blog trackingRealtime Web Statistics Warfare Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘warfare’

Alex Gibney Takes on Cyber Warfare and New Global War in ‘Zero Days’ Trailer

zero-days-alex-gibney

Source: National Cyber Security – Produced By Gregory Evans

Alex Gibney, the Oscar-winning filmmaker behind the Scientology documentary ‘Going Clear’, is taking on the underground world of cyber warfare in his upcoming feature ‘Zero Days’. The documentary premiered at the Berlin Film Festival earlier this year and tackles the new global war to attack infrastructure and technology. It provides a tease of the Stuxnet […]

The post Alex Gibney Takes on Cyber Warfare and New Global War in ‘Zero Days’ Trailer appeared first on National Cyber Security.

View full post on National Cyber Security

A real threat on our internet liberties “The face of Tehran’s cyber warfare”

Cyber Army

Source: National Cyber Security – Produced By Gregory Evans

Hackers find ways of controlling hardware and software through releasing malicious computer viruses, and likewise governments use ‘soft and hard means’ to quell internal dissident voices of those who choose to speak out against them. This is the hard-line taken by the Iranian regime in light of a zero-day cyber attack, in 2005, which reportedly caused one-fifth of the regime’s nuclear centrifuges to fail at its main enrichment facility. Hitting harder the Iranian regime exploited this event with break-out retaliation that was fast and sudden. In an intelligence report published on the National Council of Resistance of Iran’s (NCRI’s) website (April 2016) it reveals a rhetoric wrapped up in the language of ‘soft’ and ‘hard’ means, and getting to the point translates into increased arbitrary censorship laws and at-will illicit laws to make arrests. Plus a platform for ramping-up levels of cyber espionage and sabotage ‘within Iran’ and to ‘strik[e] at “enemies” abroad’. The main Iranian opposition group People’s Mojahedin Organization of Iran (PMOI or Mujahedin-e Khalq, MEK) gathered this intelligence, of which cited in section 1.2, 2010 is posited as the moment that the Islamic Revolutionary Guard Corps (IRGC) commander Majid Sadeqian, met and calculated that the 2005 zero-day […]

The post A real threat on our internet liberties “The face of Tehran’s cyber warfare” appeared first on National Cyber Security.

View full post on National Cyber Security

South Korea’s defence ministry to welcome tech-savvy ‘white-hat’ hackers team to fight cyber warfare

rtr41hk4

Source: National Cyber Security – Produced By Gregory Evans

The South Korean defence ministry has undertaken a new initiative to fight against cyber-attacks, which are prominent in the 21st century, by conducting a “White Hat” hacking competition to select the best hackers across the nation. First announced in August by the Defence Ministry and the National intelligence Service, the competition aims to hunt for computer geniuses who can help Seoul fight tech attacks efficiently. The hacking competition assigns participating teams with the task of finding answers to questions related to potential future attacks on South Korea, such as where they would be coming from, what tricks and tactics foes would use, and how the ministry can maintain proper balance and control cyber attacks. When it came to “who,” the answer was North Korea, with which South Korea has been in a state of war since the 1950s. “I do think about how I’m going to defend us against an attack from North Korea,” 16-year-old participant Lee Kyung-won from Suwon said confidently last week, as quoted by The Washington Post. The increasing number of cyber-attacks from North Korea has made it mandatory for its southern counterpart to select only the ‘tech savviest’ individuals for its defence team. Sixteen teams entered the finale scheduled on Wednesday after passing through tough preliminary rounds. The list of winners will be announced […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post South Korea’s defence ministry to welcome tech-savvy ‘white-hat’ hackers team to fight cyber warfare appeared first on National Cyber Security.

View full post on National Cyber Security

Here is how cyber warfare began — 50 years ago

Source: National Cyber Security – Produced By Gregory Evans

Computer hacking was once the realm of curious teenagers. It’s now the arena of government spies, professional thieves and soldiers of fortune. Today, it’s all about the money. That’s why Chinese hackers broke into Lockheed Martin and stole the blueprints to the trillion-dollar F-35 fighter jet. It’s also why Russian hackers have sneaked into Western oil and gas companies for years. The stakes are higher, too. In 2010, hackers slipped a “digital bomb” into the Nasdaq that nearly sabotaged the stock market. In 2012, Iran ruined 30,000 computers at Saudi oil producer Aramco. And think of the immense (and yet undisclosed) damage from North Korea’s cyberattack on Sony Pictures last year. Computers were destroyed, executives’ embarrassing emails were exposed, and the entire movie studio was thrown into chaos. It wasn’t always this way. Hacking actually has some pretty innocent and harmless beginnings. Curiosity created the hacker The whole concept of “hacking” sprouted from the Massachusetts Institute of Technology nearly 50 years ago. Computer science students there borrowed the term from a group of model train enthusiasts who “hacked” electric train tracks and switches in 1969 to improve performance. These new hackers were already figuring out how to alter computer software […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Here is how cyber warfare began — 50 years ago appeared first on National Cyber Security.

