With his shiny gray suit and long hair, Ahmed Hiedar, 28, bears little resemblance to a rebel soldier. But he has won more battles against the Syrian government than the average AK-47 welding opposition fighter.
His war is waged from the Turkish side of the Syrian border, in a cluttered hotel room, barely wide enough to fit a single bed.
His weapon is a modest laptop, and his goal is not to take lives but to save them.
A new campaign by a family of information-stealing malware, which appears to originate out ofIndia, has been hittingPakistanhard over the last few months, according to American researchers.
Citing researchers at Eset, Dark Reading, a comprehensive news and information portal that focuses on IT security, said unlike other known cyber-espionage campaigns, this one appears oddly rudimentary in that it uses publicly available tools and basic obfuscation methods, and doesn’t encrypt its command-and-control communications.
A ruling Kuomintang (KMT) legislator called yesterday on the government to beef up its cyber warfare capability, while the opposition party demanded that the government call an international news conference over the shooting by a Philippine government vessel on an unarmed Taiwanese fishing boat that resulted in the death of a Taiwanese fisherman last week. Report China post.
If Jason Bourne was a real-world government operative today, he would focus less time on the covert world of espionage and violent assassination plots, and would focus more on cybersecurity. The critical infrastructure networks that operate our electrical grids, power our water treatment plants, and enable communications are being targeted by hackers and nation states, and the impact of such attacks have the ability to wreak significant havoc.
Eugene Kaspersky has warned that it's only a matter of time before terrorists adopt state sponsored style attacks such as Stuxnet and Red October to target countries' critical infrastructure.
Speaking at the Information Security conference in London today, Kaspersky said that these types of attacks are "the worst of the worst" in cyberspace at the moment.
According to Symantec experts, they found evidence that the virus was created before 2005.
Stuxnet worm became known as the first computer software threat that was used as a cyber-weapon. The worm was
specifically designed to take control over industrial plant machinery and making them operate outside of their safe or normal performance envelope, causing damage in the process. This was a first in the history of malware.
This newly discovered variant has been dissected and analyzed in detail and here is a summary of our key findings:
A secret legal review on the use of America's growing arsenal of cyber weapons has concluded that President Obama has the power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.
That decision is among several reached in recent months as the administration moves, in the next few weeks, to approve the nation's first rules for how to defend, or retaliate, against a major cyber attack.
Internet security companies continue to study major league Cyber War weapons like Stuxnet and keep finding new angles to these powerful weapons. Stuxnet is espionage and sabotage software developed specifically to damage Iran’s uranium enrichment equipment. High-end cyber weapons like Stuxnet were designed to keep their activities hidden and they did that for longer than earlier believed. It now it appears that a beta version of Stuxnet was at work as early as 2005. It also appears that Stuxnet got into the Iranian enrichment facilities at least twice.
In this days the hacking group Team GhostShell claimed credit for the hack of servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of Michigan and also the Italian University of R