Tag Archives | Cyber Warfare
Hackers, Crackers, Stratfors and the Cyber Arms Race

Hackers, Crackers, Stratfors and the Cyber Arms Race

In Michael Jang’s work on building strategic security strategies, he separates the Microsoft and Linux or OpenSource communities right out of the gate.  The definitions of the folks responsible for growing the multi trillion dollar cyber security market look like this. The Windows world diverges from the Linux or Open Source world by accepting the [...]

Read full story Comments { 0 }
Tech Update 2012

Tech Update 2012

What are your hot button issues for the New Year?  Let us know what you want to hear about and discuss and we’ll see what we can do for you.  Our plans this year include exclusive video coverage from Silicon Valley and local trade shows.  If you are exhibiting and would like your video or [...]

Read full story Comments { 0 }
Hack Group Anonymous Takes On Cartel; U.S. Drug Enforcement Deals

Hack Group Anonymous Takes On Cartel; U.S. Drug Enforcement Deals

Anonymous, those pesky hackers, and the U.S. government are taking different tacks on how to get Mexican drug gangs to stop poisoning our citizens and stop the bloodshed and release those they are holding. After a kidnapping of an Anonymous operative, the hacker group proceeded to threaten one gang, Los Zetas, to force them to [...]

Read full story Comments { 0 }

Governments In Glass Houses & Babies Out With The Bathwater

So much for the, “hacker as petty criminal” motif Western nations have used the last dozen or so years.  So if you have any hacking skills, it’s a good time to market them to a government who is fighting cybercrime as you are in demand.  Either that, or you may find yourself in the history [...]

Read full story Comments { 0 }

Protecting Internet By Shutting It Down

The title, Protecting Cyberspace as a National Asset Act, say sponsors and Senators led by Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Federal Financial Management Subcommittee Chairman Tom Carper, D-De, is essential because they want to protect the Internet from attacks which we know are constant [...]

Read full story Comments { 0 }

Operation Payback: Power2All and Bizzaro, hacktivists

If you’re trying to decide what the real story is regarding Wiki Leaks, you’re not alone. Over the last few years of its existence, many have wondered which way it would turn and which way its detractors would follow. Yet, from what we know about the Internet is that, if information exists, someone will get [...]

Read full story Comments { 0 }

Hack Wars

I called Cindy at her shop and got my hair cut the other day. We mused about the gorgeous November weather here in California, and she admitted she did not look forward to a holiday visit to China to see her family. She said she was used to our weather and January in Beijing was [...]

Read full story Comments { 0 }

Have California Candidates Considered China?

As Silicon Valley goes, so goes Northern California, then the country. Silicon Valley, being the best metaphor for Technology, is the logical successor to the last Industrial Age, and software, naturally, will lead the world. This is exactly why the Google issue and China’s plans for the future is central to our livelihoods. Shel Israel [...]

Read full story Comments { 2 }

The Informationization Age

I wish I was as clever with words as Steven Colbert, but wait till you hear about the Informationization Age. Putting aside the largest market in the world available to Google, it takes guts to stand up to China for any damn reason. According to the latest intrusion, on Google’s infrastructure, "at least twenty other [...]

Read full story Comments { 0 }

Mismanaged Privileged Accounts: A New Threat To Your Sensitive Data

In mid-October the USCC congressional commission gave IT professionals an early Halloween scare with its report on an emerging cyber warfare threat. The 88 page document, compiled by a team at Northrop Grumman, presents in unsettling detail the anatomy of a 2008 attack on a US company’s IT infrastructure that succeeded in providing at least [...]

Read full story Comments { 0 }