26 Sep 2013

Cybercriminals Use Reveton Ransomware for Bitcoin Mining

“Security researchers have come across a new version of the Reveton ransomware that’s designed to help cybercriminals make a profit by engaging in Bitcoin mining.” Source: Cybercriminals Use Reveton Ransomware for Bitcoin Mining

Read More
25 Sep 2013

Future cyber attacks could attack medical implants – or wage “psychological war” in virtual reality, Europol warns

“New hi-tech cyber attacks could threaten energy supplies, ‘wearable’ computers – and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA). Attacks in ‘virtual reality’ or ‘augmented reality’ could even be tailored to cause ‘psychological harm to

Read More
25 Sep 2013

U.S. military’s battlefield network in Afghanistan vulnerable to hackers

“The Pentagon’s main battlefield intelligence network in Afghanistan is vulnerable to hackers. The U.S. command in Kabul will cut it off from the military’s classified data files unless the Army fixes the defects in 60 days, according to an official memo.” Source: U.S. military’s battlefield network in Afghanistan vulnerable to

Read More
24 Sep 2013

Facebook, other banned sites to be open in China free trade zone

“Facebook, Twitter and other websites deemed sensitive and blocked by the Chinese government will be accessible in a planned free-trade zone (FTZ) in Shanghai, the South China Morning Post reported on Tuesday.” Source: Facebook, other banned sites to be open in China free trade zone: report | Reuters

Read More
23 Sep 2013

Operational Levels of Cyber Intelligence

Cyber intelligence is a complex, as yet undefined, multifaceted approach to framing, thinking about, and reacting to cyber adversarial activity. Many discussions emphasize the complexity of the cyber operational domain, the speed in which activity and operations take place, and the supposed inherent advantage of the attacker. By beginning to

Read More
22 Sep 2013

Hacking U.S. Secrets, China Pushes for Drones

“For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.” Source:Hacking U.S. Secrets, China Pushes

Read More
21 Sep 2013

Chinese Military Capable of Jamming U.S. Communications System

“China’s military is using stolen U.S. military secrets obtained from a convicted spy to defeat a high-technology communications system used in joint warfighting, combined arms warfare, and missile defenses, according to U.S. officials. The disclosure that China has the capability of jamming the Joint Tactical Information Distribution System, or JTIDS,

Read More
20 Sep 2013

Eight arrested over $2 million e-theft from Barclays in London

“British police said on Friday they have arrested eight men after a gang stole $2.09 million from Barclays bank by taking control of a branch computer system. They are accused of a theft in April, when a man purporting to be an IT engineer arrived at a Barclays branch in

Read More
19 Sep 2013

New Mac Trojan Discovered Related to Syria

“A new Mac Trojan has been discovered that creates a backdoor on an affected user’s machine. It was found on VirusTotal, sent by a user in Belarus. At the time of writing, the Command and Control (C&C) server is down and no longer sending commands to affected users. This appears

Read More
18 Sep 2013

Facebook, Twitter blocked again in Iran

“Many Iranian Internet users were disappointed Tuesday morning to discover that Facebook and Twitter were blocked once again after a short-lived spurt of unfettered access Monday.” Source: Facebook, Twitter blocked again in Iran

Read More