Cyberwar and secu...
Follow
Find
5.4K views | +3 today
Scooped by Pierre Levy
onto Cyberwar and security
Scoop.it!

Canadians sue spy agency over mass data collection

Canadians sue spy agency over mass data collection | Cyberwar and security | Scoop.it
A Canadian spy agency is collecting meta-data about its citizens’ phone records and internet activity, according to a new lawsuit, which is the first such case in the country since the PRISM scandal broke in the US this summer.
more...
No comment yet.
Cyberwar and security
New military challenges in cyberspace, digital crime
Curated by Pierre Levy
Your new post is loading...
Scooped by Pierre Levy
Scoop.it!

Financial services now the 'front lines' in cyber warfare, experts suggest | ZDNet

Financial services now the 'front lines' in cyber warfare, experts suggest | ZDNet | Cyberwar and security | Scoop.it
A Wells Fargo exec suggested most attackers rerouting to where the data is, meaning emerging technologies in the cloud and datacenters could be most at risk.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US secretly created 'Cuban Twitter' to stir unrest

US secretly created 'Cuban Twitter' to stir unrest | Cyberwar and security | Scoop.it
WASHINGTON (AP) — In July 2010, Joe McSpedon, a U.S.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

NSA infiltrates servers of China telecom giant Huawei: report

NSA infiltrates servers of China telecom giant Huawei: report | Cyberwar and security | Scoop.it
WASHINGTON (Reuters) - The U.S. National Security Agency has infiltrated servers in the headquarters of Chinese telecommunications and internet giant Huawei Technologies Co, obtaining sensitive information
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Espionnage : comment Orange et les services secrets coopèrent

Espionnage : comment Orange et les services secrets coopèrent | Cyberwar and security | Scoop.it
Exclusif. Selon un document Snowden auquel « Le Monde » a eu accès, l'opérateur est un acteur essentiel du renseignement français.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Google is encrypting search globally. That’s bad for the NSA and China’s censors.

Google is encrypting search globally. That’s bad for the NSA and China’s censors. | Cyberwar and security | Scoop.it
Google is encrypting its search results worldwide. Here's how they will look to Chinese censors: "1fe7897ad064478fc...�
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Attackers trick 162,000 WordPress sites into launching DDoS attack

Attackers trick 162,000 WordPress sites into launching DDoS attack | Cyberwar and security | Scoop.it
Technique allows lone attacker hidden in the shadows to wage crippling attacks.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Q -Warrior brings head-up displays to the battlefield

Q -Warrior brings head-up displays to the battlefield | Cyberwar and security | Scoop.it
BAE Systems’ Electronic Systems has developed the Q-Warrior – a head-up display for foot soldiers that’s designed to provide a full-color, high resolution 3...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Hacking Team Denies Selling Spyware to Sketchy Governments

Hacking Team Denies Selling Spyware to Sketchy Governments | Cyberwar and security | Scoop.it
Surveillance-technology company Hacking Team denied selling its spyware to 21 countries, including those that suppress civil liberties, following a report.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US military hires IBM to work on radios and phones that self-destruct remotely

US military hires IBM to work on radios and phones that self-destruct remotely | Cyberwar and security | Scoop.it
IBM is working on a glass-substrate material, which, coupled with remote triggers placed inside one (or multiple) areas of the device, will make it disintegrate with a mini-boom. According to Dan Olds, an analyst with Gabriel Consulting, the option of self-destructing is important for the safety of sensitive data and devices...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

NBC: All Visitors to Sochi Olympics Immediately Hacked

NBC: All Visitors to Sochi Olympics Immediately Hacked | Cyberwar and security | Scoop.it
Richard Engel reported last night on NBC that all visitors to the Sochi Olympics are getting hacked as soon as their electronic devices connect to any Russian network:
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

ENGLISH SUMMARY – Belgian professor in cryptography hacked - De Standaard Mobile

ENGLISH SUMMARY – Belgian professor in cryptography hacked - De Standaard Mobile | Cyberwar and security | Scoop.it
This is an English summary of an article published in today's edition of Belgian newspaper De Standaard. The article concerns the hacking of the computer of professor Jean-Jacques Quisquater, a renowned expert in cryptography. Suspicions arose that the hacking of Professor Quisquater was done by the U.S. National Security Agency or the British GCHQ. The case is under investigation by Belgian authorities.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

