Menu
Menu
DaniWeb
Log In
Sign Up
Read
Contribute
Meet
Search
Search
About 27 results for
cyber-warfare
- Page 1
Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria
Programming
Software Development
12 Years Ago
by happygeek
…defacement payload. So if we rule out the organised
cyber
-criminal gangs and the political hacktivists, that only …, CEO of Kaspersky Lab, says “the risk of
cyber
warfare
has been one of the most serious topics in the…to understand that such
cyber
weapons can easily be used against any country.Unlike with conventional
warfare
, the more developed…
China on cyber cold war front line
Hardware and Software
Networking
16 Years Ago
by happygeek
… stated that they are pursuing activities in
cyber
-espionage [*]
Cyber
assaults have become more sophisticated in their …to specifically slip under the radar of government
cyber
defences [*]Attacks have progressed from initial curiosity … is just the tip of the iceberg in
cyber
warfare
: "Traditional protective measures were not enough …
Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria
Programming
Software Development
12 Years Ago
by happygeek
… Laboratory of Cryptography and Systems Security first discovered the Duqu
cyber
weapon, said his analysis showed Flame may have been active…
Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by happygeek
… thousands of hackers to become part of a '
cyber
warfare
unit' similar to the Third Department of the …state sponsored corporate crime is different to the normal
cyber
-
warfare
disruption tactic, and is designed purely to make …. Not that the North Koreans are ignoring traditional
cyber
-
warfare
tactics, with that same report recounting how South …
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by LastMitch
… of state sponsored corporate crime is different to the normal
cyber
-
warfare
disruption tactic, and is designed purely to make money. That…
Infosec trends for 2013 (part three)
Hardware and Software
Information Security
11 Years Ago
by happygeek
… continued rise of targeted attacks,
cyber
-espionage and nation-state
cyber
-attacks, the evolving role of … of ‘hacktivism’ and politically-motivated
cyber
-attacks. State-sponsored
cyber
warfare
is also expected to continue in 2013…new major malicious programs that were used in
cyber
warfare
operations: Flame, Gauss and miniFlame. Experts at…
China claims spam crown
Hardware and Software
Information Security
15 Years Ago
by happygeek
…URL="http://www.daniweb.com/blogs/entry2427.html"]
cyber
warfare
stakes[/URL] as well. US Congress has warned that …="http://www.daniweb.com/blogs/entry1855.html"]
cyber
warfare
strike[/URL]anywhere in the world and at any … goes as far as to claim that the Chinese
cyber
warfare
capability is "so sophisticated that the US may…
A tale of sex and spyware in South Korea
Hardware and Software
Information Security
16 Years Ago
by newsguy
…/sex-spyware"]Sophos[/URL] it seems that
cyber
-tension between North and South Korea is increasing of…spyware attack on the orders of the infamous electronic
warfare
division. It is being speculated that the bog …year's roll call of countries accused of engaging in
cyber
warfare
," said Graham Cluley, senior technology consultant at …
Infosec trends for 2013 (part two)
Hardware and Software
Information Security
11 Years Ago
by happygeek
… for compromising systems transparently, used by both
cyber
-criminals and intelligence agencies in countries around the… Skype could well become a major target for
cyber
-criminals. Mobile malware: with Android undoubtedly becoming …a world of possible attacks as yet unknown.
