ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar 

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

US weighs tougher action over China cyberattacks

US weighs tougher action over China cyberattacks | ICT Security-Sécurité PC et Internet | Scoop.it
(AP)—High-level talks with the Chinese government to address persistent cyberattacks against U.S. companies and government agencies haven't worked, so officials say the Obama administration is now considering a range of actions.

 

"We have to begin making it clear to the Chinese," Secretary of State Hillary Rodham Clinton said Thursday, "that the United States is going to have to take action to protect not only our government's, but our private sector, from this kind of illegal intrusions."

Read more at: http://phys.org/news/2013-02-tougher-action-china-cyberattacks.html#jCp

 

Gust MEES's insight:

The cold war starts to heat up...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar – Chinesen greifen Amerikaner an

Cyberwar – Chinesen greifen Amerikaner an | ICT Security-Sécurité PC et Internet | Scoop.it
Erst die „New York Times“, dann das „Wall Street Journal“ – offenbar greifen chinesische Cyber-Krieger internationale Medien an.
Gust MEES's insight:

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=cyberwar

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

UK planning 'Cyber Reserve' force

UK planning 'Cyber Reserve' force | ICT Security-Sécurité PC et Internet | Scoop.it
The UK government is to set up a "Cyber Reserve" force to deal with security threats posed by computer crime.

 

Read more, a MUST:

http://www.bbc.co.uk/news/uk-politics-20578691

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: Der Feind in meinem Computer

Cyberwar: Der Feind in meinem Computer | ICT Security-Sécurité PC et Internet | Scoop.it
Die Bundeswehr rüstet sich für den Cyberwar. Das ist nicht nur eine Herausforderung für das Militär, sondern auch für die Politik. Von R. Birnbaum und M.

 

Mehr erfahren:

 

http://www.zeit.de/politik/ausland/2012-06/bundeswehr-cyberwar-abwehr

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers infiltrate US government nuclear network

Hackers infiltrate US government nuclear network | ICT Security-Sécurité PC et Internet | Scoop.it

Some of the US government's most sensitive networks were reportedly infiltrated by hackers, in a worrying development in the escalating ‘cyber war' taking place between nations.


According to US website FreeBeacon, the attack was instigated by Chinese attackers and infiltrated several aspects of its network, including the system used by the White House Military Office for nuclear commands.


A subsequent statement given to FoxNews.com appeared to tacitly confirm the attack, although did not make any direct reference to China and played down the extent of the threat to the nation.

 

Read more, a MUST:

http://www.v3.co.uk/v3-uk/news/2213690/hackers-infiltrate-us-government-nuclear-network?utm_campaign=V3_co_uk&utm_source=Twitter&utm_medium=Twitterfeed

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber WarFare country-by-country analysis

Cyber WarFare country-by-country analysis | ICT Security-Sécurité PC et Internet | Scoop.it

Relying exclusively on open source information, task is to assess the relative capabilities of certain countries identified in the literature (China, India, Iran, North Korea, Pakistan, and Russia) to wage an effective cyber attack against an adversary.

 

The words “effective cyberattack” by no means translate into the proverbial “take down” of the Internet; on the contrary,such attacks might involve intrusions into unprotected networks for the purpose of compromising data tables, degrading communications, interrupting commerce, or impairing critical infrastructures (such as transportation or medical and emergency services) in such a way that trust is undermined at the expense of a smoothly running economy and society.

 

Read more:

http://cyberwarzone.com/cyberwarfare/cyber-warfare-country-country-analysis

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Today's Cyber-War is a Cold War, Some Say

Today's Cyber-War is a Cold War, Some Say | ICT Security-Sécurité PC et Internet | Scoop.it
If your organization develops intellectual property that would be valuable to other countries to copy, you are a target and probably have already been compromised.

 

In its threat report for the first half of 2012, F-Secure summarized the pieces of the Flame malware, which according to some researchers claimed the title of the most complex ever. Earlier this year, The Washington Post cited anonymous sources stating that the malware was linked to a joint effort by the United States and Israel, though American and Israeli officials officially declined to comment. While arms races in the physical world have centered on countries letting their rivals know about their capabilities for the sake of deterrence, the world has not yet reached this stage when it comes to cyber-attacks, wrote Mikko Hyppönen, chief research officer at F-Secure.

