STRATEGIC CYBERSECURITY NEWS

Cyberwarfare,Cyber Terrorism,Cybersecurity, Virtual Reality, Robots, Artificial Intelligence,Cyber Warriors, Cyber Crime, Cyber Terrorism, Cyber Intelligence,Cyberspace,Cyber Weapons,cyber diplomacy.

12 Aug 2012

Hacktivists and Open Source Warfare


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Search This Blog

Index

Total Pageviews

Popular Posts

  • Microsoft's Cloud Architecture in the Enterprise
    Brief Overview: The webinar will focus on three aspects of the emerging Cloud architecture solutions from Microsoft. Private Cloud solut...
  • Hybrid Warfare With Chinese Characteristics
    From Sun Tzu to Xi Jinping: Russia isn’t the only one who knows hybrid warfare. The Ukraine Crisis has caused a renewed interest in the con...
  • Stealth Falcon: New Malware from (Probably) the UAE
    1. Executive Summary This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call...
  • UK and US planning simulated cyber attacks on nuclear plants
    Britain and the US are collaborating to stage a simulation of a cyber attack on a nuclear power plant to test the resilience of the two c...
  • Germany is finalising legislation to shore up CNI cyber security
    Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatla...
  • Kaspersky Lab and ITU Research Reveals New Advanced Cyber Weapon
    Malicious new programme is actively being used in several countries Abingdon, UK, 28 May 2012 - Kaspersky Lab has announced the discover...
  • Journal of Sensitive Cyber Research and Engineering (JSCoRE)
    CALL FOR PAPERS Deadline : papers submitted by 31 January 2013 will be considered for publication in the first edition of the journal i...
  • How Russian cybercrime bosses crafted a ransomware empire out of an economic crisis
       
  • Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
    On May 6 and May 11, 2015, Unit 42 observed two targeted attacks, the first against the U.S. government and the second on a European media ...
  • Stuxnet cousin able to attack industrial control systems
    Today, extensive analysis on a new cyber espionage weapon dubbed ‘Gauss’ has been released, stating that the tool has capabilities to atta...

Translate

Search This Blog

Simple theme. Powered by Blogger.