The consequences of the Trump presidency on cybersecurity


AIVAnet

Hacking and cybersecurity played a huge role in the presidential election. So much so that Donald Trump, America?s new president-elect, was helped greatly by the acts of criminal hackers in his journey to the White House, and is now an outspoken WikiLeaks fan.

Though, unless he appoints Julian Assange as his Cybersecurity Czar, I doubt we?ll be seeing WikiLeaks coming to Trump?s rescue when he needs help with cyber-policy in the near future. But you never know.

And that?s where this insane ride, where any consideration of the human beings who will experience the consequences of their combined machinations is absent, is going: Mr. Trump is now going to be in control of America?s cybersecurity and cyber-warfare policies and plans. He has promised that what he called ?the cyber? in his last debate will immediately become a priority, citing threats in the form of China and North Korea.

Mr. Trump…

View original post 1,664 more words

Cyber Warfare Weapons – Part 2


Arcadeus OPS

Last week in Part 1 we tried to define cyber warfare and gave some examples of what has already taken place in the recent past.

In this second part we explore what is happening in the real world of cyber warfare, and what Governments are doing to protect us.

Cyberspace and its Security
What can be done and who should act in defense of a nation’s cyberspace? The answer may be complicated. Defending cyberspace is not an easy feat, considering the number of interconnected computers, mobile devices and networks. The majority of the systems, including those regulating nations’ critical infrastructures, are interconnected and then vulnerable not only to direct attacks but also to infection by transmission. Ironically, the numerous technological advances might also pose a risk, as cyber terrorists seem to be always a step forward in identifying security vulnerabilities before security experts can patch them. Lack of recognized rules…

View original post 1,163 more words

Cyber Warfare Weapons – Part 1


Arcadeus OPS

Numerous malicious attacks on computers and mobile devices as well as networks of important entities have recently made the news and have brought back to the surface the debate on cyber warfare and the dangerousness of cyber weapons.
The increasing dependence on the Internet and the recent spur of attacks are beginning to create greater concern.
The fear is not just based on the possibility that a cyber attack could simply cause the non-availability of information and services we are now accustomed to. The Internet has not just reshaped the way we obtain news, communicate with others, take care of our finances, watch TV and listen to music, but it is also permeating other essential fields of our lives.
From power smart grids to the “Internet of Things,” the potential targets of cyber warriors are now multiple and the possible consequences catastrophic. Premeditated, politically or socially motivated attacks against a…

View original post 1,244 more words

What is your understanding of cyber terrorism?


Centre for Security Failures Studies

Protected by Copyscape
open_access_plos-svg

What is your understanding of cyber terrorism?

The term cyberterrorism is a term that individuals either fully understand or only partially understand its true meaning and principles. Cyberterrorism in simple terminology is a terrorism act committed on the internet. So basically it is an act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

During research it was identified that the Cyberterrorism term appears to be a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organisations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.

There is debate over the basic definition of the scope of cyberterrorism. There are constant variation…

View original post 3,495 more words

Who is Anna-Senpai, the Mirai Worm Author?


Infosec News Ireland

On September 22, 2016, this site was forced offline for nearly four days after it was hit with “Mirai,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack — using the name “Anna Senpai” — released the source code for Mirai, spawning dozens of copycat attack armies online.

After months of digging, KrebsOnSecurity is now confident to have uncovered Anna Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware.

The Hackforums post that includes links to the Mirai source code.

Mirai co-author Anna-Senpai leaked the source code for Mirai on Sept. 30, 2016.

Before we go further, a few disclosures are probably in order. First, this is easily the longest story I’ve ever written on this blog. It’s lengthy because I…

View original post 7,989 more words

The ABC’s of APTs: Shamoon


CyberWatch

sham35Welcome to the grey zone where politics and cyber meet. APTs or advanced persistent threats, are one of my favourite acronyms (but then you know how I am intrigued by Stuxnet and cartels), and essentially are how nation states get their digital digs at each other. Usually the intention is to get information, because knowledge is power. Cyberespionage can give a competing nation a real competitive advantage in the world economy, among other things. But sometimes, there is a need to control more, and that is where weaponizing code takes on a whole new nasty.

The keyword here is “persistence.”  First, attackers must find their way into the networks of the target. Usually, they employ targeted spear phishing, painstakingly staking out the right victim to receive that loaded email.  The investment of time and money at this point is essential, so as not to tip anyone off. And the emails are crafted so carefully, picking up on…

View original post 914 more words