Cyberwarfare Roshambo: th3j35t3r Profiled
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
Cyberwarfare is the boogeyman of 2011. If the risks are real, who holds responsibility for collapses of the power grid and communication networks?
Whether the trend of privatizing military resources is good or not, it is already happening.
Five steps any size business can employ today to crush phishing risks.
Could a cargo ship’s thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
Were cybersecurity and Stuxnet involved with Iranian Prof. Shahriari’s recent assassination? What are the game-changing physical security considerations for chief information officers?
Was the delay of the Stuxnet worm cleanup the true motive behind the assassination of Iranian cyberwarfare and nuclear scientist Majid Shahriari? Was Wikileaks content responsible for the timing of the attack? Analysis follows.
Some low level criminal networks have profiles in everyday social networks. Would researching these profiles during cyber intrusion research risk tipping off the bad guys?