Posts Tagged ‘ cyber warfare ’

Estonia: NATO to hold major cyber defense drill

April 22, 2015
posted by

Albany Democrat-Herald    

"About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO's efforts to upgrade its capability to counter potentially debilitating hacker attacks. Teams from 16 nations will take part in the Locked Shields 2015 exercise at NATO's cyberdefense center in Tallinn. The annual drill is one of the largest of its kind." (04/21/15)

http://tinyurl.com/kwfswtz  

No Comments »

Sony hack: Wikileaks publishes more than 30,000 documents

April 17, 2015
posted by

Wikileaks The Hollywood Reporter    

"On Thursday, WikiLeaks published more than 30,000 documents and 170,000 emails from Sony Pictures, obtained from a hack that has been sourced to North Korea in anticipation of the studio's release of The Interview. The Julian Assange website noted in a press release that 'whilst some stories came out at the time, the original archives, which were not searchable, were removed before the public and journalists were able to do more than scratch the surface.' In a move that could trigger another round of embarrassing prying into Sony affairs, WikiLeaks has now published those documents in a searchable format." (04/16/15)

http://tinyurl.com/pyh7ea4  

No Comments »

France: Television network hacked by Islamic State group

April 10, 2015
posted by

Christian Science Monitor Christian Science Monitor    

"Hackers claiming allegiance to the Islamic State group seized control of a global French television network, simultaneously blacking out 11 channels and taking over the network's website and social media accounts. The attack appeared to be an unprecedented step in the extremist group's information warfare tactics. The hackers briefly cut transmission of 11 channels belonging to TV5 Monde and took over its websites and social media accounts starting Wednesday night. The channel's director, Yves Bigot, said the attack was continuing Thursday. He told RTL radio that the network has restored its signal but can only broadcast recorded programs." (04/09/15)

http://tinyurl.com/o5kk4od  

No Comments »

Report: Russia behind 2014 attack on White House computer system

April 8, 2015
posted by

Fox News Fox News    

"Russian hackers last year were able to breach a White House computer system after a successful cyber-attack on the State Department, a news report said Tuesday. The report by CNN says the hackers were able to get sensitive information, including non-public details about President Obama's schedule. White House officials responded by saying the attack last year was made public and that no classified information was compromised. And they declined to comment on CNN's assertion that Russia was the culprit." (04/07/15)

http://tinyurl.com/nand9kc  

No Comments »

Hackers hit Israeli websites after Anonymous threats

April 7, 2015
posted by

USA Today USA Today    

"Pro-Palestinian [Arab] hackers disrupted Israeli websites on Tuesday, following threats from the Anonymous hacking collective that it would carry out an 'electronic Holocaust,' though Israeli cyber experts said the coordinated attacks caused little damage. The hacking campaign, which has taken place every April 7 since 2013, is meant to be in protest of Israeli policies toward the Palestinian[ Arab]s. In 2013, the hackers first waged the coordinated campaign, dubbed OpIsrael, on the eve of Israel's annual Holocaust remembrance day." (04/07/15)

http://tinyurl.com/m28jv8k  

No Comments »

Security theater: Obama claims “national emergency,” issues sanctions decree

April 1, 2015
posted by

ABC News ABC News    

"Cyber-attacks against the U.S. have become so bad that President Obama today declared it a 'national emergency' and announced the first ever sanctions program designed specifically to go after foreign hackers. ... The order calls for a sanctions program not unlike those used in counter-proliferation or counter-terrorism programs that can target 'individuals or entities that engage in significant malicious cyber-enabled activities' that harm the U.S. -- including attacks on critical infrastructure, denial of service attacks or cyber espionage, according to the White House." (04/01/15)

http://abcn.ws/1IQGn2H  

No Comments »

Cyber Armageddon is a myth

March 23, 2015
posted by

CounterPunch CounterPunch
by Bill Blunden  

"Over the past several years mainstream news outlets have conveyed a litany of cyber doomsday scenarios on behalf of ostensibly credible public officials. Breathless intimations of the End Times. The stuff of Hollywood screenplays. However a recent statement by the U.S. intelligence community pours a bucket of cold water over all of this. Yes, Virginia, It turns out that all the talk of cyber Armageddon was a load of bunkum. An elaborate propaganda campaign which only serves as a pretext to sacrifice our civil liberties and channel an ocean of cash to the defense industry." (03/23/15)

http://www.counterpunch.org/2015/03/23/cyber-armageddon-is-a-myth/  

No Comments »

