Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.
Three U.S. Air Force information security experts, independent of their role in the military, studied the Duqu trojan, and you might be surprised by what they found. This is the second article in a two-part series that examines the sophisticated threat that everyone is talking about.
News that the U.S. was considering a cyberattack to disable Libya's radar system may indicate knowledge of the same flaws Israel is believed to have used against Syria in 2007.
If the policy discussion around digital risks continues on its current course, the U.S. government may make some unwise decisions, according to a new academic research paper.
Mikko Hypponen, chief research officer of F-Secure, distinguishes among cyberwar and everything else, explains why the anti-virus industry failed when it came to detecting and preventing Stuxnet, discusses why critical infrastructure is at major risk to attack and reveals how he tracked down the authors of the first PC virus, which turns 25 years old this year. SC Magazine Executive Editor Dan Kaplan spoke with Hypponen following a media luncheon at the RSA Conference in San Francisco.
More than 100 foreign intelligence agencies have attempted to penetrate U.S. government defense networks, a Pentagon official said Tuesday at the 2011 RSA Conference in San Franscisco.
What role did private corporations and social media play in the regime change in Egypt and Tunisia?
Google and Twitter provided innovative technology to enable #Egypt Tweets by voice. With the next layer of communication being the cellular phone, will Egypt shut down its phone system as well as internet?
Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
What is the balance of privacy and free speech in a globalized information society? Will Saudi Arabia and other Middle East countries with restrictive policies be next in line for cyber attacks attributed to Operation Payback?
In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
Whether the trend of privatizing military resources is good or not, it is already happening.
Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.
Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari's recent assassination? What are the game-changing physical security considerations for chief information officers?
Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.
According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.
Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'
The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
The cyberwar battlefield exists in every part of society in which we live and work, according to a national security expert who will be speaking at the third annual SC World Congress.
Is Stuxnet cyber warfare's Trinity Test?
Is Stuxnet cyber warfare's Trinity Test?
Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes