Logo

    cyberwar

    Explore " cyberwar" with insightful episodes like "Tech News: Elon Wants His Musk All Over Twitter", "MI: Ukrainian Pitch in War Time with Vlad Savchenko from EASE", "103 | Angriff der Couchkrieger", "Cyberwar – der Krieg im Netz" and "Warfare in the Digital Era" from podcasts like ""TechStuff", "MI: Ukrainian Pitch", "Zerteilte Zukünfte", "hr-iNFO Netzwelt" and "All Things Policy"" and more!

    Episodes (42)

    MI: Ukrainian Pitch in War Time with Vlad Savchenko from EASE

    MI: Ukrainian Pitch in War Time with Vlad Savchenko from EASE

    Vlad Savchenko – Ukrainian IT businessman, President of the European association of software engineering, founder of Powercode — International IT company and Foodex24 delivery service.
    Dominique Piotet discussed with Vlad the situation in IT market of Ukraine during wartime.

    https://it-ease.com/en/

    MAYAK INNOVATSIY: Ukrainian Pitch is produced and sound engineered by ThePodcast.Bar.

    103 | Angriff der Couchkrieger

    103 | Angriff der Couchkrieger

    Ist die völkerrechtswidrige Invasion der Ukraine durch Russland unser (europäisches) 9/11?

    Irgendetwas ist jedenfalls anders, nicht nur in der Politik, wo im Minutentakt ehemals heilige Kühe geschlachtet werden. Dieses Andere ist bei uns allen, auf unseren Smartphones, in unseren Timelines. Nicht nur auf offiziellen Kanälen, sondern überall ist der Krieg und wir sind mittendrin, wir leiden mit, solidarisieren uns, wollen helfen und werden so Teil eines neuen Teils des Kriegs, des Social Media-Kriegs.

    Was mit der ukrainischen Flagge noch harmloser Ausdruck der eigenen Positionierung ist, schwappt dann ins reale Leben, radikalisiert sich in Wir-Gegen-Sie-Konfliktlogiken, unterfüttert von den Algorithmen der Social Media-Plattformen.

    Jeder, der sich nicht schleunigst positioniert wird gecancelt und am schlimmsten Ende bedroht oder gar physisch angegriffen bis hin zu Brandanschlägen auf deutsch-russische Schulen in Berlin.

    Wir die Couchkrieger schreiben Petitionen, klicken, sharen, liken was das Zeug hält und manche von uns schreiben sogar Gegenpropaganda-Restaurantreviews bei Google oder spammen Tinder in Russland mit Hilfe von Tinder Passport voll.

    Wo könnte das in dieser Logik der Social Media-Eskalation enden? Was könnte es bedeuten, wenn Privatpersonen oder Gruppen wie Anonymous auch militärische Fakten schaffen?

    Jan und Patrick hinterfragen in dieser Folge unsere Aktivitäten im Cyberspace, deren Konsequenzen für diesen sehr realen Krieg nur schwer zu erfassen sind.

    ---

    Jan Claas van Treeck, PhD (Techtheoretiker, Dozent an der Hochschule Fresenius Hamburg) Twitter: @jcvantreeck

    Patrick Buchholz (Medienwissenschaftler & NFT Künstler) Twitter: @pb_cultech

    David Friedrich (Sound Design & Audio Engineering) Website: www.davids-digital.me

    ---

    Quellen und weitere Informationen

    Spendenaufruf Deutsches Rotes Kreuz Hilfe Osteuropa

    Jan Claas van Treeck, PhD | Techtheoretiker, Professor an der Hochschule Fresenius Hamburg | LinkedIn

    Patrick Buchholz | Cyberspace Defender, Distribution & Channel Manager bei Cybereason | Linktree

    David Friedrich | Sound Design & Audio-Engineering | LinkedIn

    Cyberwar – der Krieg im Netz

    Cyberwar – der Krieg im Netz
    In der Ukraine rollen wieder Panzer, fliegen Raketen, sterben Menschen. Aus dem verbalen Säbelrasseln der vergangenen Monate und Jahre ist ein Krieg geworden. Der Konflikt wird aber nicht nur auf dem Schlachtfeld mit allerlei klassischem Kriegsgerät ausgetragen. Stichwort Cyberwar, die virtuellen Scharmützel. Der Krieg im Cyberspace, nicht nur in der Ukraine oder in Russland sondern weltweit.

