Tag Archive for: ‘weapon’

Is cyber technology the perfect weapon?


The traditional approaches and technologies used to combat threats to national security have become outdated and ineffective in the digital age. Information is now as valuable as physical assets, with a nation’s digital footprint containing both public and personal information. Unfortunately, cyber and data espionage has become increasingly prevalent in recent years, posing a significant risk to sensitive information. Cyberattack vectors have tripled in the past five years, and malicious actors have become more sophisticated in their methods. The use of cyber warfare as a primary mode of attack is a growing concern, with almost every nation, regardless of its level of development or location, engaging in it. The dissemination of propaganda and disinformation through social media has added a new dimension to this unholy war.

There are several ways in which cyberattacks can harm a nation, including shutting down energy grids, disrupting air and ground traffic, planting spyware in critical systems, and hacking into financial institutions to steal sensitive information. If personal information is compromised, it could be used for profiling purposes by foreign agencies, jeopardising national security. Even the possibility of losing access to one’s bank accounts, emails, and social media accounts is a worrisome scenario.

The potential for cyber-attacks to cause severe damage has grown exponentially. The question arises whether cyber is the perfect weapon, given its ability to penetrate almost any system and remain undetected. Firstly, it is important to understand what is meant by “perfect weapon”. In traditional warfare, a perfect weapon would be one that is effective, efficient and has minimal collateral damage. It would also ideally be easily deployable and relatively easy to acquire. When it comes to cyber warfare, these same criteria can be applied. However, there are additional considerations that come into play due to the unique nature of cyber-attacks.

One of the key features of cyber warfare the perfect weapon is its ability to remain anonymous. Unlike conventional weapons, cyber-attacks can be carried out remotely without the need for physical access…

Source…

The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms


Similarly, the US government has made only modest headway in pushing private industry, including pipeline companies, to strengthen cybersecurity defenses. Cybersecurity oversight is divided among an alphabet soup of agencies, hampering coordination. The Department of Homeland Security conducts “vulnerability assessments” for critical infrastructure, which includes pipelines.

It reviewed Colonial Pipeline in around 2013 as part of a study of places where a cyberattack might cause a catastrophe. The pipeline was deemed resilient, meaning that it could recover quickly, according to a former DHS official. The department did not respond to questions about any subsequent reviews.

Five years later, DHS created a pipeline cybersecurity initiative to identify weaknesses in pipeline computer systems and recommend strategies to address them. Participation is voluntary, and a person familiar with the initiative said that it is more useful for smaller companies with limited in-house IT expertise than for big ones like Colonial. The National Risk Management Center, which oversees the initiative, also grapples with other thorny issues such as election security.


Ransomware has skyrocketed since 2012, when the advent of Bitcoin made it hard to track or block payments. The criminals’ tactics have evolved from indiscriminate “spray and pray” campaigns seeking a few hundred dollars apiece to targeting specific businesses, government agencies and nonprofit groups with multimillion-dollar demands.

Attacks on energy businesses in particular have increased during the pandemic—not just in the US but in Canada, Latin America, and Europe. As the companies allowed employees to work from home, they relaxed some security controls, McLeod said.

DarkSide adopted what is known as a “ransomware-as-a-service” model. Under this model, it partnered with affiliates who launched the attacks. The affiliates received 75% to 90% of the ransom, with DarkSide keeping the remainder.

Since 2019, numerous gangs have ratcheted up pressure with a technique known as “double extortion.” Upon entering a system, they steal sensitive data before launching ransomware that encodes the files and makes it…

Source…

Trailer for ‘The Perfect Weapon’ Highlights the Rise and Threat of Cyber Warfare – Rolling Stone

Trailer for ‘The Perfect Weapon’ Highlights the Rise and Threat of Cyber Warfare  Rolling Stone
“cyber warfare news” – read more

WATCH: Lou Dobbs Suggests Coronavirus Could Be a Biological Weapon, Proposes U.S. Go to War With China – Mediaite

WATCH: Lou Dobbs Suggests Coronavirus Could Be a Biological Weapon, Proposes U.S. Go to War With China  Mediaite
“cyber warfare news” – read more