Ciberdefensa, Guerra Electrónica y C4ISR

By sn4fu | Artículos técnicos y noticias digitales de interés sobre Ciberdefensa, Guerra Electrónica (EW) y Sistemas de Mando, Comunicaciones, Control, Computadoras, Inteligencia, Vigilancia y Reconocimiento (C4ISR)

Group5: Syria and the Iranian Connection

<b>By John Scott-Railton,* Bahr Abdulrazzak,* Adam Hulcoop,* Matt Brooks,* & Katie Kleemola**</b> *The Citizen Lab at the Munk School of Global Affairs, …

Security

Cyber security expert Schneier warns of impending IoT disaster

Connecting real world products and appliances to the internet is setting us up for a disaster, according to cyber security expert Bruce Schneier.<p>The former chief technology officer for BT Managed Security Solutions said that hackers can do three things with data: steal it, modify it, and prevent …

Quadrooter, un riesgo para 900 millones de teléfonos Android

HummingBad, el parásito que amenaza a Android<p>El último teléfono de Samsung se desbloquea con sólo mirarlo<p>Cuatro nuevas vulnerabilidades relacionadas …

El IS ficha traductores para amenazar a España en la red

EDITORIAL: Vigilancia máxima al IS en España<p>Tres condenados del 11-M saldrán de prisión en 2017<p>La Policía ha detenido a más de 180 yihadistas en …

Locked Shields 2016

Over 550 people and a total of 26 nations are involved in Locked Shields 2016. 20 Blue Teams representing 19 nations and NATO Computer Incident …

El FBI accede al iPhone del asaltante de San Bernardino

Guide IRC

mercredi 20 avril 2016<p>Anonymous utilise plusieurs réseaux IRC accessibles uniquement par Tor pour plus de sécurité.<p>Afin de saisir la dynamique …

Jihobbiests Jabber Gibberish

No, this is not operational guidance for ISIS terrorists to use encryption<p>There have been some tweets suggesting that ISIS is directing their Belgian …

Signals, Intelligence

Signal, by Open Whisper Systems, is the gold standard for secure instant messengers. It uses the well reviewed axolotl ratchet, an improved and …

The Paris Attacks Were En Clair

This Wall Street Journal article gets the title wrong: “Paris Attacks Plot Was Hatched in Plain Sight”. What is described in the article is execution …

Man Hunting, The Sport of Security Forces

Tracking Down Salah Abdeslam<p>Bottom Line Up Front<p>Intelligence agencies must cooperate more rapidly and proactively to counter ISIS’ rapid and …

Cronología del caso Edward Snowden, el hombre más buscado del mundo

Edward Snowden pasó, de la noche a la mañana, de ser un espía a ser espiado. Esta es la cronología de sus últimos diez años.<p>El caso de Edward Snowden …

Meet China's New Spy Plane (With An Austrian Body)

It's outfitted for electronic warfare<p>The CSA-003 is China's newest Electronic Intelligence (ELINT) aircraft. Built by the China Electronic Technology Corporation's Avionics division, the CSA-003 is a family of special mission aircraft that include maritime patrol and oil spill response.<p>ELINT is a …

Aerospace

German government to use Trojan spyware to monitor citizens

Intelligence agencies in Germany can now use malware to track computers of people under suspicion. The Trojan will be able to track user chats and …

Surveillance

Germany Authorizes Police Use of Spyware for Surveillance

German courts have authorized the police in that country to load surveillance software onto computers and mobile devices, without the permission of …

Surveillance

Much of Latin America is Unprepared for Cyber Attacks - Report

Latin America needs to get on its cybersecurity game, according to a new study.

Cybersecurity

Anonymous Just Declared War on Donald Trump With a Massive Cyberattack

Once again, hacktivist collective Anonymous has threatened to take down 2016 presidential hopeful Donald Trump, this time declaring "total war" on …

Donald Trump

Hackers From China Could Be Behind Ransomware Cyber Attacks in the U.S.

Hackers using tactics and tools previously associated with Chinese government-supported computer network intrusions have joined the booming cyber …

Cybersecurity

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines

Security experts say hospitals aren't adequately protected from constant cyber attacks Illustration: iStockphotoIn real-world war, combatants …

Security

Hackers estatales chinos hacen sus negocios en la Darknet

Un investigador de la empresa de seguridad DBI busca en la Darknet (red restringida de internet que se utiliza para compartir información ilegal). …

Ciberseguridad, una tarea del Estado

Opinión: Si las entidades gubernamentales no cuentan con un presupuesto para implementar algún tipo de solución de propósito específico, pueden tomar …

Developments in Machine Learning vs. Traditional SIEM Solutions

For decades, Information security analysts have been scanning through security logs trying to find anomalies that could lead to security incidents. …

High-Seas Pirates Turn to Cyber-Espionage

Piracy is a known danger on the high seas, but one recent situation shows that the “arggghhh matey” business has evolved with the digital times. …

Ralph Goodale says Ukraine cyberattack caused 'international anxiety'

Federal review follows cyberattack in Ukraine last year that left thousands without power<p>Prime Minister Justin Trudeau has asked his public safety …

DoD policy delegates cybersecurity compliance responsibilities to military leaders

The DoD has publicly disclosed its new Cybersecurity Discipline Implementation Plan, which assigns leaders across all military branches greater …

U.S. Dept. of Defense

NATO and the European Union enhance cyber defence cooperation

NATO and the European Union face similar challenges in protecting their networks against the growing threat of cyber attacks. To help both …

Cybersecurity

Se confirma que un ciberataque causó los cortes de luz en Ucrania

El Departamento de Seguridad Nacional de los Estados Unidos emitió un reporte que confirma la causa de los cortes de luz, que afectaron a 225.000 …