CA: LAPD members get “doxxed” after shooting of homeless man

March 4, 2015
posted by

CBS News CBS Los Angeles    

"After the fatal shooting of a homeless man on Skid Row, the LAPD confirms at least two members of the force are victims of what authorities called 'doxxing.' Someone posted the officers' private information online, including names, addresses and details about their kids' schools. CBS2/KCAL9 is not reporting that information. The LAPD would not confirm if the officers targeted were involved in Sunday's fatal shooting at Union Rescue Mission after a struggle during which, officers say, the shooting victim went for one of their guns." (03/03/15)

http://tinyurl.com/leltexj  

No Comments »

A pretext for cyber COINTELPRO?

February 26, 2015
posted by

CounterPunch
by Eric Draitser  

"In its ever expanding war against Syria, now under the broader pretext of 'fighting ISIS,' the US Government has employed a variety of tactics. From arming terrorists whom it dishonestly labels 'moderates,' to encouraging Turkey and Jordan to host jihadi training centers, to the CIA working with the Muslim Brotherhood to funnel weapons and fighters into Syria, the US and its allies have demonstrated the multi-faceted approach they're taking to fighting ISIS, extremism, and the Syrian Government. The war, once believed to be relegated solely to Syria and Iraq, has now been broadened to a regional, and indeed, a global war with no geographical boundaries or time limits. And now, the Obama administration has announced that its war will also be waged in cyberspace. " (02/26/15)

http://www.counterpunch.org/2015/02/26/a-pretext-for-cyber-cointelpro/  

No Comments »

Attackers protesting Superfish debacle hijack Lenovo e-mail, spoof website

February 26, 2015
posted by

Ars Technica Ars Technica    

"Almost a week after revelations surfaced that Lenovo preinstalled dangerous ad-injecting software on consumer laptops, attackers took complete control of the company's valuable Lenovo.com domain name, a coup that allowed them to intercept the PC maker's e-mail and impersonate its Web pages. ... People who visited the site during the attack saw a slide show that mainly featured a girl or young woman with dark hair sitting in what appeared to be a bedroom. When clicked, the images led to a Twitter account that sharply criticized Lenovo for preloading some of its computers with ad-injecting software that completely broke encrypted connections to HTTPS-protected websites." (02/25/15)

http://tinyurl.com/l7ekoze  

No Comments »

EU police operation takes down malicious computer network

February 25, 2015
posted by

ABC News ABC News    

"European police have taken down a computer network that used malicious software to infect more than 3 million computers worldwide and steal personal data, banking details and passwords. European Union police coordination agency Europol said in a statement Wednesday that the network, known as the Ramnit botnet, was dismantled in an operation Tuesday by cybercrime experts coordinated from Europol's headquarters in The Hague." (02/25/15)

http://tinyurl.com/kotg2ut  

No Comments »

The US government’s cyber-go-round

February 19, 2015
posted by

Cato Institute
by Patrick G Eddington  

"Official Washington's response to perceived major crises generally follows a pattern: a serious security threat is proclaimed that requires vast new resources and legal authorities to defeat. A 'czar' may be appointed to help coordinate the federal response, or even an entirely new military command will be established to meet the challenge. When those efforts fail, a reorganization of the national security apparatus will be the next proposed step. The end result is usually more bureaucratic and policy failure. The U.S. government has effectively done all of these things in response to the increase in online threats, hacking, and 'cyber warfare.'" (02/17/15)

http://tinyurl.com/obzzh8m  

No Comments »

Newsweek Twitter, others hacked by CyberCaliphate

February 10, 2015
posted by

CNN CNN    

"CyberCaliphate, a group claiming ties to ISIS, appears to have hacked multiple twitter accounts and the breaking news system of a Maryland television station. The Twitter feeds of Newsweek and veterans' group Military Spouses of Strength were hacked Tuesday morning by a group identifying itself as CyberCaliphate, the same organization that was confirmed to have hacked the twitter account for U.S. Central Command earlier this year. According to Newsweek, IBTimes.com, the website of the International Business Times, was also hacked." (02/10/15)

http://tinyurl.com/kjd9zv8  

No Comments »

