MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
June 2009
Stew Magnuson
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. mark for My Articles similar articles
InternetNews
March 12, 2009
Kenneth Corbin
Lessons From the Russia-Georgia Cyberwar Georgian official and U.S. security experts look back at the Internet attack that preceded the military conflict. mark for My Articles similar articles
PC World
August 21, 2007
Robert McMillan
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. mark for My Articles similar articles
InternetNews
August 13, 2010
Is the U.S. Ready for a Cyberwar? And if not, what's the worst that can happen? Cybersecurity expert Scott Borg painted a grim picture of the future of warfare this week at the USENIX security conference. mark for My Articles similar articles
The Motley Fool
January 26, 2011
Rich Smith
Welcome! You've Got Computer Worms! While the U.S. only targeted Stuxnet into Iran's nuclear centrifuge labs, the worm didn't stay stuck on it. Already, the worm has leaked out of Iran and into Symantec's virus filters. mark for My Articles similar articles
InternetNews
September 27, 2010
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. mark for My Articles similar articles
IEEE Spectrum
September 2010
Robert W. Lucky
Cyber Armageddon The author reflects on the latest fashion in end-of-the-world scenarios mark for My Articles similar articles
National Defense
October 2010
Stew Magnuson
Expert Warns of Nexus Between Cybercriminals and Terrorists Terrorists who want to stage a cyberattack against the United States may lean on criminal networks to assist them, a former Defense Department official said. mark for My Articles similar articles
Wired
August 23, 2007
Ralph Peters
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
Parameters
Summer 2005
Michael H. Hoffman
Rescuing the Law of War: A Way Forward in an Era of Global Terrorism Terrorists are gaining an astonishing legal edge over US and other armed forces deployed against them. Judicial intervention in the law of war since September 11, 2001 already far exceeds anything ever before experienced, by any nation, in the history of warfare. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
InternetNews
August 4, 2009
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. mark for My Articles similar articles
InternetNews
April 15, 2010
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
InternetNews
November 17, 2009
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." mark for My Articles similar articles
National Defense
February 2009
Sandra I. Erwin
Foreign Policy Ambition Overlooks War Lessons The Obama administration has endorsed a major expansion of ground forces, and a surge in military capabilities to conduct "irregular" warfare against non-state actors. mark for My Articles similar articles
IEEE Spectrum
March 2013
David Kushner
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
Reason
February 2002
Chris Bray
The Media and GI Joe How the press gets the military wrong -- and why it matters... mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles similar articles
Wired
August 21, 2007
Joshua Davis
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. mark for My Articles similar articles
National Defense
November 2009
Stew Magnuson
Debate Over Rules, Legality of Robots On The Battlefield Lagging, Experts Say As researchers push ahead with algorithms designed to give robots more autonomy, ethicists and legal minds warn that not enough thought is being given to the implications of using unmanned systems to apply lethal force. mark for My Articles similar articles
Parameters
Spring 2006
Anthony Vinci
The "Problems of Mobilization" and the Analysis of Armed Groups This article attempts to lay the foundation for a more agile, rationalized system of analysis for all types of armed groups which can take into account the evolving and adapting nature of contemporary armed groups. mark for My Articles similar articles
National Defense
June 2009
Sandra I. Erwin
Predicting the Outcome of War: Can Science Help? Digital simulations are staples of military war games. They can be used to recreate just about every aspect of combat. But simulating the complex scenarios of "irregular" warfare is one of the toughest challenges that the Defense Department now faces. mark for My Articles similar articles
BusinessWeek
February 17, 2011
Simpson & Fam
Egypt's Army Marches, Fights, Sells Chickens The armed forces have a substantial stake in Egypt's civilian economy through a host of government-owned service and manufacturing companies. mark for My Articles similar articles
IDB America
February 2002
Charo Quesada
Armies for peace A former Spanish defense minister calls for democratization of the military in Latin America... mark for My Articles similar articles
National Defense
March 2014
Robert Johnston
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
Military & Aerospace Electronics
October 2007
John Keller
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? mark for My Articles similar articles
CIO
October 14, 2011
James Niccolai
US Companies Pushed to Disclose Cyberattacks New guidelines from US regulators throw a spotlight on disclosure of cyber-incidents. mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
Parameters
Summer 2006
David W. Barno
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. mark for My Articles similar articles
Job Journal
August 17, 2008
Military Service Joining the military is a surefire way to boost your future potential. mark for My Articles similar articles
InternetNews
June 22, 2010
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. mark for My Articles similar articles
InternetNews
January 19, 2011
Researcher Looks to Demystify Stuxnet Threat Securicon's Tom Parker is planning to present research at the Black Hat security conference describing a technical analysis of the feared threat of the Stuxnet worm, offering some tips for mitigation. mark for My Articles similar articles