Great Interview by Charlie Rose of Misha Glenny and his points on the Stuxnet virus, Cyber Warfare, and Weaponry.
With increasing capabilities and proliferation of the smartphone market, nation states and cyber criminals are already organizing attacks to this platform. During InforwarCon 2010 in D.C., I interviewed Winn Schwartau who is already calling attention to the vulnerability, and then also got his thoughts on the current state of Cyber War and where the U.S. stands in the race.
Note, this video was shot and streamed live to the web using Qik and an N95 cellphone.
Facebook attended InfowarCon and Max Kelly, Director of Security for Facebook, was kind enough to grant this interview. We discuss why he's attending a military focused conference and why there is no dislike button. Note, this video was shot and streamed live to the web using Qik and a Nokia95 cell phone.
In 2009 at InfowarCon, I interviewed Mudge, a former hacker. In 1998, Mudge testified before Congress that he could take down the Internet down within 30 minutes and in this interview he maintains those same vulnerabilities exist today as we discuss the current state of cyber warfare and security, as well as how vulnerable the US power grids are to attack.
Note, in the interview Mudge refers to a nuclear bomb explosion being hacked into a live video feed in Europe. Below is that video:
During DefenceIQ's Cyber Warfare conference in London, 2010, I interviewed John Bumgarner, where we discussed the report on the Russian/Georgian cyber war, the impending reality of other state-to-state cyber wars, and the requirement of looking at smart and green energy as a possible vulnerability issue.
Per, Amit Yoran, former U.S. Dept. of Homeland Security's Cyber Security Czar, 60% of viruses and malware is undetectable by scanners and some are geared specifically to steal your banking information, remaining dormant until the malware detects banking protocols. FBI stats show cyber theft equivalent in revenue to the drug trade for myriad reasons.