Archive for cyber

You are browsing the archives of cyber.

Integrated Attack Strategy

Integrated attack strategies involve combining hacking computer systems with attack vectors such as: espionage, blackmail, medical/health attacks, asymmetric “guerrilla-style” attacks, weapons of mass destruction, and conventional kinetic military attacks. The video below shows an example using a medical vector, and an unprotected printer, to compromise patient and identity records that can be used in future […]

Cyber Coins Can Replace All Currency Forms

Cyber currency is a form of money that is based on a cybernetic journalling system. Most current forms of currency are no longer based on something like a rare and valuable metal (gold or silver), but the trust that the national economy underlying the currency is solid and reliable. We need to have the confidence […]

Evil Mouse Penetration Tool

Netragard’s Hacker Interface Device (HID) – [snosoft.com] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]