India readies cyber command service to combat espionage threats online - India - dna

India readies cyber command service to combat espionage threats online - India -  dna | Cyberwar and security | Scoop.it
- India dna
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Exclusive: More well-known U.S. retailers victims of cyber attacks

Exclusive: More well-known U.S. retailers victims of cyber attacks | Cyberwar and security | Scoop.it
BOSTON/WASHINGTON (Reuters) - Target Corp and Neiman Marcus are not the only U.S.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept | Cyberwar and security | Scoop.it
The sham "Cuban Twitter" program, along with top secret NSA documents, show how western governments exploit the Internet to manipulate political discourse.
more...
Peter Vander Auwera's curator insight, April 5, 11:06 PM

Way beyond the Cuban Twitter story. Even "Royal Concierge" service trying to influence your hotel choice. Getting worse every day..

Scooped by Pierre Levy
Scoop.it!

Obama to Call for End to N.S.A.’s Bulk Data Collection

Obama to Call for End to N.S.A.’s Bulk Data Collection | Cyberwar and security | Scoop.it
Under the administration’s proposal, the government would obtain individual orders from the Foreign Intelligence Surveillance Court to obtain only records linked to phone numbers a judge agrees are likely tied to terrorism.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Exclusive: Pentagon Withholds Internal Report About Flawed $2.7 Billion Intel Program

Exclusive: Pentagon Withholds Internal Report About Flawed $2.7 Billion Intel Program | Cyberwar and security | Scoop.it
Why
won't senior officials show Congress evidence of a cheaper, off-the-shelf
alternative to the military's Afghan battlefield needs?
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

NATO says its websites hit by cyber attacks | Reuters

NATO says its websites hit by cyber attacks | Reuters | Cyberwar and security | Scoop.it
BRUSSELS (Reuters) - Several NATO websites have been hit by cyber attacks, but they have had no impact on the military alliance's operations, a NATO spokeswoman said.The attacks, which affected NATO's
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Web firms face a strict new set of privacy rules in Europe -- here's what to expect

Web firms face a strict new set of privacy rules in Europe -- here's what to expect | Cyberwar and security | Scoop.it
The European Parliament has passed the EU’s first major overhaul of data protection legislation since 1995, taking into account today’s online landscape. Meanwhile, parliamentarians also approved a resolution calling for the suspension of a key deal affecting U.S. web firms.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Cyber Warfare: The Real Cold War - The Globalist

Cyber Warfare: The Real Cold War - The Globalist | Cyberwar and security | Scoop.it
A successful cyber-attack on a country's critical infrastructure is not a question of if, but when. By Uwe Bott
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept | Cyberwar and security | Scoop.it
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Kaspersky Unveils 'The Mask' - Most Advanced Cyber Espionage Operation Seen To Date | SecurityWeek.Com

Kaspersky Unveils 'The Mask' - Most Advanced Cyber Espionage Operation Seen To Date | SecurityWeek.Com | Cyberwar and security | Scoop.it
Researchers from Kaspersky Lab unveiled details on "The Mask", a sophisticated cyber-espionage campaign that the security firm is calling most advanced it has ever seen to-date.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

The NSA's Secret Role in the U.S. Assassination Program - The Intercept

The NSA's Secret Role in the U.S. Assassination Program - The Intercept | Cyberwar and security | Scoop.it
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Cryptography Breakthrough Could Make Software Unhackable - Wired Science

Cryptography Breakthrough Could Make Software Unhackable - Wired Science | Cyberwar and security | Scoop.it
In a watershed moment for cryptography, computer scientists have proposed a solution to a fundamental problem called “program obfuscation.”
Pierre Levy's insight:

Read the first comment (by the main researcher) that contradicts the journalist's narrative!

more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Where Are All the Cyberweapons? | MIT Technology Review

Where Are All the Cyberweapons? | MIT Technology Review | Cyberwar and security | Scoop.it
The discovery of Stuxnet in 2010 seemed to herald a new age of cyberwar, but that age has yet to materialize.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

New cyber-attack model helps hackers time the next Stuxnet

New cyber-attack model helps hackers time the next Stuxnet | Cyberwar and security | Scoop.it
Of the many tricks used by the world’s greatest military strategists, one usually works well – taking the enemy by surprise…
more...
No comment yet.