Cyber
-
warfare
: throughout 2012, different types of attacks have been…
Re: Infosec trends for 2013 (part two)
Hardware and Software
Information Security
11 Years Ago
by LastMitch
…well become a major target for
cyber
-criminals. Correct, it could happened. >
Cyber
-
warfare
: throughout 2012, different types of… mentioning, where the conflict is also present in
cyber
-space. In fact, many of these attacks are…governments of the world’s leading nations are creating
cyber
commandos to prepare both defense and attack and …
Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria
Programming
Software Development
12 Years Ago
by happygeek
Also interesting to consider that Flame is around 20Mb in size, and includes livraires for compression, database management and a LUA virtual machine amongst other things. It's a very complex, and very large, package of assorted modules - much larger than most (if not all) worms to have surfaced so far. Reserachers at Kaspersky think the attack …
Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria
Programming
Software Development
12 Years Ago
by happygeek
And more: "Conflicting conjecture and confusion over the ‘ownership’ of the detection is muddying the waters. According to the Iran National CERT they had detection (but not removal) for the malware ESET calls Win32/Flamer.A in early May, but Kaspersky claims it’s been in the wild since March 2010: however, it seems to be the same malware …
Re: Flame on: complex LUA and C++ cyber weapon fired at Israel, Iran and Syria
Programming
Software Development
12 Years Ago
by happygeek
The 'chief security expert' at Kaspersky Lab, Alexander Gostev, has expanded upon the functionality of Flame at a technical level now, and rather importantly, provided the information required in order to perform a detailed check to see if you are infected (unlikely unless you are a Middle Eastern government agency, but you never know). More [here…
Re: Syrian Electronic Army attacks Washington Post, CNN and Time via plug-in
Programming
Web Development
11 Years Ago
by LastMitch
… outage which was widely reported as being down to another
cyber
attack, although the NYT itself insists it was actually an…'s hard to separate a hacker or a country using
cyber
warfare
or a terrorist who is using hacker method to attack…
Re: Infosec trends for 2013 (part three)
Hardware and Software
Information Security
11 Years Ago
by LastMitch
… year include the continued rise of targeted attacks,
cyber
-espionage and nation-state
cyber
-attacks, the evolving role of hacktivism, the development… the increase in cybercriminal attacks targeting cloud-based services. **
cyber
-espionage** or **
cyber
-sabotage**, I don't read that often or recognized…
Re: Skidmore college, MCSE, SCNP..??????
Community Center
20 Years Ago
by catch
… on the AITS project to my current work on offensive
cyber
warfare
policies. I have been an assistant moderator on the ACM…
Re: Islam and Logic
Community Center
Geeks' Lounge
12 Years Ago
by lil_bit
… example: the internet and how it translates to manifestations. In
cyber
-
warfare
, understanding these dynamics of human belief is a key element…
Re: Indian hackers take aim at Pakistan data during two year attack
Hardware and Software
Information Security
11 Years Ago
by LastMitch
… to anyone). I don't read this often but a
cyber
-
warfare
between 2 countries (India & Pakistan) is normal. But it…
Re: i need help with my pc
Hardware and Software
Information Security
14 Years Ago
by jessiecole
…C:^Documents and Settings^Owner^Start Menu^Programs^Startup^
Cyber
-shot Viewer Media Check Tool.lnk] path=c:\…documents and settings\Owner\Start Menu\Programs\Startup\
Cyber
-shot Viewer Media Check Tool.lnk backup=c:\windows…\pss\
Cyber
-shot Viewer Media Check Tool.lnkStartup [HKLM\~\startupfolder…
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by omfgwtf
please learn the difference between "its" and "it's"
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by happygeek
Yawn.
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by omfgwtf
Well done, I knew you could do it
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by happygeek
At least you got the capitalisation right on that one, but you still seem to be having trouble with the punctuation.
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by Reverend Jim
@happygeek - You missed an apostrophe? The horror. Obviously that totally invalidates all of the other content. Good thing there weren't further errors or I might have had to equate you to Hitler (because, as you know, some of Hitler's writings contained typos). Sorry. I accidentally turned on Fox News and it takes a while to detox.
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by Reverend Jim
Funny thing, I'm always confusing **it's** and **its** but only in verbal communication. Never in writing.
Re: Did the US military just hack North Korea?
Hardware and Software
Information Security
11 Years Ago
by KRRahman
I think nothing would happen in Korea Island.
Re: Infosec trends for 2013 (part three)
Hardware and Software
Information Security
11 Years Ago
by Seten
All the companies will try to lure people to upload all their private data to their cloud. Because they know that people will not migrate to other company/device/vendor, as it will be difficult for them to adjust to the new environment. Then as next phase they will change the agreements from "we can give statistic data to 3rd party" to &…
Search
Search
Forum Categories
Hardware/Software
Recommended Topics
Programming
Recommended Topics
Digital Media
Recommended Topics
Community Center
Recommended Topics
Latest Content
Newest Topics
Latest Topics
Latest Posts
Latest Comments
Top Tags
Topics Feed
Social
Forums
Top Members
Meet People
Community Functions
DaniWeb Premium
Newsletter Archive
Markdown Syntax
Community Rules
Developer APIs
Connect API
Forum API Docs
Tools
SEO Backlink Checker
Legal
Terms of Service
Privacy Policy
FAQ
About Us
Advertise
Contact Us
© 2024 DaniWeb® LLC