korea’s Nuclear Theater | 38 North: Informed Analysis of North Korea | Chinese Cyber Code Conflict | Scoop.it
John Feffer discusses how missile and nuclear tests help the regime in Pyongyang achieve domestic and foreign policy goals.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Interview with a fearless cyber crime journalist

Interview with a fearless cyber crime journalist | Chinese Cyber Code Conflict | Scoop.it
Brian Krebs has single-handedly broken open cyber crime cases, leading to perps' arrest and conviction. Here's his story
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

ITU-IMPACT establishes first Cybersecurity Innovation Centre for Arab region

more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

ARCYBER On The Attack On Paper, In Training

ARCYBER On The Attack On Paper, In Training | Chinese Cyber Code Conflict | Scoop.it
One day an Army brigade may call for a cyber attack as it does for a precision-guided bomb, according to an official with Army Cyber Command.
more...
No comment yet.