Cyberwar and secu...
Follow
Find
5.9K views | +6 today
Scooped by Pierre Levy
onto Cyberwar and security
Scoop.it!

'Icefog' spying operation targeted Japan, South Korea | PCWorld

'Icefog' spying operation targeted Japan, South Korea | PCWorld | Cyberwar and security | Scoop.it
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
more...
luiy's curator insight, September 26, 2013 11:44 AM

A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.

The "Icefog" hackers probed victims one by one, carefully copying select files and then exiting the systems, according to security vendor Kaspersky Lab, which released a 68-page report on the group Wednesday.

 

"The nature of the attacks was also very focused," Kaspersky wrote. "In many cases, the attackers already knew what they were looking for."

Over the past several years, security analysts have noticed an uptick in so-called:

 

"advanced persistent threat" (APT) attacks,

 

... where interlopers plant stealthy malware on networks for cyber spying.

"In the future, we predict the number of small, focused APT-to-hire groups to grow, specializing in hit-and-run operations, a kind of 'cyber mercenaries' of the modern world," the report said.

Cyberwar and security
New military challenges in cyberspace, digital crime
Curated by Pierre Levy
Your new post is loading...
Scooped by Pierre Levy
Scoop.it!

Israel’s Much-Hyped “Iron Dome” Technology Is Achieving Little | MIT Technology Review

Israel’s Much-Hyped “Iron Dome” Technology Is Achieving Little | MIT Technology Review | Cyberwar and security | Scoop.it
Although it appears to hit incoming Hamas rockets, Israel’s system could be falling short of detonating the rockets’ warheads.
Pierre Levy's insight:

Interesting: a defensive weapon that does not work in theory... but does the job in practice!...

more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US military studied how to influence Twitter users in Darpa-funded research

US military studied how to influence Twitter users in Darpa-funded research | Cyberwar and security | Scoop.it
Defense Department spent millions researching users, including studies on Occupy and Middle East residents, and how to better spread propaganda
more...
luiy's curator insight, July 10, 2:54 AM

The activities of users of Twitter and other social media services were recorded and analysed as part of a major project funded by the US military, in a program that covers ground similar to Facebook’s controversial experiment into how to control emotions by manipulating news feeds.

 

Research funded directly or indirectly by the US Department of Defense’s military research department, known as Darpa, has involved users of some of the internet’s largest destinations, including Facebook, Twitter, Pinterest and Kickstarter, for studies of social connections and how messages spread.

 
Scooped by Pierre Levy
Scoop.it!

Russia Moves To Ban Online Services That Don’t Store Personal Data In Russia | TechCrunch

Russia Moves To Ban Online Services That Don’t Store Personal Data In Russia | TechCrunch | Cyberwar and security | Scoop.it
The Russian government has moved one step closer towards a “China-like” approach towards Internet services. Last night, the Russian State Duma..
more...
No comment yet.
Rescooped by Pierre Levy from e-Xploration
Scoop.it!

An Interactive Map Showing Global Cyberattacks In Real Time

Security firm Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. A quick glance shows that the world is a pretty scary place.


Via luiy
more...
luiy's curator insight, June 27, 1:46 PM

The interactive map is a promotional tool created by Kaspersky Lab, but it's fascinating nonetheless. Threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as objects identified by vulnerability and intrusion detection sub-systems.

 

Scooped by Pierre Levy
Scoop.it!

Iranians Caught Cyber Snooping on High-Value US Targets | Cybersecurity | TechNewsWorld

Iranians Caught Cyber Snooping on High-Value US Targets | Cybersecurity | TechNewsWorld | Cyberwar and security | Scoop.it
A cyberespionage campaign with links to Iran for at least three years has been targeting U.S. military and congressional personnel, journalists and diplomats, as well as U.S. and Israeli defense contractors and members of the U.S./Israel lobby, according to a report released Thursday by iSight Partners. The spy ring used more than a dozen phony identities on online social networks.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

What to Expect From Charges Against Chinese Hackers: Nothing

What to Expect From Charges Against Chinese Hackers: Nothing | Cyberwar and security | Scoop.it
Pot, meet kettle.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

DARPA is working on its own deep-learning project for natural-language processing

DARPA is working on its own deep-learning project for natural-language processing | Cyberwar and security | Scoop.it
The Defense Advanced Research Projects Agency, or DARPA, is building a set of technologies to help it better understand human language so it can analyze speech and text sources and alert analysts of potentially useful information.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

When the internet dies, meet the meshnet that survives - 19 April 2014 - New Scientist

When the internet dies, meet the meshnet that survives - 19 April 2014 - New Scientist | Cyberwar and security | Scoop.it
If a crisis throws everyone offline, getting reconnected can be tougher than it looks, finds Hal Hodson
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

F.B.I. Informant Is Tied to Cyberattacks Abroad

F.B.I. Informant Is Tied to Cyberattacks Abroad | Cyberwar and security | Scoop.it
While it is unclear whether the F.B.I. ordered the attacks by Hector Xavier Monsegur, the agency may have used hackers to gather intelligence even as investigators were trying to dismantle hacking groups.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Financial services now the 'front lines' in cyber warfare, experts suggest | ZDNet

Financial services now the 'front lines' in cyber warfare, experts suggest | ZDNet | Cyberwar and security | Scoop.it
A Wells Fargo exec suggested most attackers rerouting to where the data is, meaning emerging technologies in the cloud and datacenters could be most at risk.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US secretly created 'Cuban Twitter' to stir unrest

US secretly created 'Cuban Twitter' to stir unrest | Cyberwar and security | Scoop.it
WASHINGTON (AP) — In July 2010, Joe McSpedon, a U.S.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

