Some things on computer viruses, Trojans, worms, exploits. Ect..

bug

The first computer bug http://www.computerhistory.org/tdih/September/9/

https://en.wikipedia.org/wiki/Computer_virus

http://www.washingtonpost.com/wp-dyn/articles/A50636-2002Jun26.html

https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms

Duqu_Stuxnet

https://en.wikipedia.org/wiki/Duqu

https://en.wikipedia.org/wiki/Stuxnet

http://www.techworld.com/news/security/duqu-trojan-mystery-programming-language-identified-as-old-school-c-3345391/

https://en.wikipedia.org/wiki/Flame_(malware)

http://www.welivesecurity.com/2012/07/20/flame-in-depth-code-analysis-of-mssecmgr-ocx/

http://www.wired.com/2012/09/flame-coders-left-fingerprints/

Inside the Duqu Command and Control Servers

https://youtu.be/nWB_5KC7LE0

http://www.welivesecurity.com/2012/08/15/interconnection-of-gauss-with-stuxnet-duqu-flame/

Gauss

http://arstechnica.com/security/2013/03/the-worlds-most-mysterious-potentially-destructive-malware-is-not-stuxnet/

http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Discover_Gauss_A_New_Complex_Cyber_Threat_Designed_to_Monitor_Online_Banking_Accounts

http://kasperskycontenthub.com/wp-content/uploads/sites/43/vlpdfs/kaspersky-lab-gauss.pdf

DUQU 2.0

https://www.schneier.com/blog/archives/2015/06/duqu_20.html

https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf

heart bleed

https://en.wikipedia.org/wiki/Heartbleed

https://www.schneier.com/blog/archives/2014/04/heartbleed.html

http://recode.net/2015/07/27/heartbleed-for-mobile-researcher-finds-massive-security-flaw-in-android/

RSAAPTGraphic

http://blog.trendmicro.com/trendlabs-security-intelligence/2014-annual-security-roundup-magnified-losses-amplified-need-for-cyber-attack-preparedness/

zero-day

https://en.wikipedia.org/wiki/Zero-day_(computing)

http://www.forbes.com/sites/andygreenberg/2012/10/16/hackers-exploit-software-bugs-for-10-months-on-average-before-theyre-fixed/

https://www.recordedfuture.com/zero-day-patch/

http://www.networkworld.com/article/2224620/microsoft-subnet/u-s–government-is–biggest-buyer–of-zero-day-vulnerabilities–report-claims.html

http://thehackernews.com/2015/07/java-zero-day-vulnerability.html

http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html

http://thehackernews.com/2015/07/internet-explorer-browser.html

https://news.ycombinator.com/item?id=2835288

http://www.wired.com/2015/07/hacking-team-shows-world-not-stockpile-exploits/

nsa-golden-nugget

golden nuggets

http://gawker.com/apps-like-google-maps-and-angry-birds-have-been-leaking-1509941627

http://www.wired.com/2013/05/pentagon-cyberwar-angry-birds/

a fast history reference with operation gold

https://en.wikipedia.org/wiki/Operation_Gold

https://digitalguardian.com/blog/history-data-breaches

http://www.bloomberg.com/news/articles/2015-04-18/russian-hackers-use-zero-days-in-attempt-to-get-sanctions-data

In a way I liked the fire eye web page for monitoring attacks I’ll put a link to it here.

https://www.fireeye.com/ and the threat map https://www.fireeye.com/cyber-map/threat-map.html

fire eye

https://en.wikipedia.org/wiki/Computer_worm

http://www.theverge.com/2012/1/28/2753951/computer-viruses-infect-worms-frankenmalware

https://en.wikipedia.org/wiki/Trojan_horse_(computing)

and for comedy value

Trojan Horse – The Chaser

https://youtu.be/Xs3SfNANtig

https://en.wikipedia.org/wiki/Logic_bomb

A irony considering the suit they developed or help curate in the NSA

http://www.huffingtonpost.com/2011/06/13/panetta-cyberattack-next-pearl-harbor_n_875889.html

though it does go to the question of was irans nuclear program that pearl harbor and how well can you trust the NSA/CIA/FBI ect..

http://fortune.com/2014/01/06/cybersecurity-is-for-the-c-suite-not-just-the-it-crowd/

https://en.wikipedia.org/wiki/Tailored_Access_Operations

https://en.wikipedia.org/wiki/NSA_ANT_catalog

https://nsa.gov1.info/dni/nsa-ant-catalog/

CIA investment firm

https://en.wikipedia.org/wiki/In-Q-Tel

https://mattermark.com/106-startups-who-received-investment-from-the-c-i-a-most-frequent-in-q-tel-co-investors/