    Warfare in the Digital Era

    Warfare in the Digital Era

    How is warfare changing in the 21st century with the advent of digital technologies? Are modern wars drifting away from a traditional understanding of violence? In this episode of All Things Policy, Lt Gen Prakash Menon and Megha Pardhi discuss evolving notions of warfare.

    Follow Lt Gen Prakash Menon on Twitter.
    Follow Megha Pardhi on Twitter.

    Links:
    China Tech Dispatch.

    Check out Takshashila’s courses: https://school.takshashila.org.in/

    You can listen to this show and other awesome shows on the new and improved IVM Podcast App on Android: https://ivm.today/android or iOS: https://ivm.today/ios

    You can check out our website at https://www.ivmpodcasts.com

    See omnystudio.com/listener for privacy information.

    107: “Offensive cyber operations are increasingly being used in hybrid military engagements.”

    107: “Offensive cyber operations are increasingly being used in hybrid military engagements.”

    In this episode, host Bidemi Ologunde discussed what happened in Crimea back in 2014, the context of Russia’s President Putin’s actions regarding Ukraine, the demands that have been made by both Russia and Ukraine, the divisions among leaders of Western countries regarding how to handle the Russia/Ukraine situation, and the potential cybersecurity consequences of a likely Russian invasion of Ukraine.

    Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).

    Check out host Bidemi Ologunde's latest book, Feet of Clay: Democracy, Democratic Values & Destructive Influences, available on Amazon, eBay, and Barnes & Noble.

    Buzzsprout - Let's get your podcast launched!
    Start for FREE

    Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

    Support the show

    Global Security Forum | Special Highlights Episode

    Global Security Forum | Special Highlights Episode

    General Daniel Hokanson, Chief of the National Guard Bureau, Farah Pandith, first ever Special Representative to Muslim communities, David Sanger, NYTimes National Security and Cyber expert, and many more leaders in global security are featured in this special highlights episode. Tickets for the Council's annual Global Security Forum go on sale this week, so we’re bringing you some of our favorite discussions from past forums, with topics ranging from artificial intelligence to China’s future global role.

    Reserve your tickets and learn more about the Forum at www.gsf2021.com |  Members-only presale opens Wed., July 7 and General Admission ticket open Sat., July 10.

    Not a member? Join the World Affairs Council of Connecticut today to get early access to Global Security Forum and other member benefits
    -
    For more visit: www.ctwac.org/podcasts

    Follow us @ctwac on Instagram, Twitter and Facebook. Check out our website for upcoming programs and events.

    Be sure to like and subscribe to State of the World podcast and share new episodes with friends, family and colleagues! See you next week.

    For more visit: www.ctwac.org/podcasts

    Follow us @ctwac on Instagram, Twitter and Facebook. Check out our website for upcoming programs and events.

    Be sure to like and subscribe to State of the World podcast and share new episodes with friends, family and colleagues! See you next week.

    67 - Hacked: Cyber Security with David Holtzman (Part Two)

    67 - Hacked: Cyber Security with David Holtzman (Part Two)

    Bill Curtis and Jane Albrecht continue their discussion on cybersecurity with author and tech-wiz, David Holtzman. What’s a Zombie Bot? Has a Trojan attacked your computer? How can we protect ourselves from Hackers?

    This episode will both scare and enlighten you to all matters of personal and business cybersecurity. David Holtzman is a world-class information technologist, currently working with global block chain companies, with deep expertise in privacy, encryption, ethics, cybersecurity, digital registries and intellectual property.

