27 Sep 2013

U.S. Says Iran Hacked Navy Computers

“U.S. officials said Iran hacked unclassified Navy computers in recent weeks in an escalation of Iranian cyberintrusions targeting the U.S. military. The allegations, coming as the Obama administration ramps up talks with Iran over its nuclear program, show the depth and complexity of long-standing tensions between Washington and Tehran. The

Read More
27 Sep 2013

(ISC)2 Congress 2013: East European Cybercriminals More of a Threat than East Asian

“Eastern European cybercriminals pose a greater threat than East Asian cybercriminals, claimed Tom Kellermann, VP of cybersecurity at Trend Micro. “ Source: Infosecurity – (ISC)2 Congress 2013: East European Cybercriminals More of a Threat than East Asian

Read More
27 Sep 2013

22 Hours: Average Time It Takes Malware Distributors To Exploit News

“Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact, the Research Team of Eleven, leading German e-mail security provider, now sees instances of criminals inventing ‘breaking news’ that appears to relate to high-profile current

Read More
27 Sep 2013

China’s ‘mini-Hong Kong’ eyes Internet access, shrugs off Shanghai threat

“A planned economic zone in southern China will allow full internet freedom, similar to what will be allowed in a proposed free trade zone in Shanghai, a senior official behind the project said on Thursday. China tightly controls the internet through a so-called Great Firewall, routinely deleting online postings and

Read More
26 Sep 2013

Data Broker Giants Hacked by ID Theft Service

“An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America’s largest consumer and business data aggregators, according to a seven-month investigation by KrebsOnSecurity.” Source: Data Broker Giants Hacked by ID Theft Service — Krebs

Read More
26 Sep 2013

Cybercriminals Use Reveton Ransomware for Bitcoin Mining

“Security researchers have come across a new version of the Reveton ransomware that’s designed to help cybercriminals make a profit by engaging in Bitcoin mining.” Source: Cybercriminals Use Reveton Ransomware for Bitcoin Mining

Read More
25 Sep 2013

Future cyber attacks could attack medical implants – or wage “psychological war” in virtual reality, Europol warns

“New hi-tech cyber attacks could threaten energy supplies, ‘wearable’ computers – and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA). Attacks in ‘virtual reality’ or ‘augmented reality’ could even be tailored to cause ‘psychological harm to

Read More
25 Sep 2013

U.S. military’s battlefield network in Afghanistan vulnerable to hackers

“The Pentagon’s main battlefield intelligence network in Afghanistan is vulnerable to hackers. The U.S. command in Kabul will cut it off from the military’s classified data files unless the Army fixes the defects in 60 days, according to an official memo.” Source: U.S. military’s battlefield network in Afghanistan vulnerable to

Read More
24 Sep 2013

Facebook, other banned sites to be open in China free trade zone

“Facebook, Twitter and other websites deemed sensitive and blocked by the Chinese government will be accessible in a planned free-trade zone (FTZ) in Shanghai, the South China Morning Post reported on Tuesday.” Source: Facebook, other banned sites to be open in China free trade zone: report | Reuters

Read More
23 Sep 2013

Operational Levels of Cyber Intelligence

Cyber intelligence is a complex, as yet undefined, multifaceted approach to framing, thinking about, and reacting to cyber adversarial activity. Many discussions emphasize the complexity of the cyber operational domain, the speed in which activity and operations take place, and the supposed inherent advantage of the attacker. By beginning to

Read More