Technolytics Institute

Warning after warning has been given by military officials, intelligence agencies and private sector cybersecurity aspects about the growing national security threats emanating from cyber space.

Most recently, U.S. Secretary of Defense Leon Panetta delivered what has been referred to as the first major policy speech on cyber security by a defense secretary. His speech, delivered in New York last week, has been called a call to (cyber) arms, declaring that the United States was facing the possibility of a “cyber-Pearl Harbor.” Keep reading →


On the heels of a well publicized distributed denial of service (DDoS) attack on U.S. financial institutions came a warning about another coordinated and planned cyber attack against this critical infrastructure sector.

Cyber intelligence uncovered a fairly large, coordinated cyber attack that is said to use fraudulent wire transfers as the means of attack. This cybersecurity attack is said to leverage session hijacking in a man-in-the-middle cyber attack.

Man-in-the-middle cyber attack is defined as a compromise where the attacker is able to insert themselves between its target and the system or service in which the target is trying to access or use. An attacker accomplishes this by impersonating the system or service that the target is attempting to connect with by falsely rerouting the traffic to and from the service or by hijacking session data.

This attack is known to be initiated by spam and phishing emails, keystroke loggers as well as Trojans with remote access. A high attack concentration has been seen in the small and medium sized organizations and the transfer amounts have ranged from $400,000 to $900,000.

Multiple cyber intelligence sources have warned that an estimated 30 U.S. based financial services institutions may be the targets of an organized cyber criminal gang that is said to be the entity behind this attack.

Just recently the FBI issued a warning about this threat. Their warning stated that the criminals behind this cyber attack were using multiple techniques to obtain customer log-in credentials. Once the criminals have these credentials, they initiate international wire transfers.

For additional information you should monitor the FBI, in association with the Financial Services Information Sharing and Analysis Center (FS-ISAC) and the Internet Crime Complaint Center (IC3).

Kevin G. Coleman is a long-time security technology executive and former Chief Strategist at Netscape. He is Senior Fellow with the Technolytics Institute weekly blog for Breaking Gov on the topic of cyber intelligence. Keep reading →

The big news reverberating through cybersecurity circles last week, reported by the New York Times, that the U.S. was behind the Stuxnet cyber attack on Iranian nuclear enrichments back in 2010 has set off a new firestorm of concern about the likelihood of retaliation.

The news report was based on information provided by “unnamed participants in the program.” In the article it states that the information in the piece was called an “account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts.” Keep reading →

It happened again. A number of countries have been hit by what has been called the most sophisticated piece of malware seen to date.

The malware is called Flame – appropriate given the number of computers that have been burned by this latest cyber weapon. Keep reading →

The spirit of necessity has taken hold and U.S. Cyber Command, the National Security Agency (NSA) and even the Department of Homeland Security (DHS) along with the office of the Director of National Intelligence (ODNI) are sharing cyber intelligence with critical infrastructure providers and technology companies in the private sector.

Of course this is done on a case by case basis and there clearly needs to be an identified threat and of course a need to know. Keep reading →

Iranian President Mahmoud Ahmadinejad (L) speaks with foreign minister Ali Akbar Salehi (R) next to a map of Iran at the presidential office in Tehran, Jan. 5, 2012.

Recent incidents in Iran, including cyber attacks against the nation’s pipeline and its refinery infrastructure have embarrassed Iran on the world stage. These latest two attacks are estimated to have had a quarter of a billion dollar financial impact on Iran. Keep reading →

Lately, the most common question I get when doing briefings and presentations about the growing threat of cyber attacks is: What is the answer?

I have been giving that a fair amount of thought and have solicited input from others who are active in the field and have a good understanding of the current state of this threat. So I am going to try and address this question for the first time publicly. Keep reading →

The implications of cyber attacks are getting more and more attention as of late and for good reason. Last week at the Government Security Conference, Gordon Snow the assistant director of the FBI’s Cyber Division added to the many reasons for concern.

In his comments Snow acknowledged concerns over cyber attacks that target the E-911 systems and the entire emergency first responder infrastructure. While these potential targets have been a concern for years, recent concerns about multi-modal cyber attack by terrorist have heightened concerns. Keep reading →

Cyber Sit-ins, cyber protests and other forms of demonstration have grown year after year and are now considered formidable method of protests.

How to respond to those new forms of protests, amid other cybersecurity threats, has become a challenge around the world for government elections, politicians, corporations, law enforcement organizations all of which have experienced the wrath of those who oppose their actions. Keep reading →

Earlier this year Iran’s President Mahmoud Ahmadinejad announced that Iran would establish a Supreme Council of Cyberspace. This was the latest action intended to strengthen Iran’s cyber power and defend the country against cyber attacks.

Sources inside of Iran have said that the council will be comprised of high-ranking Iranian officials such as the Iran’s Parliament speaker, Judiciary chief, head of the Islamic Republic of Iran Broadcasting, and ministers of Communication and Information Technology, Culture and Islamic Guidance and Intelligence. Keep reading →

Page 1 of 212