Skip to main content

Home/ CyberTerrorisme/ Contents contributed and discussions participated by stéphane koch

Contents contributed and discussions participated by stéphane koch

stéphane koch

Stuxnet, l'ombre du cyber-terrorisme - Vu sur le web - Nouvelobs.com - 0 views

  •  
    "Stuxnet. Un ver informatique qui fait aujourd'hui frémir tous les services de renseignements à travers le monde. Autonome, ce ver se propage et se met à jour d'ordinateur à ordinateur via Internet, mais aussi via les clefs USB, les accès Wi-Fi ou les réseaux d'imprimantes. Capable d'infecter et de se répliquer sur tous les systèmes Windows, Stuxnet ne vise pourtant que les systèmes SCADA, une technologie qui équipe la plupart des centrales électriques, hydrauliques, chimiques, nucléaires, etc."
stéphane koch

Cyber Risk (OECD) - 0 views

  •  
    "This report is part of a broader OECD study into "Future Global Shocks", examples of which could include a further failure of the global financial system, large-scale pandemics, escape of toxic substances resulting in wide-spread long-term pollution, and long-term weather or volcanic conditions inhibiting transport links across key intercontinental routes." Complément; Internet 'kill switch' could cause chaos, OECD report warns http://www.oecd.org/dataoecd/57/44/46889922.pdf OECD's Cyber Report Misses Key Facts http://blogs.forbes.com/jeffreycarr/2011/01/19/oecds-cyber-report-misses-key-facts/
stéphane koch

2011 NATIONAL CYBERTERRORISM CONFERENCE (San Diego, CA 92106) - 0 views

  •  
    BACKGROUND: In the last two years, various nation states and unidentified attackers have shown that relatively low-cost cyber attacks can disrupt a nation's economy and threaten its critical infrastructure. That ability and threat is attractive to foreign terrorist organizations that increasingly seek to conduct asymmetric attacks on the U.S. from abroad. In 2010, over 30% of all malware ever created was released on the internet, China was able to divert 15% of internet traffic to its servers, and the Stuxnet virus showed that a nation's critical infrastructure could be disabled through technological means. Al-Qaeda also launched Inspire Magazine online, which served to radicalize terrorists using the internet as a means to distribute terrorist propaganda, and to inspire physical attacks on the homeland. As cyber attacks become more prevalent and sophisticated, the military, law enforcement and the greater government must become more knowledgeable and engaged in the fight against them. Foundry would like to enhance the nation's ability to counter these threats by educating law enforcement, intelligence analysts, critical infrastructure personnel, the military and policy makers
stéphane koch

Information on "Cyberterrorism" - 0 views

  •  
    Ressources composées de divers articles et publications (en partie gratuites), mises à disposition par The International Relations and Security Network (ISN) Plus d'information: http://www.isn.ethz.ch/isn/About-Us/Who-we-are
stéphane koch

Cyber Attacks Target Human Rights Groups - www.esecurityplanet.com - 0 views

  •  
    A Harvard University study has found that hackers are increasingly attacking the web sites of human rights and independent media groups.
stéphane koch

Summarizing 3 Years of Research Into Cyber Jihad - 0 views

  •  
    Dancho Danchev est un des meilleurs analyste des modèles cyber-criminles ou cyber-terroristes...
stéphane koch

Critical briefing on attacks against Industrial Control Systems especially SCADA systems - 0 views

  •  
    Over the past few weeks Stuxnet created large amount of hype in the mainstream media. Some agents are exploiting this hype and filling newspapers and blogs with speculation. Of course the Stuxnet story involves different countries, cyberspace, infected power plants and Iran who would not report about this? People are excited to hear how fiction becomes reality. This relatively short paper maps severe cyber-incidents from as early as 1985 onwards and adds some critical perspective to the mainstream hype around Stuxnet. (Florian Grunert & Sebastian Kautz, MA - info@study4cyberwar.com - twitter.com/study4cyberwar 11/23/2010)
stéphane koch

Vidéo: La lutte contre le cyber terrorisme s'intensifie - TF1 - 0 views

  •  
    "Résumé : La menace terroriste est très présente en ce moment, notamment depuis internet. La Grande-Bretagne parle même de la nécessité d'une "force de dissuasion" pour contrer les pirates. "
stéphane koch

Professional hacker - Website hacking - Private exploits - Hacked accounts and many more! - 0 views

  •  
    Exemple d'un site offrant des services de piratage contre rémunération (source Pierre Caron, expert en sécurité) Article complémentaire sur ce site (anglais): Major government websites hacked with access for sale http://www.net-security.org/secworld.php?id=10474
stéphane koch

Cyber-jihad group implicated in massive virus attack earlier this week - Jihad Watch - 0 views

  •  
    The security vendor SecureWorks has traced the virus to a cyber-jihad group called Tariq ibn Ziyad, named after an 8th-century Muslim conquerer of Spain (also the name of the "Minnesota Madrassa" we have covered here, if the name seems familiar). The symbolism of the name is indeed telling
stéphane koch

Cyberterrorism - The use of the Internet for terrorist purposes - 0 views

  •  
    "Cyberterrorisme - L'utilisation de l'Internet à des fins terroristes" (publié en 2008 dans la Série Terrorisme et Droit du Conseil de l'Europe) rassemble les résultats des travaux du CODEXTER dans ce domaine ainsi que les instruments juridiques pertinents. Cette publication observe la situation dans les Etats membres et observateurs du Conseil de l'Europe et donne un aperçu détaillé des questions en jeu.
stéphane koch

Cyberterrorism database - 0 views

  •  
    Le cyberterrorisme et l'utilisation de l'Internet à des fins terroristes constituent une menace sérieuse, beaucoup d'aspects de la société moderne dépendant entièrement du fonctionnement des systèmes informatiques et de l'Internet. Suite à l'adoption par le Conseil de l'Europe de la Convention sur la Cybercriminalité (2001) et de la Convention pour la Prévention du Terrorisme (2005), le Comité d'Experts sur le Terrorisme (CODEXTER) a étudié la situation dans les états membres afin d'évaluer si les instruments internationaux existants suffisent pour répondre à cette menace émergente.
stéphane koch

The State of Cybercrime [STATS] - 0 views

  •  
    Analyse du marché gris de l'économie de la cybercriminalité Le dossier complet au format PDF: http://press.pandasecurity.com/wp-content/uploads/2011/01/The-Cyber-Crime-Black-Market.pdf
‹ Previous 21 - 33 of 33
Showing 20 items per page