    Episode Timestamps:

    00:52 Hacking, Phishing, and Personal Attacks

    1:52 How Hackers Attack YOU

    4:07 Antivirus Software

    5:34 No Real Protection Against Hacking

    6:55 Real Life Hacking Examples

    7:43 Things you can check before being Hacked

    10:37 Hacking Cases during Covid

    11:48 What not to do to stay safe from Hackers and VPN

    13:07 Passwords

    15:07 Password Lockers and Hacks

    15:52 Positive Takeaways and Hacking

    19:42 Insider Threats and Business

    21:48 Individual Responsibility and Old-World Business Tactics

    24:06 Final Words 

    ----------------------

    Learn More:  https://www.curtco.com/meetmeinthemiddle

    Follow Us on Twitter: https://www.twitter.com/politicsMMITM

    Hosted by: Bill Curtis and Jane Albrecht

    Edited and Sound Engineering by: Joey Salvia

    Theme Music by: Celleste and Eric Dick

    A CurtCo Media Production

    https://www.curtco.com

    See omnystudio.com/listener for privacy information.

    66 - Hacked: Cyber Security with David Holtzman (Part One)

    66 - Hacked: Cyber Security with David Holtzman (Part One)

    Bill Curtis and Jane Albrecht discuss cybersecurity with author and tech-wiz, David Holtzman. They dive deep into the Colonial Pipeline Hack, ransomware, and Solar Winds. You’ll learn about the capabilities of Russia, China, and other nations in the cyber-wars. Do you want to know what Zero Day means, who’s DarkSide, Fancy Bear and Cozy Bear?... which software is the safest, Apple or Microsoft? And how wars will be fought in the future? This two-part series on cyber-intelligence will certainly deliver.

    Episode Timestamps:

    3:16 Why do countries get hacked? David Holtzman is a world-class information technologist, currently working with global block chain companies, with deep expertise in privacy, encryption, ethics, cybersecurity, digital registries and intellectual property.

    5:05 The Colonial Pipeline Hack

    6:16 Panic Buying and Hacks (DarkSide)

    9:19 Two Types of Hackers

    10:30 Negotiating with Hackers

    11:08 The Solar Winds Hack and Russia

    12:54 Deduction and knowing who’s the Hacker

    14:34 Tracking what information was hacked

    16:16 How to handle the backdoor second hack attack

    17:45 Lessons Learned from Hackers and USA Cyber intelligence

    20:36 Trump and classified intelligence

    21:36 Do we have proof that Trump passed info onto the Russians?

    23:36 What is Zero Day?

    24:54 Apple vs Microsoft and Hacking

    28:02 Mutual assured annihilation

    29:50 Ramifications of Hacking

    32:44 Cold War References and destruction

    34:00 Defending against Russian Aggression 

    ----------------------

    Learn More:  https://www.curtco.com/meetmeinthemiddle

    Follow Us on Twitter: https://www.twitter.com/politicsMMITM

    Hosted by: Bill Curtis and Jane Albrecht

    Edited and Sound Engineering by: Joey Salvia

    Theme Music by: Celleste and Eric Dick

    A CurtCo Media Production

    https://www.curtco.com

    See omnystudio.com/listener for privacy information.

    Cyber Warfare On The Rise - Michael Hilliard

    Is Cyberwar War?

    Is Cyberwar War?

    At a conference of chief technology officers in 2016, General Michael Hayden, former head of, at different times, both the NSA and the CIA, told the audience, “Cyberwar isn’t exactly war, but it’s not not-war, either.” 

     

    Cyberattacks, at the nation-state level, were already almost a decade old at that point. In 2007, over the course of 22 days a Russian attack on Estonia took out commercial and government servers, online banking, and the Domain Name System,” without which people can’t find or look up websites and online servers. The attack carried into the cyber realm an already heated political conflict between the two nations, and Estonia’s economy was as much under attack as its information infrastructure.

     

    In 2010, we learned of the U.S.–Israeli attack on Iran and its uranium centrifuges, known as  Stuxnet.

     

    In 2015, a concerted attack, believed to have been Russian, on the power grid of another east European nation, Ukraine, left more than 200,000 people without electricity for at least several hours. It was the first attack on a grid, and perhaps the first large-scale SCADA attack—that is, on the control systems of critical infrastructure. Follow-up attacks struck the railway, television, and mining sectors. 

     

    In 2016, right around the time General Hayden was warning American audiences of the dangers of cyberwar, Russia, in conjunction with a private firm, Cambridge Analytica, and elements of the U.S. Republican party, crafted a disinformation campaign to influence the presidential election that year. Russia and Cambridge Analytica also undermined the Brexit referendum in the U.K. earlier that year.

