Cyber War

Defining the qualities of cyber warfare

Defining the qualities of cyber warfare

Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.

Part Two: Duqu: father, son, or unholy ghost of Stuxnet?

Part Two: Duqu: father, son, or unholy ghost of Stuxnet?

Three U.S. Air Force information security experts, independent of their role in the military, studied the Duqu trojan, and you might be surprised by what they found. This is the second article in a two-part series that examines the sophisticated threat that everyone is talking about.

U.S. may have had inside knowledge of Libya radar bugs


News that the U.S. was considering a cyberattack to disable Libya's radar system may indicate knowledge of the same flaws Israel is believed to have used against Syria in 2007.

Paper highlights dangers of "inflating" cyberthreats


If the policy discussion around digital risks continues on its current course, the U.S. government may make some unwise decisions, according to a new academic research paper.

Has cyberwar happened? Interview with Mikko Hypponen, chief research officer of F-Secure


Mikko Hypponen, chief research officer of F-Secure, distinguishes among cyberwar and everything else, explains why the anti-virus industry failed when it came to detecting and preventing Stuxnet, discusses why critical infrastructure is at major risk to attack and reveals how he tracked down the authors of the first PC virus, which turns 25 years old this year. SC Magazine Executive Editor Dan Kaplan spoke with Hypponen following a media luncheon at the RSA Conference in San Francisco.

RSA Conference 2011: Terrorist organizations pose greatest cyberthreat


More than 100 foreign intelligence agencies have attempted to penetrate U.S. government defense networks, a Pentagon official said Tuesday at the 2011 RSA Conference in San Franscisco.

Cyberwar PsyOps: #Tunisia, #Egypt: Regimes Deposed by Twitter?

What role did private corporations and social media play in the regime change in Egypt and Tunisia?

Cyberwar PsyOps: Speak to Tweet

Google and Twitter provided innovative technology to enable #Egypt Tweets by voice. With the next layer of communication being the cellular phone, will Egypt shut down its phone system as well as internet?

Stuxnet, Farewell Dossier, Cyberwar and WikiLeaks Wrapup

Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.

Cyberwarfare Roshambo: th3j35t3r Profiled

One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.

Hired guns: Cyberwar PsyOps, Part 2

Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?

Hired guns: Cyberwar PsyOps, Part 1

What is the balance of privacy and free speech in a globalized information society? Will Saudi Arabia and other Middle East countries with restrictive policies be next in line for cyber attacks attributed to Operation Payback?

Hired Guns: What's in the name CyberPMC or CyberPSC?

In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?

Hired guns: Cyberwarfare and cyber-mercs

Whether the trend of privatizing military resources is good or not, it is already happening.

WikiLeaks attacks fail to meet definition of cyberwar


Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.

Future crimes: Are WikiLeaks, piracy and malware related?

Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.

Stuxnet's persistent legacy: Cybersecurity is blended security

Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari's recent assassination? What are the game-changing physical security considerations for chief information officers?

Stuxnet: Precursor to kinetic warfare?

Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.

Stuxnet: Lessons not yet learned?

According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.

Fending off cyberwar attacks

Fending off cyberwar attacks


Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'

Cyberespionage: Raids from afar

Cyberespionage: Raids from afar


The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.

National security expert to address threat of cyberwar

National security expert to address threat of cyberwar


The cyberwar battlefield exists in every part of society in which we live and work, according to a national security expert who will be speaking at the third annual SC World Congress.

Stuxnet: Cyber warfare's game-changer, Part Two

Is Stuxnet cyber warfare's Trinity Test?

Stuxnet: Cyber warfare's game-changer, Part One

Is Stuxnet cyber warfare's Trinity Test?

From sci-fi to Stuxnet: Exploding gas pipelines and the Farewell Dossier

Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.

Sign up to our newsletters