 

"Most likely, yes (we are in an arms race)," he told SecurityWeek. "But it's happening behind closed doors in classified programs, so we don't know much about it – so far. Only [the] USA has confessed doing this. But we must assume most technically advanced nations are stockpiling cyber arms."

 

Read more:

http://www.securityweek.com/todays-cyber-war-cold-war-some-say

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Massive Web of Fake Identities and Websites Controlled Flame Malware

A Massive Web of Fake Identities and Websites Controlled Flame Malware | ICT Security-Sécurité PC et Internet | Scoop.it
The attackers behind the complex Flame cyberespionage toolkit, believed to be a state-sponsored operation, used an extensive list of fake id...

 

Read more, interesting to know...

http://www.wired.com/threatlevel/2012/06/flame-command-and-control/?utm_source=twitterfeed&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame proves cyberwarfare is active

Flame proves cyberwarfare is active | ICT Security-Sécurité PC et Internet | Scoop.it
Cyberwarfare is an emotive and contentious issue. But the emergence of an extensive and sophisticated attack toolkit, Flame, apparently targeted against Iran removes all doubt:

 

                      ===> cyberwar is here and active. <===

 

Image credit:

http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

 

Read more:

http://www.infosecurity-magazine.com/view/26037/flame-proves-cyberwarfare-is-active-/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame surveillance worm described as one of the most complex threats ever discovered

Flame surveillance worm described as one of the most complex threats ever discovered | ICT Security-Sécurité PC et Internet | Scoop.it
A worm described as the the most sophisticated cyber weapon yet unleashed has been detected attacking nations in the Middle East.

 

 

 

 

Read more:

http://www.scmagazineuk.com/flame-surveillance-worm-described-as-one-of-the-most-complex-threats-ever-discovered/article/243086/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber warfare tipped as next big threat

Cyber warfare tipped as next big threat | ICT Security-Sécurité PC et Internet | Scoop.it
Experts say cyber-warfare is the next big threat to world economies, where entire cities or countries could grind to a half from online terrorism.

 

 

 

Read more:

http://www.abc.net.au/news/2012-05-22/cyber-warfare-tipped-as-next-big-threat/4027176

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

US weighs up cyber threats

US weighs up cyber threats | ICT Security-Sécurité PC et Internet | Scoop.it
US weighs up cyber threats...

 

The Pentagon's top cyber-warrior wants Barack Obama to decide if and when the US military should attack enemy computer systems.


Cyber-attacks on enemy computer systems should require presidential authority — and not be launched at the discretion of individual military commanders — the top cyber-warrior in the US has told Congress.

 

Read more: http://www.smh.com.au/it-pro/security-it/us-weighs-up-cyber-threats-20120330-1w2y8.html#ixzz1qnUvczWA

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators

Mandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators | ICT Security-Sécurité PC et Internet | Scoop.it
Today, The Mandiant® Intelligence Center™ released an unprecedented report exposing APT1's multi-year, enterprise-scale computer espionage campaign.  APT1 is one of dozens of threat groups Mandiant...
Gust MEES's insight:

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=China...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Chinese Hackers Hit U.S. Media

Chinese Hackers Hit U.S. Media | ICT Security-Sécurité PC et Internet | Scoop.it
Chinese hackers have been conducting wide-ranging electronic surveillance of media companies including The Wall Street Journal, apparently to spy on reporters covering China and other issues.
Gust MEES's insight:

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=cyberwar

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2012. Cyber Weapons

Kaspersky Security Bulletin 2012. Cyber Weapons | ICT Security-Sécurité PC et Internet | Scoop.it
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu.

However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails.

Apart from an increase in the number of security incidents involving cyber weapons, the events of 2012 have also brought to light the fact that many sovereign states are heavily involved in the development of cyber weapons – something that was picked up on and widely discussed by the mass media. Moreover, cyber warfare was on the agenda of public discussions between governments and state representatives over the course of 2012.