Anthem hacked in “sophisticated” attack on customer data

February 5, 2015
posted by

Bloomberg    

"Anthem Inc., the second biggest U.S. health insurer by market value, said hackers obtained data on tens of millions of current and former customers and employees in a sophisticated attack that has led to a Federal Bureau of Investigation probe. The information compromised includes names, birthdates, Social Security numbers, street and e-mail addresses and employee data, including income, Anthem said in an e-mail. The company will notify customers who were affected and provide credit and identify-theft monitoring services for free, Chief Executive Officer Joseph Swedish said in a letter to members." (02/04/15)

http://tinyurl.com/ppoflau  

No Comments »

Western spy agencies secretly rely on hackers for intel and expertise

February 4, 2015
posted by

Glenn Greenwald The Intercept
by Glenn Greenwald  

"The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. 'Hackers are stealing the emails of some of our targets ... by collecting the hackers' 'take,' we ... get access to the emails themselves,' reads one top secret 2010 National Security Agency document." (02/04/15)

http://tinyurl.com/oykysln  

No Comments »

Kim Dotcom’s Mega launches Skype competitor MegaChat

January 22, 2015
posted by

CNet News CNet News    

"The controversial Mega, a storage locker for online content, on Thursday launched MegaChat, a communication platform designed to compete with the likes of Skype. According to Mega founder Kim Dotcom, the new platform allows users to engage in end-to-end encrypted video and audio communication. ... Given the existing controversy surrounding Kim Dotcom, it may not be long before MegaChat faces the onslaught of governments fearing that criminals will turn to the company's new platform to communicate privately. For his part, Dotcom didn't shy away from that potential onslaught, as he thanked his development team in a tweet Thursday 'for conspiring to provide secure and private file storage and communications solutions to the world.'" (01/22/15)

http://tinyurl.com/pfooy94  

No Comments »

Officials: NSA hacked North Korea before North Korea hacked Sony

January 19, 2015
posted by

New York Times    

"The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth. Spurred by growing concern about North Korea’s maturing capabilities, the American spy agency drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies, according to former United States and foreign officials, computer experts later briefed on the operations and a newly disclosed N.S.A. document." (01/18/1)

http://tinyurl.com/m8z8egg  

No Comments »

The myth of a secure military

January 15, 2015
posted by

Robert P. Murphy Free Advice
by Robert P Murphy  

"On NPR today they were talking about cybersecurity. The host made a throwaway remark along the lines that with private businesses, you couldn't expect a full-throated response to the threats his expert guests were discussing, because they responded to the profit motive and it 'wasn't like Los Alamos.' Here the host was referring to the famous lab where physicists and other scientists worked on the atomic bomb during World War II, and then continued to work on nuclear weaponry. His point, of course, was that the military engaged in state-of-the-art security to protect such critical secrets, whereas you couldn't expect Visa to do the same thing for its customers. ... The Soviets did steal the secrets to the atomic bomb, and one of their spies was at Los Alamos." (01/15/15)

http://tinyurl.com/k4grdh5  

No Comments »

Security theater: France hit by “unprecedented” wave of cyber attacks

January 15, 2015
posted by

CBS News CBS News    

"Hackers have targeted about 19,000 French websites since a rampage by Islamic extremists left 20 dead last week, a top French cyberdefense official said Thursday .... 'What's new, what's important, is that this is 19,000 sites -- that's never been seen before,' [Adm. Arnaud Coustilliere, head of cyberdefense for the French military] said. 'This is the first time that a country has been faced with such a large wave' of cyberattacks. ... Military authorities have launched round-the-clock surveillance to protect the government sites still coming under attack." [editor's note: On the one hand, I am skeptical of screeches from the usual suspects that the Charlie Hebdo attacks were a "false flag." On the other hand, I suspect that the cyberattack claim is 100% bullshit fabricated to keep up the scare and help justify the developing wave of added state authoritarianism that the Hebdo attacks are being used to put over - TLK] (01/15/15)

http://tinyurl.com/kwxjwm9  

No Comments »

Arrgh! Pirates rule the high IPs!

