ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar 

Cyberwarfare in space: Satellites at risk of hacker attacks | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

There's an urgent need for NATO and its member countries to address the cybersecurity of space-based satellite control systems because they're vulnerable to cyberattacks - and if left unaddressed, it could have severe consequences for global security, a new paper from a major thinktank on international affairs has warned.

Almost all modern military engagements rely on space-based assets, providing GPS coordinates, telecommunications, monitoring and more.

The newly released Cybersecurity of NATO's Space-based Strategic Assets research paper from Chatham House warns that there's an urgent need to study and address the cybersecurity of these systems and the challenges which could be posed if a network was breached or otherwise attacked.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwarfare escalation just took a new and dangerous turn | #CyberSecurity

Cyberwarfare escalation just took a new and dangerous turn | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

The rhetoric surrounding cyberwarfare has ratcheted up again, potentially creating an unwelcome development in an area where misunderstanding and confusion could easily lead to escalation.

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.

The New York Times has reported that the US has escalated its plans to place malware in Russia power networks, in response to similar and ongoing online incursions by Russia-backed hackers.

This is the latest development in online hostilities involving power grids; energy companies have long been the targets of cyber-espionage, but in recent years the intent has switched from spying to creating outages.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:

The rhetoric surrounding cyberwarfare has ratcheted up again, potentially creating an unwelcome development in an area where misunderstanding and confusion could easily lead to escalation.

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.

The New York Times has reported that the US has escalated its plans to place malware in Russia power networks, in response to similar and ongoing online incursions by Russia-backed hackers.

This is the latest development in online hostilities involving power grids; energy companies have long been the targets of cyber-espionage, but in recent years the intent has switched from spying to creating outages.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

UK will 'strike back' if it comes under cyberattack, says government | #CyberSecurity 

UK will 'strike back' if it comes under cyberattack, says government | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
International hackers and cyberattackers who launch operations against the UK will be retaliated against, the government has warned, as it sets out plans to protect infrastructure, business, and citizens from online threats.

These tactics form part of the government's National Cyber Security Strategy, an effort to boost defences against a variety of online threats.

The strategy, backed by £1.9bn in funding, was originally set out by the Conservative government under David Cameron.

"Our new strategy, underpinned by £1.9bn of support over five years and excellent partnerships with industry and academia, will allow us to take even greater steps to defend ourselves in cyberspace and to strike back when we are attacked," Philip Hammond, UK Chancellor of the Exchequer, is set to say in a speech in which he argues Britain "must now keep up with the scale and pace of the threats we face".

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:
International hackers and cyberattackers who launch operations against the UK will be retaliated against, the government has warned, as it sets out plans to protect infrastructure, business, and citizens from online threats.

These tactics form part of the government's National Cyber Security Strategy, an effort to boost defences against a variety of online threats.

The strategy, backed by £1.9bn in funding, was originally set out by the Conservative government under David Cameron.

"Our new strategy, underpinned by £1.9bn of support over five years and excellent partnerships with industry and academia, will allow us to take even greater steps to defend ourselves in cyberspace and to strike back when we are attacked," Philip Hammond, UK Chancellor of the Exchequer, is set to say in a speech in which he argues Britain "must now keep up with the scale and pace of the threats we face".

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

An unknown state may be running drills for taking down the entire internet | #CyberSecurity 

An unknown state may be running drills for taking down the entire internet | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher and blogger Bruce Schneier has a new essay up, arguing that there’s a single body out there carrying out a systematic attempt to test the defenses of the internet’s fundamental infrastructure, presumably with the intention of one day breaking those defenses. While the sources for the article are anonymous, they hardly need naming since Schneier makes it clear that his research has collected insight from virtually all major internet companies, from large service providers like AT&T all the way to organizing bodies like Verisign or potentially even ICANN itself. Somebody is searching for weaknesses in the sorts of places that many assume you’d only attack for one reason: crashing all or a large portion of the internet.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:
Security researcher and blogger Bruce Schneier has a new essay up, arguing that there’s a single body out there carrying out a systematic attempt to test the defenses of the internet’s fundamental infrastructure, presumably with the intention of one day breaking those defenses. While the sources for the article are anonymous, they hardly need naming since Schneier makes it clear that his research has collected insight from virtually all major internet companies, from large service providers like AT&T all the way to organizing bodies like Verisign or potentially even ICANN itself. Somebody is searching for weaknesses in the sorts of places that many assume you’d only attack for one reason: crashing all or a large portion of the internet.

