North Korea Threatens US with Cyberattacks

49-north-korea-attacks-the-us.jpg

North Korea has responded to a report that it was the target of an unsuccessful Stuxnet-style cyber attack by threatening a cyber attack of its own against the U.S.
In an article published in the country's largest daily newspaper on Tuesday, North Korea said it would wage a cyber war against the U.S. to hasten its ruin. Such bellicose threats are fairly common in North Korean media and aren't always followed by action, but when it comes to cyber attacks, the country has been blamed for several large attacks in the past.
Most have been against South Korea, but the country was also publicly accused by the U.S. government of being behind last year's devastating attack against Sony Pictures.
"The DPRK can react to any forms of wars, operations and battles sought by the U.S. imperialists," the article said, using the acronym for the country's official name, the Democratic People's Republic of Korea.
"It is the firm determination of the DPRK to wage Korean-style cyber war to hasten the final ruin of the U.S. and the forces following it, who attempted to bring down the former with the cyber war," it said.
The article was published on page 6 of the Rodong Sinmun, the newspaper of the ruling Workers Party of Korea and a key propaganda mouthpiece.
In late May, Reuters reported that the U.S. had attempted a cyber attack against North Korea's nuclear weapons program five years ago, similar to the Stuxnet attack that damaged thousands of centrifuges used by Iran's nuclear program at about the same time.
The attack against North Korea was unsuccessful because the virus couldn't gain access to North Korea's nuclear computer network, Reuters said, quoting intelligence sources.
"The U.S. is greatly mistaken if it thinks the DPRK will just overlook with folded arms the provocations in the cyber space," the Rodong Sinmun said.
Computerworld: http://bit.ly/1ShOREQ

« UK Web Snooping Powers Are 'Undemocratic'
Instilling a Culture of Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Fornetix

Fornetix

Key Orchestration by Fornetix is an advanced encryption key management ecosystem that automates the key lifecycle across the entire enterprise with groundbreaking precision and speed.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.