STRATEGIC CYBERSECURITY NEWS

Cyberwarfare,Cyber Terrorism,Cybersecurity, Virtual Reality, Robots, Artificial Intelligence,Cyber Warriors, Cyber Crime, Cyber Terrorism, Cyber Intelligence,Cyberspace,Cyber Weapons,cyber diplomacy.

11 Jan 2016

ISIS supporters launch online cyberwar magazine



Supporters of the Islamic State group have published the first issue of Kybernetiq, an online magazine intended to arm prospective jihadists with cyberwarfare knowledge.



As reported by the International Business Times, Kybernetiq was first distributed in a German language version via social media in December. In a preface attributed to the alias iMujahid, the magazine publishers stress hardware and software understanding to undermine "the West's technological and scientific progress." Article topics include securing communications and choosing alternative apps to avoid virtual surveillance by Intelligence Community agencies such as the National Security Agency.

Kybernetiq's authors have also encouraged the translation and dissemination of the magazine contents in other languages and digital forms, reinforcing the increasing role of channels such as Twitter in ISIS recruitment and organization efforts. This, in turn, has spurred counter-efforts by hacktivist collectives working to shut down ISIS propaganda platforms.

http://www.c4isrnet.com/story/military-tech/cyber/2016/01/08/isis-supporters-launch-online-cyberwar-magazine/78426724/

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Search This Blog

Index

Total Pageviews

Popular Posts

  • Stuxnet cousin able to attack industrial control systems
    Today, extensive analysis on a new cyber espionage weapon dubbed ‘Gauss’ has been released, stating that the tool has capabilities to atta...
  • Microsoft's Cloud Architecture in the Enterprise
    Brief Overview: The webinar will focus on three aspects of the emerging Cloud architecture solutions from Microsoft. Private Cloud solut...
  • Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
    Unit 42 has collected multiple spear phishing emails, weaponized document files, and payloads that targeted various offices of the Mongo...
  • Hybrid Warfare With Chinese Characteristics
    From Sun Tzu to Xi Jinping: Russia isn’t the only one who knows hybrid warfare. The Ukraine Crisis has caused a renewed interest in the con...
  • How Russian cybercrime bosses crafted a ransomware empire out of an economic crisis
       
  • Germany is finalising legislation to shore up CNI cyber security
    Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatla...
  • Kaspersky Lab and ITU Research Reveals New Advanced Cyber Weapon
    Malicious new programme is actively being used in several countries Abingdon, UK, 28 May 2012 - Kaspersky Lab has announced the discover...
  • Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
    On May 6 and May 11, 2015, Unit 42 observed two targeted attacks, the first against the U.S. government and the second on a European media ...
  • Journal of Sensitive Cyber Research and Engineering (JSCoRE)
    CALL FOR PAPERS Deadline : papers submitted by 31 January 2013 will be considered for publication in the first edition of the journal i...
  • Brain-Inspired IBM Supercomputer to Protect US Nuclear Weapons
       

Translate

Search This Blog

Simple theme. Powered by Blogger.