France Culture - Du grain à moudre - "Les cyberattaques atteignent-elles leurs objectifs?" Emission du 7 juillet 2017. Avec la participation de: Daniel ventre, Jean-Marc Manach, Nathalie Devillier. Ecouter l'enregistrement: Podcast
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Monday, July 10, 2017
Monday, July 3, 2017
MISC 92 - Villes intelligentes et questions de droit
Daniel Ventre, "Villes intelligentes et questions de droit", revue MISC 92, juillet 2017, pp.72-75. Lire extrait
MISC 92 - Reverse Engineering; ce que le droit autorise et interdit
Daniel Ventre, "Reverse Engineering; ce que le droit autorise et interdit", MISC n°92, Juillet 2017, pp.52-54. Lire extrait
MISC Hors Série n° 15 - L'internet des objets et le droit
Daniel Ventre, "L'internet des objets et le droit", MISC Hors Série n°15, juin 2017, pp.36-40. Lire extrait.
MISC 91 - Les messageries sécurisées: enjeux sociétaux
Daniel Ventre, "Les messageries sécurisées: enjeux sociétaux", revue MISC n° 91, mai 2017, pp.74-77. Lire Extrait
Journal of Cyber Warfare and Terrorism (IJCWT)
Abstract Announcement for International Journal of Cyber Warfare and Terrorism (IJCWT) Volume 7, Issue 3, July - September 2017
- Cyberspace: The New Battlefield - An Approach via the Analytics Hierarchy Process. John S. Hurley (National Defense University, College of Information and Cyberspace (CIC), Washington, DC, USA)
- Formulating the Building Blocks for National Cyberpower. JC Jansen van Vuuren (University of Venda, Thohoyandou, South Africa & CSR Defence, Peace, Safety and Security, Pretoria, South Africa), Louise Leenen (CSIR Defence, Peace, Safety and Security, Pretoria, South Africa), Graeme Plint (Department of Defense, Pretoria, South Africa), Jannie Zaaiman (Belgium Campus, Pretoria, South Africa), Jackie Phahlamohlaka (CSIR Defence, Peace, Safety and Security: CSIR, Pretoria, South Africa)
- Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach. Éric Filiol (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France), Cécilia Gallais (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France)
- Advanced Network Data Analytics for Large-Scale DDoS Attack Detection. Konstantinos F. Xylogiannopoulos (University of Calgary, Calgary, Canada), Panagiotis Karampelas (Hellenic Air Force Academy, Dekelia, Greece), Reda Alhajj (University of Calgary, Calgary, Canada)
Tuesday, June 27, 2017
The words to tell the current Petya ransomware cyberattack
What are the words used by the media to tell the current Petya ransomware cyberattack that is hitting several countries in the world?
Describing the attack:
- "Chaos"
- "massive"
- "global"
- "Unprecedented"
- "major"
- "powerful"
- "huge"
- "une attaque industrialisée"
- "scary"
The advises provided by some cybersecurity"experts":
- "to turn off and disconnect all machines using Windows"
The usual comments on attribution of the attack:
- "the perpetrator - and even the type of attack - aren't entirely clear yet"
Perspectives for the near future:
The long list of victims/targets:
- Countries: Russia, Ukraine, France, UK, Poland, The United Sates...
- Organizations, firms: WPP, Maersk, Rosneft, Saint Gobain...
Describing the attack:
- "Chaos"
- "massive"
- "global"
- "Unprecedented"
- "major"
- "powerful"
- "huge"
- "une attaque industrialisée"
- "scary"
The advises provided by some cybersecurity"experts":
- "to turn off and disconnect all machines using Windows"
The usual comments on attribution of the attack:
- "the perpetrator - and even the type of attack - aren't entirely clear yet"
Perspectives for the near future:
The long list of victims/targets:
- Countries: Russia, Ukraine, France, UK, Poland, The United Sates...
- Organizations, firms: WPP, Maersk, Rosneft, Saint Gobain...
Subscribe to:
Posts (Atom)