Vote Trump 2016 !

Vote Trump 2016 !
Trump 2016
Showing posts with label #cyberwar. Show all posts
Showing posts with label #cyberwar. Show all posts

Friday, November 06, 2015

#IRAN HACKERS TARGET EMAIL, #SOCIAL #MEDIA ACCOUNTS OF U.S. OFFICIALS @Breitbart

Office of the Iranian Supreme Leader via AP

A surge of Iranian attacks against the email and social media accounts of U.S. officials has been detected over the past few weeks, with an emphasis on officials involved in crafting Iran policy. Journalists and academics have also been targeted.

The Wall Street Journal cites American officials who believe the “flurry” of hacker attacks is related to the arrest of Siamak Namazi, an Iranian-American oil company executive who was snatched by Revolutionary Guard intelligence operatives while visiting relatives in Tehran. Namazi, who advocated improved relations and increased trade between Iran and the U.S., becomes the fifth American held hostage by the Iranian regime in defiance of the Obama administration. The White House has refused to comment on Namazi’s plight.
A number of other businessmen have been hassled by Iranian authorities during this period, in what the WSJ portrays as an effort by the Revolutionary Guard and Iranian hardliners to protect their economic monopolies.
Some of the Iranian cyberattacks were evidently built using data seized from Namazi’s computer. In other words, the Revolutionary Guard started going after people listed in his address book.
Contrary to hopes expressed by President Obama and his administration that the nuclear deal would improve relations between the U.S. and Iran, the Wall Street Journal sees these cyberattacks as evidence that “hard-line factions inside the regime, including the military and office of Supreme Leader Ayatollah Ali Khamenei, haven’t moderated their hostility toward Washington.”
Notably, Khamenei has been loudly complaining that the United States wanted to use the nuclear deal to “undermine and weaken the country’s Islamist government.”
When suggestions for leveling sanctions against Iran over its cyberwar campaign were made, Khamenei shot back that such sanctions would violate the terms of the nuclear deal.
Taking a page from China, the Iranians have denied their involvement in these cyberattacks and claimed they are a target of such mischief from rogue hackers.
On-the-record statements from the administration about Iranian hacker attacks were vague. “We’re aware of certain reports involving Iran,” a senior official told Reuters. “While I don’t have a comment on the specific reports, we are aware that hackers in Iran and elsewhere often use cyber attacks to gain information or make connections with targets of interest.”

Read More Stories About:

Friday, April 24, 2015

Pentagon Strategy Includes #Cyberwarfare Option ! @GigaLaw

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department “should be able to use cyber operations to disrupt an adversary’s command and control networks, military-related critical infrastructure and weapons capabilities.”
·         Read the article: Daily News

EU Considering New Regulator for Internet Companies
The European Union could create a powerful new regulator to oversee a swath of mainly U.S.-based Internet companies, according to an internal document that lays bare the deep concerns in top EU policy circles around the economic threat posed by companies like Google Inc. and Facebook Inc. Such a move would throw the biggest obstacle yet in the way of U.S. Internet companies operating in Europe, a number of which are already embroiled in investigations and lawsuits over issues including unfair competition and tax avoidance.
·         Read the article: The Wall Street Journal

Bitcoin Exchange Seeks N.Y. Banking License
In a little noticed move, bitcoin exchange itBit has filed for a banking license in New York, according to the state banking authority. Approval for the license may come in the next couple of weeks, people familiar with the matter told Reuters, which could make itBit the first bitcoin company to be regulated as a bank in the United States.
·         Read the article: Reuters

FTC Settles with Software Firm Over Retail Tracking
The Federal Trade Commission delivered a mixed warning to a burgeoning segment of the software industry in a settlement.  Nomi Technologies, formerly known as Brickstream, a startup that tracks shoppers in stores and malls on behalf of retailers, agreed to settle charges that it broke a promise to let consumers opt out of its tracking and inform them they were being tracked while they were in retail environments.
·         Read the article: The Wall Street Journal

