Security Experts:

long dotted


The security software firm Kaspersky has become the focal point in an escalating conflict in cyberspace between the United States and Russia. [Read More]
Israeli spies observed Russian government hackers in real time as they scoured computers around the world for the codenames of US intelligence programs, The New York Times reported. [Read More]
Hackers likely affiliated with the North Korean government seem to lack the ability to disrupt the U.S. power supply, according to a new report from FireEye. [Read More]
President Trump issued a memorandum on Oct. 5 requiring the intelligence community to establish an inter-agency information sharing network. [Read More]
Hackers could have easily infiltrated US voting machines in 2016 and are likely to try again in light of vulnerabilities in electronic polling systems, a group of researchers said Tuesday. [Read More]
Jeremy Fleming, director of the UK's GCHQ, says the spy agency is "coming out of the shadows to protect Britain's economy" from cyber-criminals. [Read More]
North Korean computer hackers reportedly stole hundreds of classified military documents from South Korea including detailed wartime operational plans involving its US ally. [Read More]
Iran-linked threat group OilRig has been using a new Trojan in attacks aimed at entities in the Middle East [Read More]
A new report in the Wall Street Journal attempts to provide the evidence that directly ties Russian security firm Kaspersky Lab to the Russian government, but it offers no evidence and comes from anonymous, unnamed sources. [Read More]
Attackers inject themselves into ongoing email exchanges in highly targeted spear-phishing attacks aimed at entities around the world [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Oliver Rochford's picture
We have an entire commercial class of security professional, but very few hackers. Where are our cyberwarriors? Where will they be when we really need them? With us, or against us?
Alan Wlasuk's picture
The world’s expectations of breach-proof SSL certification agencies have been shattered. As expected all of the ruling bodies that control the Internet have rallied to identify the root causes of these breaches and are working on future preventable mechanisms.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Robert Vamosi's picture
Protecting Internet connected devices from the start and protecting them at the chip level needs to be a priority. But do we really need a full-scale cyber attack to make that so?
Alan Wlasuk's picture
Cyber Will be part of any future conflict, whether it's a nation state or terrorism, according to a long time CIA veteran. We are looking towards a time when nations will launch online attacks and extremist groups will add cyber attacks to their tactics.
Ram Mohan's picture
Soldiers more comfortable studying code on a laptop screen than staring down the sights of a rifle will play a key role in future battles. The weapons stockpiles of the future will include stashes of zero-day vulnerabilities, botnets, control codes and sophisticated malware.
Mike Lennon's picture
Many experts believe the incident was a state-sponsored attack connected to foreign governments, and though the IMF has been quiet on the issue, if this is the case, it’s likely that the attacker is an IMF member.
Irida Xheneti's picture
The risks are real, and growing more complex by the month. That doesn't mean you're powerless to keep your infrastructure and data secure.
Noa Bar-Yosef's picture
Governments around the globe are adopting very different approaches to how citizens can engage online. Sometimes it has proven to be a double-edged sword.
Terry Cutler's picture
It appears that Canada’s Finance, Defense Research and Development departments, as well as the Treasury Board, were hacked back in February. Although confirmation is pending, the attack seems to be the work of patriot hackers, using computer servers based in China.