 

Learn more / En savoir plus / Mehr erfahren:

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Evidence Links Leaked Hacking Tools to the NSA | #CyberSecurity #Cyberespionage #ShadowBrokers

Evidence Links Leaked Hacking Tools to the NSA | #CyberSecurity #Cyberespionage #ShadowBrokers | ICT Security-Sécurité PC et Internet | Scoop.it
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.

Cyber-security experts were divided on the origin of the hacking code, which was leaked on Monday by another hacking group called calling itself the "Shadow Brokers." But The Intercept reported on Friday that a specific 16-character string found in a leaked NSA instruction manual also appears in the Shadow Brokers code.

The manual, a 31-page document entitled "FOXACID SOP for Operational Management," describes administrative tools for tracking surveillance targets, including a set of tags used to catalogue servers, according to The Intercept. The tags are used to trick Internet users into thinking they're browsing a safe website when in fact they've been sent a malicious payload from an NSA server.

Although it appears to show a link between the Shadow Brokers hack and the NSA, The Intercept acknowledges its findings don't necessarily mean that the NSA itself was hacked. The code could have been stolen from third-party hackers, a possibility Edward Snowden alluded to on Monday.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.

Cyber-security experts were divided on the origin of the hacking code, which was leaked on Monday by another hacking group called calling itself the "Shadow Brokers." But The Intercept reported on Friday that a specific 16-character string found in a leaked NSA instruction manual also appears in the Shadow Brokers code.

The manual, a 31-page document entitled "FOXACID SOP for Operational Management," describes administrative tools for tracking surveillance targets, including a set of tags used to catalogue servers, according to The Intercept. The tags are used to trick Internet users into thinking they're browsing a safe website when in fact they've been sent a malicious payload from an NSA server.

Although it appears to show a link between the Shadow Brokers hack and the NSA, The Intercept acknowledges its findings don't necessarily mean that the NSA itself was hacked. The code could have been stolen from third-party hackers, a possibility Edward Snowden alluded to on Monday.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers | ICT Security-Sécurité PC et Internet | Scoop.it

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

Gust MEES's insight:

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare | ICT Security-Sécurité PC et Internet | Scoop.it
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

Gust MEES's insight:
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Fog of Cyberwar: Now theft and sabotage instead of just spying | #Cyberespionage #CyberSecurity

The Fog of Cyberwar: Now theft and sabotage instead of just spying | #Cyberespionage #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Staatstrojaner Regin von NSA entwickelt

Staatstrojaner Regin von NSA entwickelt | ICT Security-Sécurité PC et Internet | Scoop.it
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon | ICT Security-Sécurité PC et Internet | Scoop.it
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
Scoop.it!

La NSA prépare les États-Unis à la cyberguerre | CyberWar | CyberSecurity

La NSA prépare les États-Unis à la cyberguerre | CyberWar | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
L'Agence nationale de sécurité américaine (NSA) entraîne ses hackers au combat cybernétique, d'après des documents étudiés par Der Spiegel.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
L'Agence nationale de sécurité américaine (NSA) entraîne ses hackers au combat cybernétique, d'après des documents étudiés par Der Spiegel.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Cyber War Will Use Internet Connected Devices as Weapons Platform; Your Home is the Battlefield | IoT

NSA Cyber War Will Use Internet Connected Devices as Weapons Platform; Your Home is the Battlefield | IoT | ICT Security-Sécurité PC et Internet | Scoop.it

World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970 New Snowden documents recently reveale...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970 New Snowden documents recently reveale...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | CyberSecurity

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and tapping into 'unwitting data mules' to pass along exfiltrated information.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and tapping into 'unwitting data mules' to pass along exfiltrated information.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: USA legen iranische Computer lahm | #CyberSecurity 

Cyberwar: USA legen iranische Computer lahm | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it

Die USA haben ein iranisches Militärsystem gehackt und stillgelegt. Das berichten US-Medien. Der Iran wiederum setze bei seinen IT-Angriffen auf Täuschung.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:

Die USA haben ein iranisches Militärsystem gehackt und stillgelegt. Das berichten US-Medien. Der Iran wiederum setze bei seinen IT-Angriffen auf Täuschung.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

https://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: A guide to the frightening future of online conflict | #CyberSecurity 

Cyberwar: A guide to the frightening future of online conflict | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
What is cyberwar?