German Court Says Ad-Blocking Software Legal
A German court ruled that software meant to prevent ads from appearing on websites is perfectly legal. After a four-month trial, Adblock Plus prevailed over publishers Die Zeit and Handelsblatt, which claimed the Web plug-in is anticompetitive.
·         Read the article: PCMag

image:https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNuhwRfauHZv0smGdH2s0rMRM4Bafxzj1xU7a5dxjdko4bmiZ0s95KXI0iclQDeG0FJiBKoJ-_-9RuHTPBY3pK9KXuBjg2pCEfbKNzzaymOH6xRpEZzY6mwH3WVMKs1RWyRESktBS8UUD1/s1600/HBomb.jpg


Monday, April 20, 2015

Russian #Cyber Spies Used Unknown #Windows Flaws

A widely reported Russian cyber-spying campaign against diplomatic targets in the United States and elsewhere has been using two previously unknown flaws in software to penetrate target machines, a security company investigating the matter said. FireEye Inc., a prominent U.S. security company, said the espionage effort took advantage of holes in Adobe Systems Inc.’s Flash software for viewing active content and Microsoft Corp.’s ubiquitous Windows operating system.
·         Read the article: Reuters

Germany to Limit Online Investment Opportunities
Germany is preparing a law limiting startups’ abilities to raise investment money via online platforms in a bid to protect savers and support innovation. The ruling coalition has agreed on rules for crowdinvesting, according to Frank Steffel, a member of Chancellor Angela Merkel’s Christian Democrats who worked on the planned law.
·         Read the article: The Wall Street Journal

Monitor Says Apple Cooperating Less in Antitrust Compliance
Apple Inc’s cooperation with a court-appointed monitor has “sharply declined” as he reviews the iPad maker’s antitrust compliance policies, the monitor wrote in a report to a judge. Michael Bromwich, who became Apple’s monitor after it was found liable for conspiring to raise e-book prices, said in a report on Thursday that Apple objected to providing information and “inappropriately” attempted to limit his activities.
·         Read the article: Reuters

Microsoft Pushing European Probe of Google
Microsoft has links, to varying degrees, with the three initial complainants that sparked the European antitrust investigation into Google. And Microsoft’s activity gained momentum as a new European government re-energized the investigation.
·         Read the article: The New York Times


Report: #Hackers break into #IDF computers ! @Israel

Computer experts claim that computer hackers from Arab countries managed to plant espionage programs in IDF computer. It seems that classified information did not leak folowing the break-in. Senior IDF official denied the report.

Apr 17, 2015, 04:15PM | Yael Facto

Illustration
Illustration Channel 2 News
Hackers managed to penetrate IDF computer networks after a four-month-old effort – Reurters has reported, quoting experts of information security. A senior IDF official denied the reports.
The hackers seem to have managed to plant tracking programs in army computers using e-mails. The experts don’t know of classified information that leaked following the break-in, which was probably carried out by Arab hackers, as part of the cyber war waged in the Middle East in recent years. The suspicion that these are Arab hackers is based on information that pointed out that the programming language in which the break-in was carried out, was Arabic.
Waylon Grange, a researcher with security firm Blue Coat Systems Inc who discovered the campaign, said the hackers were likely working on a budget and had no need to spend much on tailored code. Grange added that most of their work appears to have gone into so-called social engineering, or human trickery. Grange explained that the hackers sent emails to various military addresses that purported to show breaking military news, or, in some cases, a clip featuring "Girls of the IDF." Some of the emails included attachments that established "back doors" for future access by the hackers and modules that could download and run additional programs. Grange added that the vast majority of the software was cobbled together from widely available tools, and that as far as he can tell, it was not a high level break-in.
Citing confidentiality agreements with clients, Blue Coat declined to say exactly where the campaign worked, and Grange said he did not know if any vital data had been compromised.
Please RT - THANKS!

Tuesday, December 16, 2014

#PJNET Gateway Pundit attacked by #Fergjuson #IcantBreathe Thugs

Sorry our servers crashed this morning.
Apparently we were under some kind of DDOS attack.
The main culprits were directing their attack from The Netherlands.
ddos pt
Norse Live
Several St. Louis area websites have been under attack recently since the shooting death of robber Michael Brown.

