Breaching “Secure” Networks with Social Engineering and a Little Imagination
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of […] More
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of […] More
New rules go into effect this weekend that restrict electronic items in passenger cabins on U.S.-bound flights. The measures are being taken as a security […] More
The U.K. has joined the U.S. in restricting electronic devices in carry-on baggage on flights from certain countries in the Middle East, North Africa, and […] More
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections. […] More
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the […] More
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed […] More
The Cipher Brief sat down with Celina Realuyo, Professor of Practice in the William J. Perry Center for Hemispheric Defense Studies at National Defense University, […] More
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations […] More
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Security Agency and U.S. Cyber Command, only to […] More
The leak of documents allegedly describing secret CIA hacking techniques has shined a light on the intelligence agency’s use of contractors and its efforts to […] More
Despite UN resolutions and international opposition, North Korea test-launched four intermediate range ballistic missiles on Monday that reached within 200 miles of Japan. The test […] More
The military called it Operation Bumblebee: a secret program to develop a weapon that – like the insect – could take off vertically, change directions […] More
As an economic power and pivotal regional player in Asia, India is home to the second-highest number of internet users of any country in the […] More
Security researchers and policymakers around the world are struggling with the challenge of securing the digital networks that governments, private companies, and people in general […] More
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern […] More
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project […] More
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the […] More
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic […] More
Search