This week, the U.S. Department of State’s Defense Trade Advisory Group (DTAG) met to decide whether to classify “cyber products” as munitions, placing them in the same export control regime as hand grenades and fighter planes. Thankfully, common sense won out and the DTAG recommended that “cyber products” not be added…
Hunting quadrotors with #8 buckshot might be a valid pasttime for some people, but the US Army is looking for a little more refinement.
Sometimes being an intensely secretive regime trading in relentless obscurity has its perks: The US tried to secretly attack North Korea’s nuclear program with a computer virus, but failed because it couldn’t find the information necessary to infect the North Korean system with a virus.
When anti-Chinese censorship services got hit with a crippling distributed-denial-of-service attack last month, researchers quickly pegged China as the culprit. Now, Citizen Lab has pinpointed the Chinese tool that made this attack happen. They’re calling it the Great Cannon.
China is finally admitting what we've known for years: Yes, it has cyber warfare units, and plenty of them.
Warfare is a constantly changing landscape, from the weapons that are used to the battlefields they're fought on. Amidst mountains of Snowden leaks from the NSA and GCHQ, it's no longer a mystery that the digital warfare is advancing quickly, and the British Army just upped its digital artillery.
The holidays are a time for eggnog and presents and bizarre credulous rituals involving an old elf-man and his pack of flying caribou. It's also a time to cuddle up by the hearth and begrudgingly explain the latest technology news to your relatives. This week's edition: The Sony hack.
In an undisclosed location in New Jersey, there's a tiny little town that's used as a training grounds to prepare the military for cyber warfare. No, tinier than that. Think more like model train sized. It's called CyberCity, and WNYC's New Tech City recently paid a visit.
According to Bloomberg, the source of the huge Sony Pictures leak has been traced to a five-star hotel in Thailand's capital. Leaching off of the St. Regis hotel's high-speed wi-fi, the hackers, currently believed the work of the North Korea-linked group DarkSeoul, carried out their devastating and embarrassing…
Simply put, cyberwarfare is the use of hacking to conduct attacks on a target's strategic or tactical resources for the purposes of espionage or sabotage.
It's been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.
Hackers managed to infiltrate and shut down an enormous tunnel system in Israel last month, causing massive traffic jams for eight hours, according to the AP. Though their sources indicate that the attack didn't come from a state actor, this first strike opens up a whole new world of cyber warfare.
The Washington Post has some more documents that reveal the offensive cyber-operations of US spy agencies. The cyber campaign is even broader and more aggressive than we first thought and uses movie-appropriate code names like GENIE, TAO, TURBINE and The ROC. Apparently, US spy agencies launched 231 offensive…
According to a report obtained by The Verge, analysts from Florida-based Internet security firm Cymru have uncovered a massive foreign hacking enterprise that has somehow managed to steal more than a terabyte of data per day. Confirmed international targets include military and academic facilities in addition to a…
Earlier this week, a sophisticated, capable, and seemingly freelance cyber-spying operation called Red October burst onto the scene. Well, it's probably been around for years, but we all only just found out about it. Now, it's already disappearing. After having the light shined on it, it's darting back into the…
There are plenty of cyberweapons floating around out there, like Stuxnet, Flame, and that whole gang. Now, Kaspersky has turned up a cyber-espoinage operation its dubbed "Red October," and it's up there in the big leagues. But unlike its cohorts, it doesn't look state-sponsored. This is a freelance job, and it's…
Obama has signed a highly secret directive which will allow the military to act more aggressively when it comes to stopping cyber attacks striking the US.
Now that we're both out of Iraq and money, the US government has to make some very important decision about how it'll kill its enemies in the future. Obama and his generals have weighed in: cheap war is getting techier.
When we think "cyber attacks," we usually think of something along the lines of LulzSec or Russian botnets—mostly disruptive, and only destructive in the abstract. But General Keith Alexander, head of US Cyber Command, says IRL mayhem's coming.