361Security
  • Intelligence
    • Blogs >
      • Paul Ashley
      • Brandon Scott >
        • Book
      • Haqmal
    • Analysis
    • Regions >
      • Global
      • Africa >
        • Kenya
        • Nigeria
        • Somalia
      • Asia >
        • Afghanistan
        • Myanmar (Burma)
        • India
        • North Korea
        • Pakistan
      • Europe >
        • Russia
      • Latin America >
        • Brazil
        • Colombia
        • El Salvador
        • Honduras
        • Mexico
        • Venezuela
      • Middle East >
        • Iran
        • Iraq
        • Jordan
        • Kuwait
        • Lebanon
        • Libya
        • Saudi Arabia
        • Syria
        • Turkey
        • Yemen
    • 'The First 300' Project
  • Services
    • US Government Services
    • Jobs Portal >
      • Leads
    • Shop
    • External Links
    • Consulting
    • Human Security
    • Development Nexus
    • Request For Information
    • Market Security
    • Key Leader Dossiers
    • Information Security
    • Literature Reviews
    • Cultural Intelligence
    • Research Resources
    • Forums (Beta)
    • Files
    • Security & Stability
    • Terrorist Profiles
  • Communications
    • About
    • Advertising
    • Public Affairs
    • Contributors >
      • Zachary Alpert
      • Paul Ashley
      • Michael Bassett
      • Ben Eden
      • Jeffrey Hawn
      • Nick Heras
      • Attila Laczko
      • Brandon Scott
      • Chris VanKirk
    • Mailing List

Cyber attack targets gas pipeline companies

5/13/2012

 
A series of natural gas pipeline sector companies are being targeted by a cyber attack that appears to have been launched in December, according to a notice from the Department of Homeland Security.

New Interest in Hacking as Threat to Security

3/14/2012

 
WASHINGTON — During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure, factories and databases, according to the Department of Homeland Security, compared with 11 over the same period a year ago.

Authorities: Hackers busted when 1 turns informant

3/7/2012

 
NEW YORK - (AP) -- The shadowy underworld of Internet hackers was rocked Tuesday by news that one of the world's most-wanted and most-feared computer vandals has been an FBI informant for months and helped authorities build a case against five people they say were comrades.

Did Chinese Espionage Lead to F-35 Delays?

3/6/2012

 
Did Chinese cyber spying cause the F-35 Joint Strike Fighter’s cost spikes and production delays? That’s the question Pentagon budget officials are asking according to Aviation Week.

Could hackers seize control of your car?

3/6/2012

 
(CNN) -- When car companies begin exhibiting at mobile phone shows, it's a sign that the "connected" vehicle has truly arrived -- allowing us to take our digital lives with us as we hit the highway.

Fighting in the Fifth Dimension

3/6/2012

 
Innovations in technology are changing the tactics of modern-day conflict. There are new tools in today's arsenal of weapons. Helped by advances in electro-magnetics and modern information and communications technology, a new form of electronic warfare has been created. It is called cyberwar and is increasingly recognized by governments and the military as posing a potentially grave threat.

DOD wants in on protecting civilian infrastructure

3/2/2012

 
SAN FRANCISCO — Deputy Defense Secretary Ashton B. Carter told the security industry at the RSA Conference that protecting cyberspace is a cooperative effort between the government and the private sector, and that the Defense Department is preparing to play an active role in both military and civilian systems.

Think Again: Cyberwar

2/27/2012

 
No way. "Cyberwar is coming!" John Arquilla and David Ronfeldt predicted in a celebrated Rand paper back in 1993. Since then, it seems to have arrived -- at least by the account of the U.S. military establishment, which is busy competing over who should get what share of the fight.

Cyberwar Is Already Upon Us

2/27/2012

 
In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality. Cyberwar is here, and it is here to stay, despite what Thomas Rid and other skeptics think.

Shots Fired: The 10 worst cyberattacks.

2/27/2012

 
In 2004, U.S. federal investigators discovered an ongoing series of attacks penetrating the networks of the departments of Defense, State, Energy, and Homeland Security, as well as those of defense contractors, and downloading terabytes of data.

Partisanship jeopardizes U.S. cyber defense

2/25/2012

 
Few would argue against the need to improve U.S. cybersecurity, but the current partisan divide on how to accomplish this goal threatens to stall much-needed legislation in this area. On February 14th, Sen. Joseph Lieberman (I-CT) and Sen. Susan Collins (R-ME) introduced the Cybersecurity Act of 2012, a bill that aims to improve US cyber defense, clarify responsible government oversight authorities, raise issue awareness, and promote information sharing between the private sector and the government.

Cyber-snoops often cross legal line in divorce wars

2/25/2012

 
When a Greeneville, Tenn., man saw that e-mails he sent were different from what the intended recipient received, he immediately suspected his soon-to-be ex-wife. His suspicions turned out to be true: She had installed snooping software on his computer, intercepted his e-mails and altered them, according to federal court records.

Cyber security expert finds new flaw in smartphones

2/25/2012

 
A former McAfee researcher has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails.

Citi: Attackers Gained Access to Customer Data

2/25/2012

 
Citigroup Inc. (C), the third-largest U.S. lender, said cyber attackers got into customer accounts last year as the threat of electronic intrusions increased.

    Cyber Security

    Never before in history has there been a more complex form of warfare than Cyberwarfare. The cyber battlefield is an ever evolving and seemingly insurmountable obstacle. At 361Security we have dedicated this section to writings from IT professionals from the US and European defense communities. They have volunteered to offer 361 and its readers a professional approach to current and future Cyber threats. Additionally we will provide ample updates to others writings.

    Archives

    May 2012
    March 2012
    February 2012

    Categories

    All

© 2011 - 2024