Category Cyber War

Russian Intelligence Chief Says Easing Of Info War With West Not In Sight, Battle For Minds To Intensify

Moscow is steeped in this kind of ‘warfare;’ while the West isn’t even on first base.  RCP, fortunascorner.com www.rt.com April 27 2017 Russian Intelligence Chief Says Easing Of Info War With West Not In Sight, Battle For Minds To Intensify ‎ Strengthening information security is as important as increasing military capabilities, Sergey Naryshkin, Russia’s foreign […]

America’s Security Clearance System ‘Is Broken’ Former Spy Chief Says

America’s Security Clearance System ‘Is Broken’ Former Spy Chief Says www.fortunascoener.com      Joseph Marks has an April 27, 2017 article on the defense and national security website, DefenseOne.com, with the title above.  “The government’s failure thus far to fix long delays and dangerous imprecision in the government’s security clearance and vetting system is one […]

Air Force Issues Challenge To “Hack The Air Force”

Air Force Issues Challenge to “Hack the Air Force” 04/26/2017 04:10 PM CDT IMMEDIATE RELEASE No. NR-145-17 April 26, 2017 Air Force Issues Challenge to “Hack the Air Force” The Air Force is inviting vetted computer security specialists from across the U.S. and select partner nations to do their best to hack some of its […]

A Closer Look At CIA-Linked Malware — As CIA/FBI Search For Rouge Insider

A Closer Look At CIA-Linked Malware — As CIA/FBI Search For Rouge Insider   www.fortunascorner.com         The above is the title of an article on DarkReading.com’s website, (April 24, 2017) by Kelly Sheridan.  Ms. Sheridan first reminds readers that the CIA and FBI are conducting a joint investigation to discover who leaked the […]

The Terrorist Threat To Aviation: Back Again

The Terrorist Threat To Aviation: Back Again APRIL 26, 2017 | BRUCE HOFFMAN www.thecipherbrief.com View Original April 26th, 2017 In March, the Trump Administration imposed a new set of restrictions targeting carry-on luggage after intelligence reports indicated that terrorist organizations have been perfecting techniques to conceal explosive devices in laptop batteriesand smuggle them on board aircrafts. The […]

Outgoing CIA Lawyer Says The Top Threat Facing U.S. Is Cyber

Outgoing CIA Lawyer Says The Top Threat Facing U.S. Is Cyber By Jenna Mclaughlin, www.stripes.com View Original April 25th, 2017 During her tenure as the CIA’s top lawyer, Caroline Krass dealt with investigations into the CIA’s enhanced interrogation programs and black sites, unrest in Ukraine and Crimea, the rise of ISIS, normalizing relations with Cuba, the Syrian […]

Linksys WiFi Routers Contain At Least 10 Bugs In More Than 20 Models

Linksys WiFi Routers Contain At Least 10 Bugs In More Than 20 Models   http://www.fortunascorner.com        Ali Reza writes on the April 23, 2017 website, of HackRead.com, that “IT researchers have discovered that more than 20 different Linksys’ Routers models are leaving thousands of [brand new] devices vulnerable to outside attacks [hacks].  Tao […]

Is The United States Really Blowing Up North Korea’s Missiles?

Only the ‘shadow knows.’ RCP   Is The United States Really Blowing Up North Korea’s Missiles? There’s just no evidence to support the fantasy that Kim Jong Un’s rockets are falling prey to a super-secret U.S. cyberprogram. By Jeffrey Lewis, foreignpolicy.com View Original April 19th, 2017 The Trump administration has completed a policy review of how to […]

China’s Secret Weapon In South Korea Missile Fight: Hackers

Two can play this game.  But then again, perhaps that is why China practices to go to war ‘disconnected,’ — according to their White Paper publication of ‘Unrestricted Warfare.’   RCP, fortumascorner China’s Secret Weapon In South Korea Missile Fight: Hackers China denies it is retaliating over the Thaad missile system, but a U.S. cybersecurity […]

The 3 ‘B’s’ Of Cybersecurity [Commentary]

The 3 ‘B’s’ Of Cybersecurity [Commentary] By Scott Shackelford, fifthdomain.com View Original April 18th, 2017 Photo Credit: kirill_makarov via shutterstock.com Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack. In […]