When Bots Take Over Your Facebook Page
As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the […] More
As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the […] More
Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this network of […] More
With the proliferation of smart devices connected to the public internet the population of botnets – networks of compromised devices that can be leveraged for […] More
In 2010, then-Deputy Secretary of Defense William J. Lynn III made a pivotal decision for the future of cyberspace and the U.S. military: He saw […] More
The two separate worlds of electronic warfare and cybersecurity are beginning to overlap, if not collide. In the U.S. military, electronic warfare and cyber capabilities […] More
The isolation of cyber as an entirely independent domain of warfare is both inaccurate and dangerous. Today, the Pentagon faces an essential task, to integrate […] More
False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations. The Cipher Brief spoke […] More
How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others. […] More
A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber […] More
Few topics lend themselves to more polemics than government collection and exploitation of zero-day vulnerabilities, or security flaws in commercial software and hardware not yet […] More
With the seemingly constant barrage of leaks revealing the U.S. intelligence community’s hacking capabilities, many are wondering where government draws the line between priorities of […] More
Wikileaks’ “Vault7” disclosure last month of apparent CIA hacking tools marked the third recent incident in which an inadvertent public release of alleged government hacking […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-enabled theft of […] More
China is a burgeoning great power. It is continually figuring out the various dimensions of power – not least of which is power in cyberspace […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of […] More
Search