War, Cyberwar and...
Follow
Find
6.5K views | +0 today
 
Scooped by Pierre Levy
onto War, Cyberwar and Security
Scoop.it!

'Icefog' spying operation targeted Japan, South Korea | PCWorld

'Icefog' spying operation targeted Japan, South Korea | PCWorld | War, Cyberwar and Security | Scoop.it
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
more...
luiy's curator insight, September 26, 2013 2:44 PM

A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.

The "Icefog" hackers probed victims one by one, carefully copying select files and then exiting the systems, according to security vendor Kaspersky Lab, which released a 68-page report on the group Wednesday.

 

"The nature of the attacks was also very focused," Kaspersky wrote. "In many cases, the attackers already knew what they were looking for."

Over the past several years, security analysts have noticed an uptick in so-called:

 

"advanced persistent threat" (APT) attacks,

 

... where interlopers plant stealthy malware on networks for cyber spying.

"In the future, we predict the number of small, focused APT-to-hire groups to grow, specializing in hit-and-run operations, a kind of 'cyber mercenaries' of the modern world," the report said.

War, Cyberwar and Security
New military challenges, cyberwarfare, intelligence, digital crime
Curated by Pierre Levy
Your new post is loading...
Your new post is loading...
Scooped by Pierre Levy
Scoop.it!

IS expands in Libya - Al-Monitor

While the Libyan state remains too weak to confront and disarm the plethora of militias still present within it, IS has been able to gain a foothold in the eastern city of Derna.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Military Strategy for a Twitter War

Military Strategy for a Twitter War | War, Cyberwar and Security | Scoop.it
A military guide to fighting Twitter Wars. On NEXTWar, a blog by the Center for International Maritime Security.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Hackers Gather for Cyberwar in an Intense 48-Hour Sim | WIRED

Hackers Gather for Cyberwar in an Intense 48-Hour Sim | WIRED | War, Cyberwar and Security | Scoop.it
Locked Shields is among the world’s preeminent cyber attack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics. It is a training ground for front-line operators in a rapidly evolving form of warfare in which network administrators at banks, electrical plants and government offices are as crucial to a co
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

IRBIL, Iraq: Sources: U.S. air strikes in Syria targeted French agent who defected to al Qaida | Syria | McClatchy DC

IRBIL, Iraq: Sources: U.S. air strikes in Syria targeted French agent who defected to al Qaida | Syria | McClatchy DC | War, Cyberwar and Security | Scoop.it
A former French intelligence officer who defected to al Qaida was among the targets of the first wave of U.S. air strikes in Syria last month, according to people familiar with the defector’s movements and identity.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Entering the Intelligence Labyrinth

Entering the Intelligence Labyrinth | War, Cyberwar and Security | Scoop.it
Originally posted at TomDispatch. What are the odds? You put about $68 billion annually into a maze of 17 major intelligence outfits. You build them glorious headquarters. You create a global surve...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

In post-Snowden era, 'the bad guys will take advantage of our blindness and deafness'

In post-Snowden era, 'the bad guys will take advantage of our blindness and deafness' | War, Cyberwar and Security | Scoop.it
News:
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Army Cyber Chief: Let's Get Closer To Industry

Army Cyber Chief: Let's Get Closer To Industry | War, Cyberwar and Security | Scoop.it
To keep pace with rapid changes in the cyber domain, the military needs 'a much tighter relationship between industry and government,' the head of U.S. Army Cyber Command said Thursday.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Digital jihad: ISIS, Al Qaeda seek a cyber caliphate to launch attacks on US

Digital jihad: ISIS, Al Qaeda seek a cyber caliphate to launch attacks on US | War, Cyberwar and Security | Scoop.it
Jihadists in the Middle East are ramping up efforts to mount a massive cyber attack on the U.S., with leaders from both Islamic State and Al Qaeda - including a hacker who once broke into former British Prime Minister Tony Blair's G-mail account - recruiting web savvy radicals, FoxNews.com has learned.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

