Cyber Warfare

Education on Honeypots – Sharif University Courses on Honeypot Detection

There are many documents available on honeypot detection. Not too many are found as a Master's course at University levels. Sharif University as part of the Iranian institutionalized efforts to build a cyber warfare capability for the government in conjunction with AmnPardaz, Ashiyane, and shadowy groups such as Ajax and the Iranian Cyber Army is highly focused on such an endeavor. With funding coming from the IRGC, infiltration of classes and as members of academia…

Read More

Always On VPN – VyprVPN

What is a VPN and why should you be using one? The Australian Government’s recent data retention law is just the latest attack on online freedom and user privacy throughout the world. As more Governments take steps to spy on and censor its internet users, there is a simple step you can take to protect your online privacy and stop government snooping, and that is by using a VPN service. Using a VPN such as…

Read More

From Trends to Solutions 

May 27–28, 2015    Autoklub České Republiky, Prague 1, Czech Republic The 16th International Conference on Information Security IS2 (Information Security Summit) will be held in Prague, Czech Republic on 27th and 28th May, 2015. Conference is aimed at ICT and ICT security management. The main theme of this conference is: FROM TRENDS TO SOLUTIONS Programme IS2 2015  DEAR MADAM, DEAR SIR, I have, again, the pleasure to offer you the opportunity to meet the…

Read More

Religious Justification for Hacking Adversaries

Your question seems to be too general. However, Islam does stand for better cooperation and communications with nations who are not destroying and fighting us.  This is clearly stated in Almighty Allah’s saying: “Allah forbiddeth you not those who warred not against you on account of religion and drove you not out from your homes, that ye should show them kindness and deal justly with them. Lo ! Allah loveth the just dealers. Allah forbiddeth…

Read More

Social Networking Intelligence Services – High Value Targets

Social network targeting, data collection, production, analysis and reporting is very much center stage at Treadstone 71.  Intelligence of any type must be applied if it is to be useful, and it needs to be actionable. In most cases, this implies that the intelligence has to be transmitted, communicated, shared and delivered with clear recommendations and opportunities to the client. Treadstone 71 integrates counterintelligence and cyber counterintelligence as extracted and analyzed from social networking and…

Read More