25 Jul 2013

Tactical military satellite comms need hardening, says CSBA study

“Increasing military use of satellite communication for tactical operations means the Defense Department should create a new tier of protected space systems, says the Center for Strategic and Budgetary Assessments’s Todd Harrison. Currently the Pentagon has a binary military satellite communications architecture – those satellites with a full range of

Read More
24 Jul 2013

Digital Carjackers Show Forbes How To Crash Cars, Fuel Michael Hastings Conspiracy Theories

“The trio plus an unseen camera person test the 3,500 pound Ford Escape in the weedy parking lot of a South Bend, Indiana strip mall. With Greenberg at the wheel, the digital carjackers mess with the reporter’s mind by making his dashboard show more gas in the car than he

Read More
23 Jul 2013

Viber Attacked By Syrian Electronic Army

“Viber has confirmed a situation earlier this morning in which Viber appeared to have been hacked by the Syrian Electronic Army (a pro-government group of computer hackers aligned with Syrian President Bashar al-Assad). AppleSpot originally reported on the hack that affected the Viber support page, though it was unclear the

Read More
23 Jul 2013

Cybercrime said to cost US $140 billion, radically less than previous estimates

“The CSIS report said that it had revised McAfee’s methods for calculating the impact of cybercrime, but that its numbers were still not definitive, which is why the range between $20 billion and $140 billion is so broad. One of the major reasons McAfee’s 2009 report estimated the cost of

Read More
23 Jul 2013

The Challenge Posed by Chinese Psychological Warfare

“Beijing hopes to win future conflicts without firing a shot. How? By using psychological warfare to manipulate both a nation’s leaders and its populace—affecting the thought processes and cognitive frameworks of allies and opponents alike. Indeed, the PRC’s psychological warfare operations are already underway despite the fact that there is

Read More
23 Jul 2013

How Would the U.S. Respond to a Nightmare Cyber Attack?: Scientific American

“To date, intentional computer-based attacks that have direct physical impacts have been few and far between, so far as we know. That doesn’t mean these scenarios couldn’t happen in real life, or that there aren’t real and serious vulnerabilities in the country’s critical infrastructure networks. There is a perception that

Read More
23 Jul 2013

Indonesia Joins China as Cyber-Attack Powerhouse

“Indonesia isn’t known as an epicenter for hacking, but the Southeast Asian country was the source of 21 percent of the world’s cyber-attack traffic in the first quarter of this year, according to a report by Akamai Technologies to be published later today. The type of activity observed in Indonesia

Read More
22 Jul 2013

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones

“Smartphones are susceptible to malware and carriers have enabled NSA snooping, but the prevailing wisdom has it there’s still one part of your mobile phone that remains safe and un-hackable: your SIM card. Yet after three years of research, German cryptographer Karsten Nohl claims to have finally found encryption and software flaws that

Read More
22 Jul 2013

UN group to issue warning about mobile phone hacking

A U.N. group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could let hackers attack at least half a billion phones.The bug, discovered by a German firm, lets hackers gain remote control and clone certain types of mobile SIM

Read More
21 Jul 2013

Apple acknowledges that developer site was hacked

“In an email to developers on Sunday, Apple acknowledged that the reason behind the lengthy developer site outage was because of a hacking attempt on Thursday. Apple said that personal information was not accessed, however it is double checking to make sure that developer names, emails and physical addresses were

Read More