Middle East Cyberwar Update (Part VI)

Looks like Israel has approached a “wait and see” strategy, as these last days of cyber war have seen almost

Read more

Exclusive Infographic: All Cyber Attacks on Military Aviation and Aerospace Industry

Cross Posted from TheAviationist. 2011 has been an annus horribilis for information security, and aviation has not been an exception

Read more

Middle East Cyber War Timeline (Part 5)

Click here for the Middle East Cyber War Master Index with the Complete Timeline. This week of Cyber War on

Read more

February 2012 Cyber Attacks Timeline (Part I)

February 2012 brings a new domain for my blog (it’s just a hackmaggedon) and confirms the trend of January with

Read more

Middle East Cyber War Timeline (Part IV)

Another week, another wave of attacks between the two cyber contenders (here: Part I, Part II, Part III). After some

Read more

DDoS: When Size Matters… Or Not?

Arbor Networks and Radware, probably the two leading vendors focused on DDoS prevention and mitigation, have just published nearly in contemporary (probably not a coincidence) their 2011 reports which analyze, with similar methodologies applied to different stakeholders, one year of DDoS Phenomena occurred during the last year.... Read More

Read more

Middle East Cyber War Timeline Part III

Jan 22: Middle East Cyber War Timeline Part I Jan 29: Middle East Cyber War Timeline Part II Feb 12:

Read more

Crime As A Self Service

One of the most visionary information security predictions for 2012, was the one issued by Fortinet which defined the term Crime As A Service: “Crime as a Service (CaaS), […] is just like Software as a Service (SaaS), but instead of offering legal and helpful services though the Internet, criminal syndicates are offering illegal and detrimental services, such as infecting large quantities of computers, sending spam and even launching direct denial of service (DDoS) attacks“. At first glance I marked this prediction as exaggerated but then I could not imagine that I should have witnessed a huge demonstration only few days after. Of course I am referring to the #OpMegaUpload when, immediately after the FBI takedown, the Anonymous redirected users towards a website when they could DDoS a large group of targets with a simple web click and most of all, without the need to install the Infamous LOIC.... Read More

Read more

January 2012 Cyber Attacks Timeline (Part 2)

Click here for part 1. The second half of January is gone, and it is undoubtely clear that this month

Read more
%d bloggers like this: