Is the Internet of Thins a Trojan in the hands of the FSB?

The question may seem highly touted, however, it is legitimate, if we are to believe the publications made by the collective of Russian hackers Digital Revolution on its Twitter account. And to support his statements, he publishes in a shared folder several word documents and a set of screenshots taken, according to them, on servers belonging to the FSB, the Russian intelligence and security services. The documents presented show the existence of a suite of hacking tools based on the BotNet Fronton, and specialized in taking control of connected objects to transform them into attack platforms in denial of access, or DDOS, servers…

Read the article

Former Bundeswehr Laptop sold second-hand still contained classified informations

The information caused a stir across the Rhine. Computer security specialists from the company G-Data, located in the city of Bochum between Essen and Dortmund, were able to acquire a hardened laptop computer from the Bundeswehr, the German army, on eBay. However, this computer still contained classified information, in this case the user documentation for the LeFlaSys Ozelot system, the only armored close anti-aircraft protection in Germany, entered into service in 2001 and still in service today as well as in the Greek forces. The accessible documentation certainly does not have a high degree of confidentiality, since the user manual does not give any sensitive information on the system. It's about…

Read the article

Lockheed-Martin to Replace F35 ALIS Maintenance System

During the first years of the F35 program, the automated maintenance supervision system ALIS for Autonomic Logistics Information System, was presented as the Holy Grail of military aeronautical maintenance. As is often the case with revolutionary new computer systems, the reality quickly deviated from the initial ambitions. Delays in the delivery of spare parts, poor inventory management, excessive information transmitted to the American manufacturer and observed work overloads quickly deteriorated the image of the software, to the point of now being considered one of the main obstacles to improving aircraft availability. To respond to these criticisms, Lockheed will design a new, more operational system,…

Read the article

Should Western countries prepare for the “day after” of a massive cyber attack?

In an article published on the Defenseone.com website, Dr. Samantha F. Ravish, holder of the Cyber ​​and Technological Innovation Chair of the Defense and Democracy Foundation, calls for the urgent creation of a plan for the resumption of economic activity and social security of the United States, in the event of a massive cyber attack, referring to the "The Day After" plan that the Pentagon developed during the Cold War in the event of a nuclear attack on the entire American territory. Indeed, many beams today point to the growing and now sufficient capacities of countries such as China or Russia, to carry out global cyber operations against…

Read the article

The cyber security of Western satellites could be compromised

According to a report by the highly reputable British Think Tank Chatham House, satellites used for defense purposes by Western nations should all be considered as potentially compromised in the planning of weapons systems and technologies employing these systems. A complementary report also points out the vulnerabilities of Western missile systems, whether strategic, anti-aircraft defense or tactical. In these reports, the Think tank draws up an uncompromising assessment of the weaknesses in cyber warfare that characterize the use of satellite communication and location systems which, very often, have mixed civilian and military vocations, so...

Read the article

UK wants to extend NATO Article 5 to Cyber ​​attacks

NATO member countries can, if they are the object of military aggression, appeal to Article 5 of the Alliance, known as the “Collective Defense Article”. In effect, the attack against this member country would become an attack against all the countries of the alliance. However, each country would be free to choose the means it would use to fight against this aggression and provide assistance to the attacked country. This article has been invoked only once since the creation of the Atlantic Alliance, after the attacks of September 11, 2001, by the United States, which will provoke the intervention of NATO in Afghanistan. Faced with the resurgence of cyber attacks against targets of more than…

Read the article

US says cyber-attack on Japan will imply US response

Nearly 60 years after signing their Mutual Cooperation and Security Treaty, the United States and Japan officially integrate cyberspace into their mutual defense policy. From now on, a cyberattack against one will characterize an armed attack within the meaning of Article 5 of the Treaty and may lead to a collective response. On the occasion of a "2+2" meeting in Washington, the American and Japanese Ministers of Foreign Affairs and Defense affirmed their desire to strengthen their multi-domain cooperation as a priority in "space, cyberspace and the electromagnetic spectrum. The heightened tensions around the South China Sea and the games…

Read the article

A historic first, Israel responds to a cyberattack by a missile strike

On the eve of the month of Ramadan, an unprecedented bout of violence between Israel and the Gaza Strip since 2014 cost the lives of 23 Palestinians and 4 Israelis. 690 rockets targeted Israeli territory while more than 350 Palestinian targets were targeted in retaliation by the Jewish state. During these exchanges of fire, and for the first time in history, a State claims to have responded to a cyberattack by conventional means. After initially thwarting a Hamas computer attack, the IDF retaliated against a building in Gaza that housed Hamas cyber fighters.

Read the article

US Army strengthens cyber defense with field units

While Cyber ​​Defense of the United States is the responsibility of Cyber ​​Command, the US Army is currently deploying cyber forces intended to intervene in support of contact forces, across the entire electromagnetic spectrum. The 915th Cyber ​​Warfare battalion is already in charge of training and equipping 12 cyber teams of 45 soldiers, who will intervene at the division level, in support of the forces on the electromagnetic spectrum, both from a defensive point of view, to preserve the integrity of control and communication systems, than offensive. At the same time, the US Army is joining the Joint Cyber ​​Warfighter Architecture program, intended to provide the tools and mythologies of cyber…

Read the article

Chinese GANs to manipulate satellite imagery

According to Todd Myers of the US National Geospatial Intelligence Agency, China is implementing Generative Antagonist Network (or GAN) technologies to trick computers responsible for satellite imagery. As AIs crop up across the entire defense ecosystem, it sometimes feels like we're reinventing the wheel. GAN technology, introduced in 2014 by a group of researchers (GoodFellow & al, 2014), makes it possible to generate fake or fictitious images. She is able to make a bridge appear or even set up a missile launch site that does not exist on an image. Yet the implications of...

Read the article
Meta-Defense

FREE OF CHARGE
See