     

    Since then, we’ve seen entire families of malware appear, such as Trickbot. Arguably even worse was the recent SolarWinds hack, which in effect was an attack on what we might call the software supply chain. As many as 18 000 different organizations using SolarWinds may have been affected. Worse, the effects of the hack may have been reached out into other networks and therefore been exponential. For example, both Microsoft and security firm FireEye were affected, and they each have many enterprise customers.

     

    As the fourth-century Roman poet Juvenal asked, Quis custodiet ipsos custodes? Who shall guard the guardians themselves?

    A @RadioSpectrum1 conversation with Justin Cappos who heads the Secure Systems Laboratory at @NYU. On @Spotify and @IEEESpectrum https://spectrum.ieee.org/multimedia/podcasts

    פרק 13 - נסיון חבלת סייבר איראני, טעויות של מערכות פסילה אוטומטיות, וואווי חוטפת מכה נוספת מארה"ב

    פרק 13 - נסיון חבלת סייבר איראני, טעויות של מערכות פסילה אוטומטיות, וואווי חוטפת מכה נוספת מארה"ב

    - גוגל פסלה אוטומטית אפליקציות שמזכירות את וירוס הקורונה ואין לגוגל מנגנון ערעור מהיר. פסילות גורפות כאלה קורות יותר מדי פעמים, וכשהן קורות הן מחסלות חברות. מה ניתן לעשות?

    - שלב נוסף במלחמת הסחר (והריגול?) בין ארה"ב לסין עם גזירה נוספת שהטילה ארה"ב על ענק הסלולר הסיני וואווי.

    - תקיפות הסייבר האיראניות ותקיפות-הנגד הישראליות (לכאורה… לכאורה…) עולות שלב. מה קרה הפעם ולאן החזית הזו מובילה אותנו?

    See omnystudio.com/listener for privacy information.

    Iran's Cyber War

    Iran's Cyber War

    While the loud, public conflict between the United States and Iran rages on, a secret war has been waged in the shadows for years. How dangerous is the cyberwar between the two countries? And how has the digital battlefield changed? Jen Psaki talks to Jon Bateman about the tools and strategies of both countries have developed, and what an all-out cyberwar would look like.

    HnL070 - Keressük a Szengrált!

    Digital War, Espionage, and Dirty Tricks

    Digital War, Espionage, and Dirty Tricks

    On this episode of The Open Mind, we're delighted to welcome back the foremost expert on American political communication, Kathleen Hall Jamieson.  Oxford University Press has published her newest work, “Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't and Do Know.” 

    The author of 16 books, including this latest forensic examination of Russian digital dirty tricks. Jamison is director of the Annenberg Public Policy Center and the Packard Professor of Communication at the University of Pennsylvania. 

    Digital War, Espionage, and Dirty Tricks

    Digital War, Espionage, and Dirty Tricks

    On this episode of The Open Mind, we're delighted to welcome back the foremost expert on American political communication, Kathleen Hall Jamieson.  Oxford University Press has published her newest work, “Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't and Do Know.” 

    The author of 16 books, including this latest forensic examination of Russian digital dirty tricks. Jamison is director of the Annenberg Public Policy Center and the Packard Professor of Communication at the University of Pennsylvania. 

    The Internet of Things

    The Internet of Things
    Show #162 | Guests: Sheera Frenkel, cybersecurity correspondent for Buzzfeed, and Cyrus Farivar, Senior Business Editor at Ars Technica, bring their years of research and reporting to the discussion. | Show Summary: Kellyanne Conway was widely mocked when she cited "microwaves that can turn into cameras". And it's true, those don't exist - that we know of! But the same week the makers of We Vibe, a BlueTooth-enabled vibrator, paid millions to settle a lawsuit for collecting personal data. And then of course, there's Alexa, the always-on Amazon servant that may or may not have overheard a murder in Texas. The "Internet of Things" - IoT for short - is a non-stop trade-off. What do we sacrifice for convenience? Who sees the pings you send to turn on your thermostat? What agencies might be interested in the Amazon book searches you request aloud?
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io