A History of Cyber Warfare – Part 2

Today we continue our report on the history of cyber warfare.

Stuxnet or Olympic Games (2009-2010)

Cyber attack attributed to the United States, Israel, Germany, and possibly Great Britain.  Confirmed by General James Cartwright in November 2012.  Target was Iran, particularly the Nuclear Program facility at Natanz.  The excellent documentary Zero Days covers this operation in detail.

Since the Natanz facility was not connected ...

Continue Reading →
2

A History of Cyber Warfare – Part 1

Cyberwarfare is becoming a more prevalent form of cyber-attack, and one that may be hard for an individual or a small business owner to understand or defend against.  Of Friday we took a look at the definition and practice of cyber war.  This week we will review the history cyberwar incidents, the attackers, the targets, and the outcome of the best known ...

Continue Reading →
3

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


History of Flying Saucer Sightings

From the Smithsonian:  A look at the history of unexplained flying objects through the lens of human technological change.


FTC Warns of Online Dating Scams

02/01/2018 09:22 PM EST Original release date: February ...

Continue Reading →
0

When is a Cyber Attack an Act of Cyber War?

What is a cyber warfare attack exactly, and what is it that separates it from a garden variety cyber attack?  When does a cyber attack cross the line into actual warfare?  Is it a cyber attack launched by a nation-state or other political or quasi-political entity against the resources of another nation-state?  What separates cyber war from actual armed conflict?  The answers are ...

Continue Reading →
1

Millions of Insecure Windows XP Systems Still In Use

Windows XP was released on 2001 replaced by Windows Vista (ugh) in 2006, and Windows 7 in 2009.  Official support from Microsoft, including security updates, ended in 2014.  It is now 16 years old.  Yet 7% of PCs worldwide are still running Windows XP.  Considering there are about 3 billion PC in use, that’s a whopping 210 million computers.  It is easy to assume that most of these computers are ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, ...

Continue Reading →
0

Securing Your Smart IoT Devices

It seems that everything you can buy comes with a smartphone app and an Internet connection.  As cool and shiny and modern as this is, every Internet connected device is one more place for a cyber-attacker or criminal to get onto your network and into your business.  There are steps you need to take to protect these cool toys from exploitation.

These devices include security cameras, refrigerators, thermostats, light bulbs and ...

Continue Reading →
1

Turn On Your Router’s Firewall

Your Internet Service Provider has provided you with a free hardware firewall, but often the firewall features are not enabled by default.  This is sort of like having seat belts in your car, but not wearing them.  It is foolish and risky.

On Monday we discussed how to find out of there are unnecessary open ports on your Internet router’s firewall settings.  Today ...

Continue Reading →
0

How To Check Your Router For Security Holes

For nearly all home computer users, and many small businesses, the router that connects your home or business to the Internet is the first line of defense. How can you know if there are vulnerable security holes or open ports on your Internet router that might allow access for an attacker?

These routers are also called cable modems or DSL modems, ...

Continue Reading →
0

New Exploit Uses Disk Images to Deliver Malware

There is a new email attachment exploit making the rounds, that uses a file type called a disk image.  The file extension for this kind of file is ISO.  ISO files are not inherently dangerous, and in the exploit work much the same way that a ZIP attachment works.  This file type can sneak past email security filters because it is generally seen as ...

Continue Reading →
0
Page 58 of 107 «...3040505657585960...»