STRATEGIC CYBERSECURITY NEWS

Cyberwarfare,Cyber Terrorism,Cybersecurity, Virtual Reality, Robots, Artificial Intelligence,Cyber Warriors, Cyber Crime, Cyber Terrorism, Cyber Intelligence,Cyberspace,Cyber Weapons,cyber diplomacy.

23 Dec 2012

National Security in the 21st Century


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Search This Blog

Index

Total Pageviews

Popular Posts

  • Nemucod malware spreads ransomware Teslacrypt around the world
    From time to time, some malware propagation campaigns reach high propagation levels in one or several countries during a few days. In those...
  • Stealth Falcon: New Malware from (Probably) the UAE
    1. Executive Summary This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call...
  • “Cyber-Humans: Our Future with Machines”
    Dr Woodrow (Woody) Barfield has published over 350 articles and publications in the areas of computer science, engineering and law. He wa...
  • Neighborhood Watch: Identifying Early Indicators of the Central Bank of Bangladesh Heist
    As a threat intelligence analyst , the largest impact you make may be the observation of early indicators of compromise (IOCs) on other c...
  • Interconnection of Gauss with Stuxnet, Duqu & Flame
    Last week, reports of a new malware named Gauss emerged, a complex threat that has attracted a lot of media attention due to its links to ...
  • Kaspersky Lab Identifies Operation “Red October,” an Advanced Cyber-Espionage Campaign Targeting Diplomatic and Government Institutions Worldwide
    Attackers Created Unique, Highly-Flexible Malware to Steal Data and Geopolitical Intelligence from Target Victims’ Computer Syst...
  • Unusual cyber attack targets continue: This time Ethiopia
    « Older: Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu Unusual cyber attack targets continue...
  • Petya ransomware encrypts files, disks, locks users out of computers
    A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot...
  • The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others.
    According to the German weekly Der Spiegel , the German intelligence Agency BND ( Bundesnachrichtendienst ) has reportedly been spying on ...
  • The Cybersecurity Act of 2012: Are We Smarter Than a Fifth Grader?
    Remember the FOX game show from a few years ago, "Are You Smarter Than a Fifth Grader?" Well, the Senate has its own version of ...

Translate

Search This Blog

Simple theme. Powered by Blogger.