The only way to defeat the Islamic State: expanding the McChrystal method of war

The only way to defeat the Islamic State: expanding the McChrystal method of war | War, Cyberwar and Security | Scoop.it
The U.S. must expand Stanley McChrystal’s method of war.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Israeli company uncovers international cyber spy network - Al-Monitor: the Pulse of the Middle East

Israeli company uncovers international cyber spy network - Al-Monitor: the Pulse of the Middle East | War, Cyberwar and Security | Scoop.it
According to Israel-based CYBERTINEL, a spy network had been hitting targets in Germany, Austria and Switzerland for over a decade.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

FBI investigates alleged Russian cyber attack on Wall Street - Telegraph

FBI investigates alleged Russian cyber attack on Wall Street - Telegraph | War, Cyberwar and Security | Scoop.it
Major US financial institutions reportedly targeted by sophisticated high-level cyber-attack amid suspicions that operation was launched in retaliation for sanctions over Ukraine
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Offensive Cyber Operations in US Military Doctrine

Offensive Cyber Operations in US Military Doctrine | War, Cyberwar and Security | Scoop.it
A newly disclosed Department of Defense doctrinal publication acknowledges the reality of offensive cyberspace operations, and provides a military perspective on their utility and their hazards. Attacks in cyberspace can be used “to degrade, disrupt, or destroy access to, operation of, or availability of a target by a specified level for a specified time.” Or they can be used “to control or change the adversary’s information, information systems, and/or networks in a manner that supports …
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Syria's Assad Looks To Still Use Chemical Weapons

Syria's Assad Looks To Still Use Chemical Weapons | War, Cyberwar and Security | Scoop.it
FINANCIAL TIMES October 21, 2014 Assad Looks To Still Use Chemical Weapons Borzou Daragahi in Cairo It was yet another missile, one of many fired by the Syrian regime at the rebel-controlled Jobar ...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Are America's Special Operations Forces In Crisis?

Are America's Special Operations Forces In Crisis? | War, Cyberwar and Security | Scoop.it
Excerpts: Finally, specials operations units - the very definition of unconventional forces - face another challenge: becoming conventional. SOCOM oversees roughly 70,000 operators, support units a...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

J.D. Gordon: China Hacking Its Way to Superpower Status

J.D. Gordon: China Hacking Its Way to Superpower Status | War, Cyberwar and Security | Scoop.it
[NewsmaxWorld - GlobalTalk] [NewsmaxWorld - GlobalTalk] The U.S. government has linked China to cyber-attacks on major weapons systems and other U.S. entities, and former Defense Department spokesman J.D. Gordon says that the Chinese are using cyber warfare to overtake the ...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

China Launches Massive Cross-Platform Cyber Attack against Hong Kong Protestors

The very tool (cell phones) that has allowed millions of previously disconnected people to coordinate large civil protests in numerous countries is now being used to quash dissent in...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

U.S. threatened massive fine to force Yahoo to release data

U.S. threatened massive fine to force Yahoo to release data | War, Cyberwar and Security | Scoop.it
Unsealed documents detail firm’s unsuccessful bid to keep personal information away from feds.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Observations on the Long War [US Art of War]

Observations on the Long War [US Art of War] | War, Cyberwar and Security | Scoop.it
For more than a decade, I have been recording reflections about the course of the so-called “Long War” launched after the tragic events of 9/11....
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

The Unlikely Alliance of Hackers Fighting the Islamic State

The Unlikely Alliance of Hackers Fighting the Islamic State | War, Cyberwar and Security | Scoop.it
Hacking groups loosely affiliated with governments in the U.S., Iran and Syria are targeting the Islamic State online, but can they really hack them?
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Remote U.S. base at core of secret operations

Remote U.S. base at core of secret operations | War, Cyberwar and Security | Scoop.it
Part III | Remote outpost in Djibouti placed at forefront of drone wars
more...
No comment yet.