Cyber weapons are like the Ferrari you keep in the garage’ says U.S. official after decision NOT to use hack attacks in Libya
Cyber weapons are like the Ferrari you keep in the garage’ says U.S. official after decision NOT to use hack attacks in Libya
“There were two individual groups from one nation state, one supporting the other. One was very visible and one less so,” said RSA executive chairman Art Coviello.
“We’ve not attributed it to a particular nation state although we’re very confident that with the skill, sophistication and resources involved it could only have been a nation state.”
http://www.theinquirer.net/inquirer/news/2116592/executed-rsa-security-attack
A cyber-attack was launched on an organization of defense contractors in an attempt to steal confidential information on the nation’s defense industry, according to sources.
A hacker stole e-mail addresses from the Society of Japanese Aerospace Companies (SJAC), which lists executives of defense contractors as its directors, and then retrieved the contents of e-mails from Kawasaki Heavy Industries Ltd., the sources said.
http://www.yomiuri.co.jp/dy/national/T111015002242.htm
Computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.
The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/
The U.S. military suffered perhaps its first deeply damaging cyber attack three years ago. A flash drive with a malicious computer code was inserted into a laptop at a U.S. military base in the Middle East. The surreptitious worm infiltrated a U.S. Central Command (CENTCOM) computer network, collected classified and unclassified data, and shunted it to the servers of a foreign intelligence agency. That attack, reportedly Russian in origin, was the realization of “our worst fear...
Online gambling firm Betfair today admitted it had not told its customers about a major cyber attack 18 months ago where millions of credit card details were stolen.
More than 3.1 million account names with encrypted security questions, 2.9 million usernames, and nearly 90,000 account usernames with bank account details were stolen.
For soldiers in the 21st century, iPads, iPhones, Androids and other smart devices could eventually be as common on the battlefield as helmets, canteens and rifles.
These devices are being tested across all branches of the military. Seeing an opportunity, software companies and defense contractors are developing mobile applications that will enable soldiers to pass along intelligence, view reconnaissance images or even pilot small drones by remote control.