Iran's Revolutionary Guard Corps (IRGC) launched a spate of cyberattacks targeting the email and social media accounts of Obama administration personnel in recent weeks.
A Chinese military documentary appears to offer a rare glimpse of an actual state-sponsored hacking tool being used to attack a U.S. website affiliated with the dissident Falun Gong religious movement.
At any rate, it deserves to be taken seriously...
What role did private corporations and social media play in the regime change in Egypt and Tunisia?
Google and Twitter provided innovative technology to enable #Egypt Tweets by voice. With the next layer of communication being the cellular phone, will Egypt shut down its phone system as well as internet?
What cyberwar psychological operations are now being conducted by women? How can information businesses be adaptable for changes which may be trending in a new Middle East? Part four of a series.
#OpEgypt and #Jan25 lead in this cyberwarfare analysis on psychological operations using social media. The old-school mobile phone is now the instrument of real-time sitreps. Will cellular network technology be the next risk for state-sanctioned cyberwarfare? Part three of a series.
Refuting the recent downplay of cyberwarfare as a threat with well-thought analysis.
Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
What is the balance of privacy and free speech in a globalized information society? Will Saudi Arabia and other Middle East countries with restrictive policies be next in line for cyber attacks attributed to Operation Payback?
In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
Cyberwarfare is the boogeyman of 2011. If the risks are real, who holds responsibility for collapses of the power grid and communication networks?
Whether the trend of privatizing military resources is good or not, it is already happening.
Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari's recent assassination? What are the game-changing physical security considerations for chief information officers?
Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.
Stuxnet has radically changed the global perception of cyberwarfare leveraging internet-connected SCADA vulnerabilities of critical infrastructure. Will the lights stay on or are we in for trouble?
According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.
The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
Is Stuxnet cyber warfare's Trinity Test?
Is Stuxnet cyber warfare's Trinity Test?
Becoming part of a supply chain failure for nation-states willing to bypass embargo could lead to life-changing consequences.
The Stuxnet worm should serve as a wake-up call that cyberwarfare is a reality, experts said.
Is a sting merely legitimized social engineering? Why cops don't have to tell you they're cops - online or off.
IACS researcher says, Welcome to cyberwar
The person responsible for the "Here you have" email worm, which wreaked havoc last week on businesses across the United States, may be part of a cyber-jihad group wanting to hack into U.S. Army IT systems.
Whether or not we all believe in cyberwarfare, others on this blue-green world do.
A U.S. Senate committee unanimously passed a cybersecurity bill, which would grant the president emergency power over critical infrastructure networks.
Sign up to our newsletters
SC Magazine Articles
- Supreme Court hears first appeals case for exec convicted under CFAA
- Black SEO offered to cyber-criminals
- FBI investigates Russian hacker that stole billions of login credentials
- 5M affected in VTech breach; security concerns raised with popular holiday items
- Internet of malicious things: Yale home automation vulnerable