TweetMe Please


Monday, September 22, 2014

Israel Prepares for CyberWars


Israel's Prime Minister Benjamin Netanyahu speaks during a conference on counterterrorism at the Interdisciplinary Center in Herzliya, near Tel Aviv, Sept. 11, 2014.  (photo by REUTERS/Nir Elias)

Israel prepares for cyberwars

The eyes of the entire world are fixed on the beheading parade of the Islamic State that breaks its own records almost every week. The incomprehensible brutality, the uncompromising fanaticism, the wanton, flaming hatred and the appalling barbarity of the struggle — all these have attracted most of the global attention in recent months ever since the Islamic State in Iraq and al-Sham (ISIS), now simply the Islamic State (IS), burst into world consciousness.
This is the old war. It will take time until we rid ourselves of the outcomes of this territorial and physical terrorism, in favor of the next kind of warfare, but it behooves us not to ignore the future. It is already here. In future world wars and the great struggles yet to come, cyberspace will occupy a growing domain in the arenas of war. Resources will be redirected from the effort to kill as many human beings as possible with the least effort in the shortest time, or to behead as many victims as possible to horrify as many civilized Westerners as possible, to something completely different. Instead, the goal will be to sabotage the automated Internet infrastructure of as many systems as possible in enemy countries and spaces. The goal: to disrupt civilian life, to neutralize or destroy security systems and even inflict serious damage on assets and economies and kill as many people as possible.























“The capabilities are already here,” I was told last week (mid-September) by a high-echelon Israeli who has been dealing with this issue for many years. “Already now there are organizations and countries that can physically harm targets and people through the Internet.” I asked for examples. “There are many things that we still can’t talk about,” he said, “but I’ll give you an obvious example. Let’s assume that an espionage organization wants to eliminate someone in a foreign country. Let’s assume that this ‘someone’ is now driving a contemporary car, a brand created in recent years. Or, in other words, a car whose systems are operated by a computer. All you need is to know how to make a long-distance connection to the car’s computer systems and to know how to track any kind of cellular gadget the person has in the car. Even if the gadget doesn’t work or doesn’t even have a battery. With this kind of long-distance tracking, you can know exactly when the car is driving down a steep slope, then disable its braking system all at once. At that moment, you have determined the fate of everyone in the car.”


Read more: http://www.al-monitor.com/pulse/originals/2014/09/israel-shin-bet-espionage-cyber-warfare-attacks-netanyahu.html##ixzz3E5rGkZsb

Qatar and Law?

Sunday, September 14, 2014

KIller Robots coming soon?

Cost of the state-subsidized Robot Land theme park: $735 million
Cost of the state-subsidized Robot Land theme park: $735 million
In 1976 an animated film called Robot Taekwon V captured Korean kids’ imaginations with its tale of a superhero robot fending off giant machines bent on world domination. The film’s appeal endures—as does the cultural fascination with automated machines. South Korean President Park Geun Hye’s industrial planners have global ambitions of their own: to blow by Europe, Japan, and the U.S. in the race to hold sway over advanced robotics.
.
South Korea is embracing robotics with the same intensity that made it a force in high-speed broadband, widescreen televisions, and smartphones. Robot Land, a state-subsidized 758 billion won ($735 million) theme park featuring futuristic rides as well as research and development labs, is set to open in 2016. The government is also investing 1.1 trillion won to support the nation’s robotics industry.

