cyber threat

Conventional arms transfers – Exports (US$ millions – 2005; 1990 prices). Refers to the voluntary transfer of weapons destined for the armed forces or intelligence agencies of another country. It includes ships, aircraft, missiles, artillery, armored vehicles and guidance and radar systems. It excludes trucks, services, ammunition, small arms, support items, components and component technology. SOURCE: Stockholm International Peace Research Institute.

The 193 United Nations diplomats are driving a treaty that would be the first legally binding global treaty that would regulate the international arms trade. This treaty is expected to promote transparency and accountability in the arms trade. This is not new! Keep reading →


Cyber investigators looking at the Stuxnet code determined that on June 24th the sophisticated cyber weapon would stop operating and remove itself from the systems it had infiltrated.

This function was identified long ago and cyber researchers have patiently waited to see what if any implications this will have on the tens of thousands of computers in more than 155 countries the sophisticated cyber weapon had infected. By all accounts this is a self-destruction, an unusual function not often seen embedded within malicious code. The inclusion of this function is a strong indicator that those behind this cyber attack did not believe that Iran would discover the malicious code. Keep reading →

Cyber intelligence comes in a variety of forms and from many places and sources. For years intelligence organizations look at routine communications by organizations they target to gain insight from the communications that the targeted group or organization has with its members.

For a while now intelligence organizations have been monitoring an online magazine known as Inspire which is said to be produced by al Qaeda in the Arabian Peninsula. Keep reading →

The big news reverberating through cybersecurity circles last week, reported by the New York Times, that the U.S. was behind the Stuxnet cyber attack on Iranian nuclear enrichments back in 2010 has set off a new firestorm of concern about the likelihood of retaliation.

The news report was based on information provided by “unnamed participants in the program.” In the article it states that the information in the piece was called an “account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts.” Keep reading →

In a move that suggests the incendiary impact of malicious software, Iran has now publicly threatened the United States over the Flame malware incident that has gained worldwide attention in recent days.

Flame has been dubbed the “utlimate spy” and for good reason. Iran was the country hit the hardest by the state-of-the-art piece of malware. Keep reading →

It happened again. A number of countries have been hit by what has been called the most sophisticated piece of malware seen to date.

The malware is called Flame – appropriate given the number of computers that have been burned by this latest cyber weapon. Keep reading →

Lately, the most common question I get when doing briefings and presentations about the growing threat of cyber attacks is: What is the answer?

I have been giving that a fair amount of thought and have solicited input from others who are active in the field and have a good understanding of the current state of this threat. So I am going to try and address this question for the first time publicly. Keep reading →

Arguably the hottest topic in cyber intelligence is the highly contested Cyber Intelligence Sharing and Protection Act (CISPA) that is currently making its way through the legislative process in the United States.

Major Internet icons like Facebook, IBM, Intel, Microsoft and Oracle, to name a few, have come out in support of the bill and now find themselves under fire for that position. Keep reading →

The implications of cyber attacks are getting more and more attention as of late and for good reason. Last week at the Government Security Conference, Gordon Snow the assistant director of the FBI’s Cyber Division added to the many reasons for concern.

In his comments Snow acknowledged concerns over cyber attacks that target the E-911 systems and the entire emergency first responder infrastructure. While these potential targets have been a concern for years, recent concerns about multi-modal cyber attack by terrorist have heightened concerns. Keep reading →

Cyber Sit-ins, cyber protests and other forms of demonstration have grown year after year and are now considered formidable method of protests.

How to respond to those new forms of protests, amid other cybersecurity threats, has become a challenge around the world for government elections, politicians, corporations, law enforcement organizations all of which have experienced the wrath of those who oppose their actions. Keep reading →

Page 2 of 512345