It is safe to say, therefore, that 2012 has brought key revelations in this sphere – both in terms of the increase in security incidents and a greater understanding of how cyber weapons are being developed
No comment yet.
Scooped by Gust MEES
Scoop.it!

Global hacking network declares Internet war on Syria

Global hacking network declares Internet war on Syria | ICT Security-Sécurité PC et Internet | Scoop.it

BEIRUT (Reuters) - Global hacking network Anonymous said it will shut down Syrian government websites around the world in response to a countrywide Internet blackout believed to be aimed at silencing the opposition to President Bashar al-Assad.

 

Read more:

http://www.reuters.com/article/2012/11/30/us-syria-crisis-internet-idUSBRE8AT0PN20121130

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: Obama erlaubt Angriffe auf fremde Netze

Cyberwar: Obama erlaubt Angriffe auf fremde Netze | ICT Security-Sécurité PC et Internet | Scoop.it
Amerikanisches Militär und Sicherheitsdienste dürfen Rechner in fremden Ländern angreifen, um die USA zu schützen. Das bestimmte Präsident Obama in einem geheimen Gesetz.

 

Mehr erfahren:

http://www.zeit.de/digital/internet/2012-11/obama-cyberwar-direktive

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity manual examines how international law applies to cyberwarfare

Cybersecurity manual examines how international law applies to cyberwarfare | ICT Security-Sécurité PC et Internet | Scoop.it
A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply.

 

Read more:

http://news.techworld.com/security/3379202/cybersecurity-manual-examines-how-international-law-applies-cyberwarfare/?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Teaching the shadowy art of cyber war

Teaching the shadowy art of cyber war | ICT Security-Sécurité PC et Internet | Scoop.it

As the Air Force faces up to the threat of attacks on computer networks and communications, it has developed a new ===> cyber war school <=== at Nellis Air Force Base designed to fight guerrilla tactics of cyber-terrorists.

 

Gust MEES: a MUST READ!

 

Read more:

http://www.lasvegassun.com/news/2012/jul/06/learning-art-cyber-war/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.?

Born on the 4th of July: Will There Be Collateral Damage in Cyberwar to U.S.? | ICT Security-Sécurité PC et Internet | Scoop.it
A computer worm developed by the U.S. and Israel, intended to attack Iran, was found in workstations at a factory the federal government considers critical.

 

===> If this doesn't scare you, it should. <===

 

Read more:

http://allthingsd.com/20120704/born-on-the-4th-of-july-will-there-be-collateral-damage-in-cyberwar/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Obama Ordered Wave of Cyberattacks Against Iran

Obama Ordered Wave of Cyberattacks Against Iran | ICT Security-Sécurité PC et Internet | Scoop.it
Even after the Stuxnet computer worm became public, President Obama accelerated cyberattacks against Iran that had begun in the Bush administration, temporarily disabling 1,000 centrifuges.

 

Read more:

http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=3&amp;pagewanted=1&amp;pagewanted=all

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Flame: Questions and Answers

The Flame: Questions and Answers | ICT Security-Sécurité PC et Internet | Scoop.it
Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has worm-like features, allowing it to replicate in a local network and on removable media if it is commanded so by its master.

 

Read more, very interesting:

http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

World teeters on cyber-war brink

World teeters on cyber-war brink | ICT Security-Sécurité PC et Internet | Scoop.it

Just as the NATO summit drew to its conclusion in Chicago, internet security maven Eugene Kaspersky, today warned global leaders that the world needs international agreements about cyber-weapons in the same way as it needs agreements about nuclear or biological weaponry...

 

Read more:

http://www.itwire.com/business-it-news/security/54865-world-teeters-on-cyber-war-brink

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Data Security: Who's Winning The Cyberwar?

Data Security: Who's Winning The Cyberwar? | ICT Security-Sécurité PC et Internet | Scoop.it
The growing sophistication of cyber-attacks and the proliferation of vulnerabilities resulting from the rise of mobile computing are forcing financial institutions to rethink data security and embrace new fraud-fighting techniques and technologies,...
No comment yet.