At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.

What does cyberwarfare look like?

Cyberwar is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.


Governments and nation states are now officially training for cyberwarfare: An inside look

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and TechRepublic takes you inside.

Read More

Governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:
What is cyberwar?

At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.

What does cyberwarfare look like?

Cyberwar is still an emerging concept, but many experts are concerned that it is likely to be a significant component of any future conflicts. As well as troops using conventional weapons like guns and missiles, future wars will also be fought by hackers using computer code to attack an enemy's infrastructure.


Governments and nation states are now officially training for cyberwarfare: An inside look

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and TechRepublic takes you inside.

Read More

Governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker-Angriff auf das Internet an sich: Probt ein Staat den Cyberkrieg? | #CyberSecurity #CyberWar 

Hacker-Angriff auf das Internet an sich: Probt ein Staat den Cyberkrieg? | #CyberSecurity #CyberWar  | ICT Security-Sécurité PC et Internet | Scoop.it
Ohne das Internet geht heute fast nichts mehr, nahezu alles hängt irgendwie am Netz. Private, geschäftliche und auch staatliche Kommunikation ist ohne das World Wide Web beinahe undenkbar geworden. Aber auch Straßenverkehr, Handel und Infrastruktur sind ohne das Internet völlig lahmgelegt. Das Internet ist für das Funktionieren eines Landes genauso essenziell wichtig wie das Strom- oder Straßennetz. Und damit ist es ein taktisches Ziel in potenziellen Kriegen. Genau darauf scheint sich ein unbekannter Staat nun intensiv vorzubereiten.


Davor warnt der renommierte Sicherheitsforscher Bruce Schneier. In einem Eintrag des Sicherheitsblogs "Lawfare Blog" berichtet der vom "Economist" schon als "Sicherheits-Guru" gerühmte Schneier über mysteriöse Angriffe auf die Grundpfeiler des Internets an sich. Eine ganze Reihe von sicherheitsrelevanten Firmen und Webseiten sei in den letzten beiden Jahren Opfer gezielter Attacken geworden, erklärt Schneier. Als hätte jemand vor, die Infrastruktur des Internets lahmzulegen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

Gust MEES's insight:
Ohne das Internet geht heute fast nichts mehr, nahezu alles hängt irgendwie am Netz. Private, geschäftliche und auch staatliche Kommunikation ist ohne das World Wide Web beinahe undenkbar geworden. Aber auch Straßenverkehr, Handel und Infrastruktur sind ohne das Internet völlig lahmgelegt. Das Internet ist für das Funktionieren eines Landes genauso essenziell wichtig wie das Strom- oder Straßennetz. Und damit ist es ein taktisches Ziel in potenziellen Kriegen. Genau darauf scheint sich ein unbekannter Staat nun intensiv vorzubereiten.


Davor warnt der renommierte Sicherheitsforscher Bruce Schneier. In einem Eintrag des Sicherheitsblogs "Lawfare Blog" berichtet der vom "Economist" schon als "Sicherheits-Guru" gerühmte Schneier über mysteriöse Angriffe auf die Grundpfeiler des Internets an sich. Eine ganze Reihe von sicherheitsrelevanten Firmen und Webseiten sei in den letzten beiden Jahren Opfer gezielter Attacken geworden, erklärt Schneier. Als hätte jemand vor, die Infrastruktur des Internets lahmzulegen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Research

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA bloßgestellt: Hacker veröffentlichen geheime Überwachungstools | #CyberSecurity #Cyberwar #Cyberespionage 

NSA bloßgestellt: Hacker veröffentlichen geheime Überwachungstools | #CyberSecurity #Cyberwar #Cyberespionage  | ICT Security-Sécurité PC et Internet | Scoop.it
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.

