Recent Endorsements

You've left us really enthused about the whole digital dimension and we're looking forward to developing our plan with your support.
Simon Beardow - Deputy Director, British Council, Vietnam

Showing posts with label Cyberwarfare. Show all posts
Showing posts with label Cyberwarfare. Show all posts

Friday, 22 March 2013

Serious about Security? This is one Site you should Bookmark

Based on the statistics from the early warning system of Deutsche Telekomthis portal shows real-time cyber attacks and where they are happening in the world. Ninety global sensors contribute the data.

Deutsche Telekom AG
The Top 5 source countries confirms our worst fears about the volume of attacks emanating from the Russian Federation, with Taiwan trailing a distant second.  But it is worth noting these locations are not necessarily the offending hackers’ country of origin as most attacks are automated and seek out the weakest system to exploit.
Enhanced by Zemanta

Wednesday, 6 July 2011

Social Media and Cyber Warfare




Security threats have been on the rise ever since the death of Osama bin Laden. These threats vary from spam attacks to very serious politically motivated, foreign nation attacks. According to Charles Dodd, a government consultant for cyber defense, social networks are adding to this string of attacks because terrorists are using them to find information and recruit others to join their cause.

He also points out that these terrorist camps are "well-versed in how to get past our good senses," which is why they are reaching out on places consumers are comfortable, such a social networks. Another challenge involved is privacy concerns, which creates a two-sided problem.
Source: WebProNews

Not that governments can count upon the accuracy of what they are viewing in social media. As Paolo Passeri in his article on the Consumerization of Warfare states:

The main security concern relies in reputation, a bless and a curse for Social Networks. As already mentioned, in the specific circumstance the tweets of war were checked with “traditional” methods (anyway this is already an advantage since it is easier to check the veracity of a received information, rather than probing satellite images search for enemy outposts), but, generally speaking in absence of verification means, there is no guarantee concerning the truthfulness of a tweet, which, for instance might have been modified or manipulated up to the point of reversing the original content.
Enhanced by Zemanta

TheDigitalConsultant Shop



Blog Archive