- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged cyber attacks
US Government Ignores External Threats While Creating Fake Internal Threats
From Wired.com:
P4x says he was later contacted by the FBI but was never offered any real help to assess the damage from North Korea’s hacking or to protect himself in the future. Nor did he ever hear of any consequences for the hackers who targeted him, an open investigation into them, or even a formal recognition from a US agency that North Korea was responsible. It began to feel, as he put it, like “there’s really nobody on our side.”
Repeated attacks hijack huge chunks of Internet traffic.
Posted by Gary in Comms, News, Threat Watch on 22/Nov/2013 14:44
From: Ars Technica
Man-in-the-middle attacks divert data on scale never before seen in the wild.
The hacks, which exploit implicit trust placed in the border gateway protocol used to exchange data between large service providers, affected “major financial institutions, governments, and network service providers” in the US, South Korea, Germany, the Czech Republic, Lithuania, Libya, and Iran.
Chinese Hacking Team Caught Taking Over Decoy Water Plant
Posted by Gary in News, Threat Watch on 4/Aug/2013 18:26
From: MIT
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Preparing for Cyber War, Without a Map
Posted by Gary in News, Threat Watch on 16/Oct/2012 17:12
From: MIT
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.
Islamist group warns of new cyber attacks on U.S. banks
Posted by Gary in News, Threat Watch on 25/Sep/2012 23:15
From: Raw Story
DUBAI — An Islamist group on Tuesday said it will carry out new cyber attacks on US banking targets, according to SITE Intelligence Group, following similar attacks last week in response to an anti-Islam film.
In a statement a group of hackers calling themselves the “Cyber Fighters of Izz al-Din al-Qassam†said they planned to attack the website of Wells Fargo bank on Tuesday, that of US Bank on Wednesday and the PNC Bank on Thursday, SITE said.
Last week the websites of US banks Chase (a JPMorgan Chase affiliate) and Bank of America suffered a suspected cyber attack following threats against them by the same group.
Everyone Has Been Hacked. Now What?
Posted by Gary in Comms, Threat Watch on 6/May/2012 17:03
From; Threat Level
On Apr. 7, 2011, five days before Microsoft patched a critical zero-day vulnerability in Internet Explorer that had been publicly disclosed three months earlier on a security mailing list, unknown attackers launched a spear-phishing attack against workers at the Oak Ridge National Laboratory in Tennessee. More
Cyber combat: act of war
Posted by Gary in Comms, Threat Watch on 3/Jun/2011 14:42
From: WSJ via Kurzweil AI
Cyber combat: act of war
June 1, 2011
Source: Wall Street Journal — May 31, 2011
The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, opening the door for the U.S. to respond using traditional military force.
Pentagon officials believe the most sophisticated computer attacks require the resources of a government. For instance, the weapons used in an assault such as taking down a power grid would likely have been developed with state support.
Defense officials refuse to discuss potential cyber adversaries, although military and intelligence officials say they have identified previous attacks originating in Russia and China.
Topics: Computers/Infotech/UI | Survival/Defense
Sophisticated Attacks Threaten Major Energy Firms
Posted by Gary in Comms, Threat Watch on 18/Feb/2011 15:29
From: Dark Reading
New advanced persistent threat (APT) attack combines a variety of vectors, seeks to steal sensitive data, McAfee researchers say
By Tim Wilson
Researchers at McAfee yesterday revealed details of a new advanced persistent threat attack that uses a combination of methods in an effort to steal sensitive operations, exploration, and financial data from petroleum and energy companies.The new series of attacks, dubbed “Night Dragon,” may have begun as long ago as 2008, McAfee says in its report about the threat. “Now, new Night Dragon attacks are being identified every day,” the report says. Night Dragon’s creators “appear to be highly organized and motivated in their pursuits,” McAfee says.The attack is “a combination of social engineering and well-coordinated, targeted, cyber attacks using Trojans, remote control software, and other malware.” The report says McAfee has seen evidence of the attacks in virtually every region of the globe, and that it has “identified tools, techniques, and network activities utilized … that point to individuals in China as the primary source. ”