Though they have palinter and fire eye and such. I would stress here that other countries have versions of the same.

http://thediplomat.com/2015/02/japan-hit-by-cyberattacks-at-an-unprecedented-level/

http://www.atlanticcouncil.org/blogs/natosource/russian-military-creating-cyber-warfare-branch

Amazing 3D cyber-attack alert system NICT Daedalus, Japan, 06.2012

https://youtu.be/3MDp3xiuV2o

zero-day-new010credsymantec

Misc.

http://www.wired.com/2012/01/social-radar-sees-minds/

http://www.wired.com/2011/12/hey-loser-you-cant-hide/

http://opencatalog.darpa.mil/CRASH.html

mel-brooks-spaceballs

http://gizmodo.com/for-20-years-the-nuclear-launch-code-at-us-minuteman-si-1473483587

https://en.wikipedia.org/wiki/Dead_Hand_(nuclear_war)

Keeping Secrets: Cryptography In A Connected World – Full Program

https://youtu.be/nVVF8dgKC38

Prepare, Detect, Respond, And Harden: Palantir Cyber In Action

https://youtu.be/6mIQmL2Lapw

https://nakedsecurity.sophos.com/2015/02/19/breakthrough-in-facial-recognition-the-deep-dense-face-detector/

https://firstlook.org/theintercept/2015/02/19/great-sim-heist/

http://phys.org/news/2015-07-black-hat-scary-area-android.html

Detection of Advanced Attacks with a CPU Level Sandbox Technology

https://youtu.be/kCGNyavosI0

http://www.eweek.com/security/darpa-project-uses-big-data-to-find-fix-software-security-flaws.html

https://www.fbo.gov/index?s=opportunity&mode=form&id=00accaaa6956d9f07d63c3b331de09c2&tab=core&_cview=1

Next gen cyber.

http://www.wired.com/2014/05/darpa-is-using-oculus-rift-to-prep-for-cyberwar/

http://arstechnica.com/information-technology/2014/06/darpa-prepares-2-million-cyber-warfare-challenge-for-def-con-2016/

Expect the cyber weapons suits to expand and become more versatile. A library of viruses, Trojan horses, malware, bug’s, exploits like zero days, logic bombs, worms, and back doors. Even expect A.I. driven cyber war suits when they get to them. I’ll post a video on that later in this piece. From industries to stock markets to infrastructure. Nothing connected to the internet will be safe if cyber war erupts.

The next gen will have a wide range of tools to use. From fackbooks deep face mining and other social networks used to mine faces. To palinter big data sifting programs for links to fire eye like programs for real time threat monitoring. Information may be a click away. Incorporated into one suite with defensive as well as offensive tool sets to deploy. They would need a system that works across platforms. ( MS OS’s, Apple OS’s, Google, Linux, Ect..) With lists of types of known vulnerabilities to deploy.

https://en.wikipedia.org/wiki/Plan_X

http://www.darpa.mil/program/plan-x

http://www.informationweek.com/government/cybersecurity/plan-x-darpas-revolutionary-cyber-security-platform/d/d-id/1320022

Moving into the cyber battlespace with Plan X

https://youtu.be/-BTLVId6bs8

StartingMission%20(1)

Now the scary or thrilling part. A.I. or code that writes it’s own code, and how it may link in with cyberwar.

http://www.darpa.mil/news-events/2015-07-08

http://news.rice.edu/2014/11/05/next-for-darpa-autocomplete-for-programmers-2/

http://www.raytheon.com/news/feature/darpa_cyber_challenge.html

Secure-Military-Computers-With-Biometrics-647x384_1421389442

Notice what he says about the darpa project.

The Future of Artificial Intelligence Robots and Beyond

https://youtu.be/2NaGLPzwon4

Now for a last bit of fun

18ls5s64g43pmjpg

http://www.theregister.co.uk/2013/11/04/google_living_omega_cloud/

http://www.wired.com/2012/03/dugan-darpa-google/

http://www.theregister.co.uk/2013/11/15/google_thinking_machines/

countdown1

Will A.I. have a cyber warfare suite built into it?

Advertisements

About laborious

Interests in science, art, math, theory, game engines, future technology.
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s