January 14, 2015
posted by

Students For Liberty Students For Liberty
by Elias Garcia  

"Let me be the first to lament the ‘fall’ of The Pirate Bay, a service that, statistically speaking, there’s a decent chance you use. On December 9th, Swedish officials decided to raid the facilities that contained the servers that TPB was hosted on, effectively shutting the site down. While TPB has remained ‘offline,’ it’s search engine and catalog no longer available to those who access the site, it’s probably a good time to realize that this is not the end. Nor has it ever been. Or will be." (01/13/15)

http://tinyurl.com/pdwp6yw  

No Comments »

Security theater: Obama to push law protecting companies from liability for assisting government spies

January 14, 2015
posted by

United Press International    

"President Barack Obama plans to announce legislation to protect companies from lawsuits for sharing data with the government for help in preventing cyberattacks. ... Critics of legislation of this type are concerned that it allows the government too much access to people's data with immunity from any legal action." (01/13/15)

http://tinyurl.com/nfwbdx8  

No Comments »

Snowden: US has put too much emphasis on cyber-offense, needs defense

January 9, 2015
posted by

Ars Technica Ars Technica    

"In an on-camera interview with James Bamford for an upcoming episode of PBS'[s] NOVA, Edward Snowden warned that the US Department of Defense and National Security Agency have over-emphasized the development of offensive network capabilities, placing the US'[s] own systems at greater risk. With other countries now developing offensive capabilities that approach those of the NSA and the US Cyber Command, Snowden believes the US has much more at stake." (01/08/15)

http://tinyurl.com/n4fetrm  

No Comments »

Bitstamp claims its bitcoins are secure after attack forces exchange shutdown

January 5, 2015
posted by

Network World    

"Bitstamp reassured customers that their bitcoins are safe after a weekend hack forced the exchange to shut down on Monday. 'As a security precaution against compromises Bitstamp only maintains a small fraction of customer bitcoins in online systems. Bitstamp maintains more than enough offline reserves to cover the compromised bitcoins,' the exchange said in a statement on its website. The hack, which took place Sunday, targeted one of Bitstamp's operational or hot wallets, the statement said. Hot wallets are connected to the Internet and used to immediately exchange the virtual currency. Bitstamp hasn't revealed details of the attack nor whether bitcoins were stolen." (01/05/15)

http://tinyurl.com/ojv2xyp  

No Comments »

Report: Chick-fil-A faces credit card breach

January 2, 2015
posted by

Atlanta Business Chronicle    

"Chick-fil-A Inc. may be the latest victim of a major credit card breach. Krebs on Security reported Dec. 30 'sources at several U.S. financial institutions say they have traced a pattern of credit card fraud back to accounts that all were used at different Chick-fil-A fast food restaurants around the country.' ... Chick-fil-A operates 1,850 locations in 41 states and Washington, D.C." (12/31/14)

http://tinyurl.com/kgf2539  

No Comments »

The Sony hack fraud

December 31, 2014
posted by

Justin Raimondo Antiwar.com
by Justin Raimondo  

"In short, the technical 'evidence' supporting the narrative woven by those geniuses in Washington is rubbish. Yet they are still sticking by it -- because, after all, government officials can never admit they were wrong. Especially since the President of the United States went out on a very thin limb and vowed to retaliate against North Korea -- a pledge apparently carried out a few days ago. Two cyber-attacks took down the Hermit Kingdom's pitiably small Internet structure, which consists of about as many IP addresses as can be found in a single block in Brooklyn. USA! USA! There's just one problem: a rising chorus of independent cyber-security professionals are virtually unanimous in the opinion that the Obama administration muffed it. The North Koreans, they say, didn't hack Sony -- and our 'retaliation' is looking more and more like unprovoked aggression." (12/31/14)

http://original.antiwar.com/justin/2014/12/30/the-sony-hack-fraud/  

No Comments »

Our Sponsors





Making a living off your Drupal site?

Drupal Managed Hosting

Fed up with Maintenance and Hosting companies?