Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria Programming Software Development by happygeek …defacement payload. So if we rule out the organised cyber-criminal gangs and the political hacktivists, that only …, CEO of Kaspersky Lab, says “the risk of cyber warfare has been one of the most serious topics in the…to understand that such cyber weapons can easily be used against any country.Unlike with conventional warfare, the more developed… China on cyber cold war front line Hardware and Software Networking by happygeek … stated that they are pursuing activities in cyber-espionage [*]Cyber assaults have become more sophisticated in their …to specifically slip under the radar of government cyber defences [*]Attacks have progressed from initial curiosity … is just the tip of the iceberg in cyber warfare: "Traditional protective measures were not enough … Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria Programming Software Development by happygeek … Laboratory of Cryptography and Systems Security first discovered the Duqu cyber weapon, said his analysis showed Flame may have been active… Did the US military just hack North Korea? Hardware and Software Information Security by happygeek … thousands of hackers to become part of a 'cyber warfare unit' similar to the Third Department of the …state sponsored corporate crime is different to the normal cyber-warfare disruption tactic, and is designed purely to make …. Not that the North Koreans are ignoring traditional cyber-warfare tactics, with that same report recounting how South … Re: Did the US military just hack North Korea? Hardware and Software Information Security by LastMitch … of state sponsored corporate crime is different to the normal cyber-warfare disruption tactic, and is designed purely to make money. That… Infosec trends for 2013 (part three) Hardware and Software Information Security by happygeek … continued rise of targeted attacks, cyber-espionage and nation-state cyber-attacks, the evolving role of … of ‘hacktivism’ and politically-motivated cyber-attacks. State-sponsored cyber warfare is also expected to continue in 2013…new major malicious programs that were used in cyber warfare operations: Flame, Gauss and miniFlame. Experts at… China claims spam crown Hardware and Software Information Security by happygeek …URL="http://www.daniweb.com/blogs/entry2427.html"]cyber warfare stakes[/URL] as well. US Congress has warned that …="http://www.daniweb.com/blogs/entry1855.html"]cyber warfare strike[/URL]anywhere in the world and at any … goes as far as to claim that the Chinese cyber warfare capability is "so sophisticated that the US may… A tale of sex and spyware in South Korea Hardware and Software Information Security by newsguy …/sex-spyware"]Sophos[/URL] it seems that cyber-tension between North and South Korea is increasing of…spyware attack on the orders of the infamous electronic warfare division. It is being speculated that the bog …year's roll call of countries accused of engaging in cyber warfare," said Graham Cluley, senior technology consultant at … Infosec trends for 2013 (part two) Hardware and Software Information Security by happygeek … for compromising systems transparently, used by both cyber-criminals and intelligence agencies in countries around the… Skype could well become a major target for cyber-criminals. Mobile malware: with Android undoubtedly becoming …a world of possible attacks as yet unknown. Cyber-warfare: throughout 2012, different types of attacks have been… Re: Infosec trends for 2013 (part two) Hardware and Software Information Security by LastMitch …well become a major target for cyber-criminals. Correct, it could happened. >Cyber-warfare: throughout 2012, different types of… mentioning, where the conflict is also present in cyber-space. In fact, many of these attacks are…governments of the world’s leading nations are creating cyber commandos to prepare both defense and attack and … Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria Programming Software Development by happygeek Also interesting to consider that Flame is around 20Mb in size, and includes livraires for compression, database management and a LUA virtual machine amongst other things. It's a very complex, and very large, package of assorted modules - much larger than most (if not all) worms to have surfaced so far. Reserachers at Kaspersky think the attack … Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria Programming Software Development by happygeek And more: "Conflicting conjecture and confusion over the ‘ownership’ of the detection is muddying the waters. According to the Iran National CERT they had detection (but not removal) for the malware ESET calls Win32/Flamer.A in early May, but Kaspersky claims it’s been in the wild since March 2010: however, it seems to be the same malware … Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria Programming Software Development by happygeek The 'chief security expert' at Kaspersky Lab, Alexander Gostev, has expanded upon the functionality of Flame at a technical level now, and rather importantly, provided the information required in order to perform a detailed check to see if you are infected (unlikely unless you are a Middle Eastern government agency, but you never know). More [here… Re: Syrian Electronic Army attacks Washington Post, CNN and Time via plug-in Programming Web Development by LastMitch … outage which was widely reported as being down to another cyber attack, although the NYT itself insists it was actually an…'s hard to separate a hacker or a country using cyber warfare or a terrorist who is using hacker method to attack… Re: Infosec trends for 2013 (part three) Hardware and Software Information Security by LastMitch … year include the continued rise of targeted attacks, cyber-espionage and nation-state cyber-attacks, the evolving role of hacktivism, the development… the increase in cybercriminal attacks targeting cloud-based services. **cyber-espionage** or **cyber-sabotage**, I don't read that often or recognized… Re: Skidmore college, MCSE, SCNP..?????? Community Center by catch … on the AITS project to my current work on offensive cyber warfare policies. I have been an assistant moderator on the ACM… Re: Islam and Logic Community Center Geeks' Lounge by lil_bit … example: the internet and how it translates to manifestations. In cyber-warfare, understanding these dynamics of human belief is a key element… Re: Indian hackers take aim at Pakistan data during two year attack Hardware and Software Information Security by LastMitch … to anyone). I don't read this often but a cyber-warfare between 2 countries (India & Pakistan) is normal. But it… Re: i need help with my pc Hardware and Software Information Security by jessiecole …C:^Documents and Settings^Owner^Start Menu^Programs^Startup^Cyber-shot Viewer Media Check Tool.lnk] path=c:\…documents and settings\Owner\Start Menu\Programs\Startup\Cyber-shot Viewer Media Check Tool.lnk backup=c:\windows…\pss\Cyber-shot Viewer Media Check Tool.lnkStartup [HKLM\~\startupfolder… Re: Did the US military just hack North Korea? Hardware and Software Information Security by omfgwtf please learn the difference between "its" and "it's" Re: Did the US military just hack North Korea? Hardware and Software Information Security by happygeek Yawn. Re: Did the US military just hack North Korea? Hardware and Software Information Security by omfgwtf Well done, I knew you could do it Re: Did the US military just hack North Korea? Hardware and Software Information Security by happygeek At least you got the capitalisation right on that one, but you still seem to be having trouble with the punctuation. Re: Did the US military just hack North Korea? Hardware and Software Information Security by Reverend Jim @happygeek - You missed an apostrophe? The horror. Obviously that totally invalidates all of the other content. Good thing there weren't further errors or I might have had to equate you to Hitler (because, as you know, some of Hitler's writings contained typos). Sorry. I accidentally turned on Fox News and it takes a while to detox. Re: Did the US military just hack North Korea? Hardware and Software Information Security by Reverend Jim Funny thing, I'm always confusing **it's** and **its** but only in verbal communication. Never in writing. Re: Did the US military just hack North Korea? Hardware and Software Information Security by KRRahman I think nothing would happen in Korea Island. Re: Infosec trends for 2013 (part three) Hardware and Software Information Security by Seten All the companies will try to lure people to upload all their private data to their cloud. Because they know that people will not migrate to other company/device/vendor, as it will be difficult for them to adjust to the new environment. Then as next phase they will change the agreements from "we can give statistic data to 3rd party" to &…