The Internet of Things That Talk About You Behind Your Back SilverPush is an Indian startup that’s trying to figure out all the different computing devices you own. It embeds inaudible sounds into the webpages you read and the television commercials you watch. Software secretly embedded in your computers, tablets, and smartphones pick up the…
Category: Cyber-Warfare
The Russians Just Did a Cyber-Attack Practice Run on Ukraine’s Nationwide Power Grid…America is Next
The Russians are masters of 4th Generation Warfare. They know the United States must be attacked on several fronts to weaken it internally before a Conventional strike happens. Look for continued attacks on the Financial sector as well. A Nationwide Cyber-Attack on a Power Grid is now a stark reality folks. IMO it is not…
Cyber-Espionage: The Biggest Dangers are the Ones You Will Never Know About
For years, I slept fitfully after a “friend” told me that it wasn’t the noisy mosquitos buzzing in my ears at night that were a problem. Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night. That image wrecked my sleep until the Internet helped…
This article Will NOT Boost Your Confidence in American Cyber-Defense Capabilities
Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran’s government…
A Case Study Why Government “Encryption Back Doors” are a BAD Ideal
ENCRYPTION BACKDOORS HAVE been a hot topic in the last few years—and the controversial issue got even hotter after the terrorist attacks in Paris and San Bernardino, when it dominated media headlines. It even came up during this week’s Republican presidential candidate debate. But despite all the attention focused on backdoors lately, no one noticed that…
Russia Using the 4th Dimension of Warfare (Space) to Gain the Upper Hand in the Syrian War
While Space has been called the final frontier, it is also an untapped resource in regards to warfare. Why is America always last to know in these matters while China and Russia are first in line? The answer is quite simple: BHO. -SF Russia is employing a significant portion of its space assets to gather…
Iran: A Rising Cyber-Power?
“A Brown Water Navy” Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to meet its geopolitical goals. In testimony calling out Iran for attacks on Sands Casinos, Director of National Intelligence James Clapper put Iranian cyber capability in the…
The Sixth Dimension: DOD Could declare the Electro-Magnetic Spectrum (EMS) a Domain of Warfare
The Defense Department’s recent emphasis on the importance of the electromagnetic spectrum could be coming to a head, as the department is considering recognizing the spectrum as a sixth domain of operations, in addition to land, air, sea, space and cyberspace, which officially was declared a domain in 2011. In a statement to Breaking Defense, DOD…
A Glimpse into the Future of Electromaganetic Spectrum Weapons
The electromagnetic spectrum is where the wars of the future will be won or lost. Here’s a brief glimpse of what those battles will look like. In conflict zones from Europe to the Middle East, the electromagnetic spectrum has assumed a central place on the modern battlefield. In eastern Ukraine, Russian-backed forces have used sophisticated…
Computer Security: Email Hygiene Tips
Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…