03 Jan '13, 10pm

Fascinating read on proportionality of cyber war/attack: Is this approach in recent pres directive? #cyber

It’s not just the method of infection that differs from malware to malware. All malware takes up some hard drive space or uses system memory. Generally, it’s only a small percentage of a system’s capacity, but if enough malicious code targeted a system, it could use enough system resources to affect the operation of the computer. Some malware requires the host machine to restart in order to be fully installed, just as many legitimate programs do. For this reason, part of the malicious code might be a command to force the host machine to reboot. Arguably, the forced reboot of the host machine to enable access begins the transition from mere access to cyber disruption, because rebooting “disrupts” the function of the computer for a brief period. It’s difficult to define exactly where the change occurs, because operations differ from each other in subtle ways. At some point, ...

Full article: http://smallwarsjournal.com/print/13595

Tweets

Singapore Polytechnic opens Cyber Wargame Centre for students who want to learn how to handle cyber security scenarios

Singapore Polytechnic opens Cyber Wargame Centr...

straitstimes.com 03 Jan '13, 5am

Singapore Polytechnic students will now have state-of-the art facility to learn how to handle realistic cyber security sce...

Singapore Polytechnic launches cyber wargame center

Singapore Polytechnic launches cyber wargame ce...

zdnet.com 04 Jan '13, 8am

Singapore Polytechnic has launched a Cyber Wargame Center, a facility to train "the cyberdefenders of tomorrow", where stu...

Mr. Mitnick, I presume? Africa's coming cyber crime epidemic via #gAtO ✅ #infosec #tor #security #hacking #bitcoin

Mr. Mitnick, I presume? Africa's coming cyber c...

itworld.com 28 Dec '12, 12pm

Developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of thei...