Cyberwarfare & Security
45 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Nathan Fisher from Network Security
Scoop.it!

Hacking attacks doubled since 2011 - Views and News from Norway

Hacking attacks doubled since 2011. March 18, 2014. Norway's defense industry, technology firms and state agencies were all the regular targets of computer spying attacks last year, according to the state national security authority.

Via Joel Field
Nathan Fisher's insight:

The Norwegian National Security Authority has revealed that the number of cyber attacks have doubled since 2011. They explain that they are constantly under attack and at an increasing rate.

 

As outlined in other scoops, the amount of cyber threats has surged over the past decade and it is not slowing down. Governments are establishing new agencies to specially combat this increasing threat.

 

 

more...
Joel Field's comment, March 24, 2014 12:03 AM
Shows that hacking is becoming more and more a tool for people who simply want change or want to prove a point rather then steal money. These people are probably harder to fend off since their target or method isn't as predictable.
Joel Field's curator insight, March 25, 2014 11:19 PM

This article reporting on cyber attacks in Norway brings up a interesting point. At what point will governments take military initiative to attacks from other countries? In another article on my Scoop page it was mentioned that Barack Obama initiated a cyber attack on a terrorist group and that terrorist group was highly angered by that. The kinds of attacks from terrorist groups is largely information extraction and DDos attacks at this point. The concerning thing is that these terrorist groups have no problem attacking huge corporations and governments so it is safe to assume they will continue to do so with stronger weapons as technology advances.

Rescooped by Nathan Fisher from Cybersecurity & Cybercrime
Scoop.it!

UK National Cyber Crime Unit becomes operational - TechTarget

UK National Cyber Crime Unit becomes operational - TechTarget | Cyberwarfare & Security | Scoop.it
V3.co.uk
UK National Cyber Crime Unit becomes operational
TechTarget
The new National Cyber Crime Unit (NCCU) has become operational as part of the UK's new National Crime Agency (NCA) aimed at fighting serious and organised crime.

Via Tracy Hackshaw
Nathan Fisher's insight:

The United Kingdom's launch of the new division named 'National Cyber Crime Unit' under their current NCA (National Crime Agency) conveys on notion of the increase cyber security threat.The NCCU collaborates members of the e-Crime unit of the police and the cyber devision of Soca (Serious Organised Crime Agency).


The ever increasing amount of cyber crime around the world has forced countries to create specialised divisions in their anti-crime agencies to defend themselves and others. 

more...
No comment yet.
Scooped by Nathan Fisher
Scoop.it!

Stanford University on Stuxnet and Cyberwarfare

The Stuxnet computer worm is perhaps the most complicated piece of malicious software ever built; roughly 50 times the size of the typical computer virus. It...
Nathan Fisher's insight:

A video from Stanford University analyses the Stuxnet virus' methods of attacking the Iranian nuclear enrichment facility.

 

The Stuxnet virus is a worrying issue that many computer and engineering professionals worry about. The virus has the ability to destroy hardware of very important machinery without being detected.

 

This huge cyber threat has created a blowout to cyber security and shows the potential threat of future computers viruses.

more...
Joel Field's curator insight, March 26, 2014 7:57 PM

Very interesting video on a new devastating virus that was recently used to attempt to harm a Nuclear Plant in Iran. The program was been coded with logic so complicated that the virus was 10 times bigger then any known virus. The worm was able to work flawlessly on two completely different operating systems( Windows and the Programmable Logic Controller) and spread itself over the Nuclear network. This virus was able to remain undetected for months whilst performing actions via the control room computer's. The biggest fear regarding this worm is that it used everyday technology to accomplish its task. It understood many flaws in the windows operating system in order to work and was able to bypass anti-virus systems by using stolen certificates from trusted organisations. This article also highlights more so how careless some people can be(although in this case it seems likely to have been an inside job to get the virus into the plant).

Rescooped by Nathan Fisher from Cybersecurity & Cybercrime
Scoop.it!

Report outlines characteristics of nation-state driven cyber attacks - The Guardian

Report outlines characteristics of nation-state driven cyber attacks - The Guardian | Cyberwarfare & Security | Scoop.it
The Guardian
Report outlines characteristics of nation-state driven cyber attacks
The Guardian
"The biggest challenge to deterring, defending against, or retaliating for cyber-attacks is the problem of correctly identifying the perpetrator.

Via Tracy Hackshaw
Nathan Fisher's insight:

FireEye Inc, a global network security company, released a report that described the unique characteristics used by governments worldwide.

 

The report goes in-depth about different countries' cyber attack and security divisions. Currently, the United States possesses the most complex and targeted  cyber-attack campaigns. 

 

This report outlines the increasing cyber attacks on different nations and the need to have up-to-date security measures to protect themselves.

more...
No comment yet.
Scooped by Nathan Fisher
Scoop.it!

Cyberspace and the Changing Nature of Warfare

Cyberspace and the Changing Nature of Warfare | Cyberwarfare & Security | Scoop.it
Strategists must be aware that part of every political and military conflict will take place on the internet, says Kenneth Geers.
Nathan Fisher's insight:

This article from SC magazine takes a look into the past cyber warfare acts committed and provides an insight on the future state of cyber crimes.

 

The Estonia cyber attacks in 2007 will be looked back in the future and be remembered as the turning point in cyberwarfare. It shows that there is a demand for cyber security experts to protect IT-dependent countries.

 

Cyberware and security's demand will exponentially increase in the future due to availability of new technologies by almost everyone in the general public.

 

more...
Christopher Adams's curator insight, March 20, 2014 11:48 PM

Good scoop by Nathan. It's a point of interest to look into when looking into more available internet with freedom of use. Every person knows how aware they have to be of criminals but this shouldn't be a reason to restrict our cyber rights. People need to be more informed into the matter as cyberspace changes and grows.

Joel Field's curator insight, March 26, 2014 7:51 PM

A good look into the transformation of political and military conflicts. Every conflict now has a cyber aspect that can drastically effect the outcome of the real world conflicts. Experts conclude that the criminals have the most advantage on the internet. There is far more damage they can do there while remaining hidden. One of the biggest threats to governments is data manipulation. Criminals get access to extremely sensitive information and modify or delete parts. Considering that people have to make important decisions based on this information it is easy to see how there could be extreme real world ramifications. An example would be government infrastructure that has links to military weapons.

Scooped by Nathan Fisher
Scoop.it!

Symantec's Stuxnet Dossier

Nathan Fisher's insight:

A PDF provided by Symantec which thoroughly analyses the Stuxnet virus. Providing a detailed decomposition of the virus' methods of attack, target and more.

 

The Stuxnet virus is the start of many computer viruses and malware that will be used by governments to target other countries. Stuxnet ha d the ability to shut down Iran's power supply by overclocking the centrifuges in the nuclear power enrichment plant.

 

Cyber crime is on the rise and naturally cyber security is too. 

more...
No comment yet.