How would you describe the threat to the US information infrastructure? If you are a technologist or a national security expert or both I hope you would use your background and experience and expertice and produced a fused-all source assessment based on facts. But it is also ok to cite the masters, folks who really know what they are talking about and are paid to produce the … [Read more...] about An Assessment on the Cyber Threat
Bright Side of News recently wrote an article reporting on ElcomSoft's GPU computing attempts. They used various GPUs to hack WPA-PSK passwords. Check out the results here. ElcomSoft leverages the immense computing power of latest generation graphics cards. Cards such as ATI's Radeon HD 5970, and nVidia's GTX 295. The HD 5970 is ATI's latest offering, it has 2 GPUs, with … [Read more...] about The ATI's Radeon HD 5970 is a Supercomputer in your desktop
The Cyber Conflict Studies Association (CCSA) is a non-profit organization formed to promote and lead a diversified research agenda in the field of cyber conflict. The group was formed as a means to foster dialogue, lead research and develop academic programs focused on the implications of cyber conflict. To meet these goals, CCSA promotes and leads international intellectual … [Read more...] about What is the Cyber Conflict Studies Association?
Siemens provides the SIMATIC PCS 7 with "everything you need to completely and safely automate your entire production process." There are some important strategic changes occurring in the national security landscape. A new kind of cyber attack has been noted, one that involves use of malicious code to attack infrastructure. There are some important points in this attack that … [Read more...] about Stuxnet: An important change in the national security landscape
The following article by renowned security capability developer Dr. Anup Ghosh was was originally posted at the Invincea blog and is reposted here with the author's permission. ============= Question: what is the most significant cyber event of 2010? Answer: Stuxnet. While security analysts continue to marvel over Stuxnet’s capabilities, one disturbing aspect to Stuxnet is … [Read more...] about Defending Against Stuxnet Type Threats
Ladies and Gentlemen, put down the keyboards, stop reading the screen for a moment, and take a deep breath. I'll wait. Ok. Now that you've done that, you can relax with the knowledge that we are not currently -- nor have we ever been in -- a "cyberwar" with any foreign power or group. Yes, including China. So far there have not been any verified examples of cyberwar of any … [Read more...] about Cyberwar? What Cyberwar?
This July, the Ponemon Institute performed a benchmark study of US companies to identify the cost that companies can attribute to cyber incidents. There are a whole host of different ways in which a company can be targeted by a cyber attack, including corporate espionage. To complete their research, Ponemon examined 45 organizations, examining thousands of independent cyber … [Read more...] about Ponemon Institute Cost of Cyber Crime Study