NSA infiltrates servers of China telecom giant Huawei: report

NSA infiltrates servers of China telecom giant Huawei: report | Cyberwar and security | Scoop.it
WASHINGTON (Reuters) - The U.S. National Security Agency has infiltrated servers in the headquarters of Chinese telecommunications and internet giant Huawei Technologies Co, obtaining sensitive information
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Espionnage : comment Orange et les services secrets coopèrent

Espionnage : comment Orange et les services secrets coopèrent | Cyberwar and security | Scoop.it
Exclusif. Selon un document Snowden auquel « Le Monde » a eu accès, l'opérateur est un acteur essentiel du renseignement français.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Israel's 'Iron Dome' changes the face of battle

more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

A Unit 8200 networking event in Tel Aviv

A Unit 8200 networking event in Tel Aviv | Cyberwar and security | Scoop.it
“Please move away from the Mossad booth,” said the hostess of a networking event I recently attended on a balmy evening at an undisclosed location in Tel Aviv. Because I was the only nongraduate of Unit 8200 present—aside from the bartenders and security personnel at the front door—Israel’...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Microsoft seizes 22 NO-IP domains, disrupts cybercriminal and nation state APT malware operations

Microsoft seizes 22 NO-IP domains, disrupts cybercriminal and nation state APT malware operations | Cyberwar and security | Scoop.it
Microsoft seized 22 domains previously owned by Vitalwerks, company behind dynamic dns service NO-IP
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Nuclear Brinksmanship: Obama’s ProtoWar Against Russia and China

Nuclear Brinksmanship: Obama’s ProtoWar Against Russia and China | Cyberwar and security | Scoop.it
Russia and China are both under attack by a multi-pronged U.S.-led ‘proto-war’ which could erupt into ‘hot war’ or even nuclear war.   ‘Protowar’ or ‘proto-warfare’ is the term I have coined to des...
more...
No comment yet.
Rescooped by Pierre Levy from Cyborgs_Transhumanism
Scoop.it!

El Pentágono presenta el futuro de las guerras digitales y robotizadas | #cyborgs #cyberwar #bigdata

El Pentágono presenta el futuro de las guerras digitales y robotizadas | #cyborgs #cyberwar #bigdata | Cyberwar and security | Scoop.it
La Agencia de Proyectos de Investigación Avanzada de Defensa (DARPA, en inglés) de EEUU presentó en el Pentágono los cien proyectos que prepara para guerras cibernéticas y campos d

Via Francisco Pontes Estevan, juandoming, luiy
more...
luiy's curator insight, May 22, 3:20 AM

El patio central del Pentágono mostró brazos robóticos, la versión militar de las Google Glass y sobre todo 'software' y plataformas digitales con el ojo puesto en futuras guerras cibernéticas, en las que los códigos binarios marcarán las diferencias entre vencedores y vencidos.

 

"El hombre y la máquina estarán cada vez más integrados", explicó Yifatch Eisenberg, director del proyecto de DARPA Ultra-Vis, un visor que se coloca frente al casco del soldado y envía en tiempo real información sobre órdenes, distancia a objetivos enemigos, grados con respecto al norte, situación de compañeros o la dirección a seguir.

Scooped by Pierre Levy
Scoop.it!

Australian military is to use new cyber warfare after Snowden's revelations

Australian military is to use new cyber warfare after Snowden's revelations | Cyberwar and security | Scoop.it
more...
No comment yet.
Rescooped by Pierre Levy from D&IM (Document & Information Manager) - Gouvernance numérique
Scoop.it!

L’Union européenne simule la cyberguerre totale !

L’Union européenne simule la cyberguerre totale ! | Cyberwar and security | Scoop.it
Plus de 600 acteurs des secteurs publics et privés ont démarré l’exercice biennal de cybersécurité, pour tester leur réactivité face à des éventuelles attaques cybernétiques.

Via Jean-Pierre Blanger
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

It’s Insanely Easy to Hack Hospital Equipment | Threat Level | WIRED

It’s Insanely Easy to Hack Hospital Equipment | Threat Level | WIRED | Cyberwar and security | Scoop.it
When Scott Erven was given free reign to roam through all of the medical equipment used at a chain of large midwest health care facilities, he knew he would find security problems with the systems -- but he wasn't prepared for just how bad it would be.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Brazil conference will plot Internet's future post NSA spying

Brazil conference will plot Internet's future post NSA spying | Cyberwar and security | Scoop.it
SAO PAULO/BRASILIA (Reuters) - A global conference in Brazil on the future of the Internet in the wake of U.S. spying revelations might be much less anti-American than first thought after Washington said
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept | Cyberwar and security | Scoop.it
The sham "Cuban Twitter" program, along with top secret NSA documents, show how western governments exploit the Internet to manipulate political discourse.
more...
Peter Vander Auwera's curator insight, April 5, 11:06 PM

Way beyond the Cuban Twitter story. Even "Royal Concierge" service trying to influence your hotel choice. Getting worse every day..

Scooped by Pierre Levy
Scoop.it!

Obama to Call for End to N.S.A.’s Bulk Data Collection

Obama to Call for End to N.S.A.’s Bulk Data Collection | Cyberwar and security | Scoop.it
Under the administration’s proposal, the government would obtain individual orders from the Foreign Intelligence Surveillance Court to obtain only records linked to phone numbers a judge agrees are likely tied to terrorism.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Exclusive: Pentagon Withholds Internal Report About Flawed $2.7 Billion Intel Program

Exclusive: Pentagon Withholds Internal Report About Flawed $2.7 Billion Intel Program | Cyberwar and security | Scoop.it
Why
won't senior officials show Congress evidence of a cheaper, off-the-shelf
alternative to the military's Afghan battlefield needs?
more...
No comment yet.