Tags » Cyber-warfare

Stay Behind Systems Design

There are a number of concerns one must consider when designing, building and emplacing cyber warfare systems outside of areas of direct control. These systems must be concealed and encrypted to prevent compromise, they must have redundant sources of power so they can carry out their mission, they must be resistant to environmental effects, and they must have reliable communications or data storage to ensure that the effort to deploy them is not wasted. 428 more words

Ramblings

MIST952 - New Wars, the Privatisation of War, and Cyber-warfare (Week 4)

Computers. Where would we be in the 21st century without them? However, the higher the dependence grows, the higher the risk involved increases, ranging from those affecting the security of the individual to serious matters of state.  511 more words

Global Issues

Hacking group purportedly hacked NSA-linked Equation Group, auctioning cyber weapons

The Shadow Brokers group claim to have hacked the Equation Group, which is believed to be linked to the NSA, and is auctioning off the ‘best’ cyber weapons. 738 more words

Cybersecurity

Warning: Windows 10 Anniversary Update might delete your Linux partitions | Brian Fagioli - betanews

Folks like me that use both Linux and Windows will often setup multiple partitions on a single drive or across multiple drives. This method allows you to easily choose between various operating systems at boot. 123 more words

Cyber Warfare

'Project Sauron' malware hidden for five years | Chris Baraniuk - BBC News

A sophisticated form of malware known as Project Sauron went undetected for five years at a string of organisations, according to security researchers.

The malware may have been designed by a state-sponsored group. 60 more words

Cyber Warfare

Researchers crack open unusually advanced malware that hid for 5 years

The name “Project Sauron” came from code contained in one of the malware’s configuration files.

Espionage platform with more than 50 modules was almost certainly… 776 more words
Information Warfare