 

 
Gust MEES's insight:
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar – The cyberspace is already a dangerous battlefield | #CyberWeapon #ICT 

Cyberwar – The cyberspace is already a dangerous battlefield | #CyberWeapon #ICT  | ICT Security-Sécurité PC et Internet | Scoop.it

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace.
The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace.

It is a virtual space crowded of nation-state actors and other threat actors that are threatening the security of Governments worldwide, and the situation is likely to get much worse.

At the recent NATO Warsaw Summit in July, the Alliance recognised the cyberspace as “a domain of operations in which Nato must defend itself as effectively as it does in the air, on land, and at sea”.

Kenneth Geers, a senior research scientist with security firm Comodo, speaking at the BlackHat USA security conference declared that the cyberwar is a real and present danger.

“There is no question cyberwar exists,” he says. “Whether it rises to the level of weapons of mass disruption is another question. We don’t have a decisive answer yet.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Gust MEES's insight:

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace.
The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace.

It is a virtual space crowded of nation-state actors and other threat actors that are threatening the security of Governments worldwide, and the situation is likely to get much worse.

At the recent NATO Warsaw Summit in July, the Alliance recognised the cyberspace as “a domain of operations in which Nato must defend itself as effectively as it does in the air, on land, and at sea”.

Kenneth Geers, a senior research scientist with security firm Comodo, speaking at the BlackHat USA security conference declared that the cyberwar is a real and present danger.

“There is no question cyberwar exists,” he says. “Whether it rises to the level of weapons of mass disruption is another question. We don’t have a decisive answer yet.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why the next World War will be a cyberwar first, and a shooting war second | ZDNet

Why the next World War will be a cyberwar first, and a shooting war second | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
Opinion: The US already has lost the first battles, and may not have the national will to defend itself in the inevitable global conflict to come. David Gewirtz looks at the geopolitical implications of cyberwarfare.




Learn more:


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Opinion: The US already has lost the first battles, and may not have the national will to defend itself in the inevitable global conflict to come. David Gewirtz looks at the geopolitical implications of cyberwarfare.


Learn more:


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ | ICT Security-Sécurité PC et Internet | Scoop.it
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar | ICT Security-Sécurité PC et Internet | Scoop.it
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA: We're in YOUR BOTNET

NSA: We're in YOUR BOTNET | ICT Security-Sécurité PC et Internet | Scoop.it
Victims? More like SCAPEGOATS


The NSA quietly commandeered a botnet targeting US Defence agencies to attack other victims including Chinese and Vietnamese dissidents, Snowden documents reveal.


The allegation is among the latest in a cache of revelations dropped by Der Spiegel that revealed more about the spy agency.

The "Boxingrumble" botnet was detected targeting the Defence Department's Nonsecure Internet Protocol Router Network prompting NSA bods to redirect the attack to a server operated by the Tailored Access Operations unit.


A DNS spoofing attack tricked the botnet into treating the spies as trusted command and control agents. The NSA then used the bot's hooks into other victims to foist its own custom malware.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
Victims? More like SCAPEGOATS


The NSA quietly commandeered a botnet targeting US Defence agencies to attack other victims including Chinese and Vietnamese dissidents, Snowden documents reveal.


The allegation is among the latest in a cache of revelations dropped by Der Spiegel that revealed more about the spy agency.

The "Boxingrumble" botnet was detected targeting the Defence Department's Nonsecure Internet Protocol Router Network prompting NSA bods to redirect the attack to a server operated by the Tailored Access Operations unit.


A DNS spoofing attack tricked the botnet into treating the spies as trusted command and control agents. The NSA then used the bot's hooks into other victims to foist its own custom malware.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

The NSA not only creates, but also hijacks, malware with Quantumbot

The NSA not only creates, but also hijacks, malware with Quantumbot | ICT Security-Sécurité PC et Internet | Scoop.it
In addition to having its own digital arsenal, the National Security Agency also hijacks and repurposes third-party malware.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO

Gust MEES's insight:
In addition to having its own digital arsenal, the National Security Agency also hijacks and repurposes third-party malware.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.