That industry has doubled in size since 2009, with revenue reaching 2.1 trillion won in 2012, according to the Ministry of Trade, Industry and Energy. The government seeks to boost that to 7 trillion won by 2018 with 600 domestic robot companies employing 34,000 workers. South Korea’s expertise in screen technology, semiconductors, sensors, and auto manufacturing gives it an edge, says Lee Jeong Yeob, a senior research engineer at Hyundai Rotem, a defense company that’s part of Hyundai Motor Group (005380:KS). “We have the fundamental technologies, which we should use to commercialize robots.”
TweetMe Please

Friday, September 12, 2014

ISIS planning encryption-protected 'cyber caliphate'

  • Islamic State jihadists planning encryption-protected 'cyber caliphate' so they can carry out hacking attacks on West
  • Islamic State boasting of its plans to create a sophisticated cyber army
  • Plans to use 'cyber caliphate' to launch attacks on banks and governments
  • British hacker once jailed for cyber attack on PM thought to be involved
  • Comes as President Obama announces air strikes will extend into Syria


Islamic State militants are planning the creation of a 'cyber caliphate' protected by their own encryption software - from behind which they will launch massive hacking attacks on the U.S. and the West.
Both Islamic State and Al Qaeda claim to be actively recruiting skilled hackers in a bid to create a team of jihadist computer experts capable of causing devastating cyber disruptions to Western institutions.
They are now boasting it is only a matter of time before their plan becomes a reality.

ISIS militants marching through the streets of Syria. The group now claim to be creating an army of  hackers
ISIS militants marching through the streets of Syria. The group now claim to be creating an army of hackers
The group boasts of its plans to create a 'cyber caliphate'. Pictured are ISIS forces preparing for battle in Iraq

Read more: http://www.dailymail.co.uk/news/article-2751896/Islamic-State-jihadists-planning-encryption-protected-cyber-caliphate-carry-hacking-attacks-West.html#ixzz3D3nhef95
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Thursday, July 24, 2014

Iraq conflict breeds cyber-war among rival factions


Isis militants The conflicts in Iraq and Syria have a parallel cyber-element, research suggests

Related Stories

A cyber-civil war is being waged alongside the armed conflict in Iraq, research by security firms suggests.
As well as using social media to rally supporters and spread propaganda, some factions are employing hackers to gather intelligence.
Well-known attack programs have been re-purposed in a bid to to subvert routers and other systems inside Iraq.

More broadly, cyber-thieves are also using the conflict to help trick people into opening booby-trapped messages.

9/11 Commission Warns US Unprepared For A Possible ‘Cyber-Pearl Harbor’

  

A decade after releasing its report on U.S. unpreparedness ahead of the Sept. 11, 2001 attacks, the 9/11 Commission has released a new assessment on the growing threat of cyber-terrorism.
“One lesson of the 9/11 story is that, as a nation, Americans did not awaken to the gravity of the terrorist threat until it was too late,” the commission wrote in a new report on the 10th anniversary of the original, which revealed the intelligence failures that led to the hijacking of four planes by Osama bin Laden’s al Qaeda terrorist organization.
“History may be repeating itself in the cyber realm.”
Military and intelligence officials including recently retired U.S. Cyber Command and National Security Agency Director Gen. Keith Alexander and former Defense Secretary Leon Panetta have repeatedly warned the U.S. is vulnerable to a “cyber-Pearl Harbor” scale attack on its digital front, according to The Hill(RELATED: Congressman Accuses Ex-NSA Head Of Trading Secrets ‘For Profit’)
TweetMe Please

Monday, March 31, 2014

U.S. cyberwarfare force to grow significantly, defense secretary says






The Pentagon is significantly growing the ranks of its cyberwarfare unit in an effort to deter and defend against foreign attacks on crucial U.S. networks, Defense Secretary Chuck Hagel said Friday.
In his first major speech on cyber policy, Hagel sought to project strength but also to tame perceptions of the United States as an aggressor in computer warfare, stressing that the government “does not seek to militarize cyberspace.”

Thursday, January 30, 2014

Israel to Create an Emergency-Response Team for Cyber-Attacks

Photographer: Scott Eells/Bloomberg
Knowledge of computer code is becoming increasingly important in cyber-warfare.

As part of Israel's program to deal with rising cyber threats, the government is putting together a task force to help citizens and businesses cope. The country's National Cyber Bureau plans to establish cyber-emergency response teams this year that will specialize in handling different kinds of hacks, said Rami Efrati, the head of the bureau's civilian division.