View full post on National Cyber Security

CMC talk addresses challenge of cyber-security and warfare

sf_Richard_Clarke_2__thumb

Source: National Cyber Security – Produced By Gregory Evans

The United States is vulnerable to cyber-attacks of every ilk, from theft to all-out war. This was the message delivered Tuesday evening at Claremont McKenna’s Athenaeum by Richard Clarke, CEO of the Good Harbor Security Risk Management company. Mr. Clarke, whose talk was called “Cybersecurity in 2015: from Theft to Destruction,” brings a lot of experience to bear on the subject. Among his accomplishments are a decade as a White House official, during which time he counseled three consecutive presidents on national security in the information age. The ways corporate and governmental security can be breached via computer are myriad, and their execution technical. Mr. Clarke sought to simplify things by breaking down the four main types of digital attacks. They can be remembered via the acronym CHEW, which stands for cyber-crime, cyber-hacktivism, cyber-espionage and cyber-war. Cyber-crime represents basic theft, in which an individual or individuals reach into peoples’ accounts and remove money, and is a pretty well-known problem. Cyber-hacktivism is when a group, unhappy with the actions of another group, hacks into their system in order to embarrass or sabotage them. In a way, the Sony Pictures Entertainment Hack, which took place last November, is a case of cyber-hacktivism, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post CMC talk addresses challenge of cyber-security and warfare appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber warfare: Capitol staffers aren’t ready

US-POLITICS-STATE OF THE UNION-OBAMA

Source: National Cyber Security – Produced By Gregory Evans

Congressional staffers are the gateway to all lawmaking on the Hill, but they also may be unwittingly opening the door to hackers. The Hill’s networks are under constant attack. In 2013 alone, the Senate Sergeant at Arms’ office said it investigated 500 potential examples of malicious software, some from sophisticated attackers and others from low-level scammers. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber warfare: Capitol staffers aren’t ready appeared first on National Cyber Security.

View full post on National Cyber Security

March 24 – 25, 2015-10th International Conference on Cyber Warfare and Security ICCWS

index

Source: National Cyber Security – Produced By Gregory Evans

It will be an enormous honour to welcome you to the 10th International Conference on Cyber Warfare and Security (ICCWS 2015) in the Skukuza Camp, Kruger National Park, South Africa which will be held from 24–25 March 2015 co-hosted by the University of Venda and The Council for Scientific and Industrial Research (CSIR). Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post March 24 – 25, 2015-10th International Conference on Cyber Warfare and Security ICCWS appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers ‘Swooped’ On Biological Warfare Study

Hackers ‘Swooped’ On Biological Warfare Study

Security researchers have uncovered a group of hackers that broke into 300 banks, corporations and governments for 12 years without being caught. The hacker collective from Germany exploited a loophole in the UK which enabled them to obtain security certificates […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Registration is open for the Air Force Association’s 2014 Air Warfare Symposium and Technology Exposition

Top Priority Sector:  military_force_protection The Air Force Association (AFA) will host the 2014 Air Warfare Symposium and Technology Exposition between February 19th-21st, 2014. Read More….

View full post on The Cyber Wars

Modern Warfare 3 | Flawless TDM | Huge Channel Announcement!

Become a member of Yeousch here: http://www.yeousch.com/ Follow me on Twitter: http://twitter.com/#!/Siggyv Thank you everyone for your support! ___________________________ Read More….

View full post on Select From Our Menu

Page 1 of 41234»

My Twitter

  • RT @GregoryDEvans: #galaxylife #samsung4life Why most cyber crimes in India don’t end in conviction https://t.co/hEcyZRhDqT
    about 1 hour ago
  • RT @GregoryDEvans: Why most cyber crimes in India don’t end in conviction https://t.co/cfNUnYiPqv https://t.co/baypscH8kE
    about 2 hours ago
  • RT @GregoryDEvans: Democratic Convention Speakers Praise Teachers, Decry Gun Violence in Schools – Politics K-12 – Education Week https://t…
    about 3 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/wTEeKG6pnX may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/aCTnyYontA
    about 3 hours ago
  • RT @GregoryDEvans: Website/IP https://t.co/wTEeKG6pnX may be hackable #hacked, #WGH, #USA, #hackerproof https://t.co/aCTnyYontA
    about 4 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans