North Korea Denies Cyber Attacks On South Korea

North Korea has repeated  denials that it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

South Korea's spy agency told lawmakers recently that North Korea had stepped up cyber attack efforts against the South and succeeded in hacking the mobile phones of 40 national security officials, according to members of parliament who received a closed-door briefing.

"The South is claiming the North's cyber attack and using it for its own political purpose," an opinion piece in the Rodong Sinmun, the official daily newspaper of the North's ruling party, said recently.

It accused the South of making the cyber attack claim in order to justify a controversial new "anti-terrorism" law. "There is nothing to expect but the sound of eating corpses from a crow's mouth. However, we cannot just overlook the South's abrupt, provocative, and heinous accusations against its neighbor,” the article said.

The North's state-run Rodong Sinmun newspaper lashed out at the hacking accusations, saying they were cooked up by Seoul to shore up support for controversial surveillance legislation.

"This is such shameless bullshit from the enemy forces who are obsessed with confrontation and political slander," read an editorial published on Sunday 13th March.

It added that Seoul was trying to use the "fabricated" threats to rally support for an anti-cyber terror bill that would the grant the NIS greater surveillance powers on the Internet.

Earlier, South Korea's National Intelligence Service also said North Korea had tried to hack into email accounts of South Korean railway workers in an attempt to attack the transport system's control system, although it said had interrupted the hacking attempt against the railway workers and closed off their email accounts.

South Korea has been on heightened alert against the threat of cyber attacks by North Korea after it conducted a nuclear test in January and a long-range rocket launch last month, triggering new UN sanctions.

Tensions are also heightened on the Korean peninsula as South Korea and the United States conduct annual joint military exercises that the South says are the largest ever and included the arrival in South Korea of the nuclear-powered aircraft carrier USS John C Stennis. North Korea has denounced the exercises as "nuclear war moves" and threatened to respond with an all-out offensive.

The North denied South Korea's previous accusation that it conducted cyber attacks against the South's nuclear operator.

The United States accused North Korea of a cyber attack against Sony Pictures in 2014 that led to the studio cancelling the release of a comedy based on the fictional assassination of the country's leader, Kim Jong Un.
North Korea denied the accusation.

Reuters: http://reut.rs/1pEsdO9
Security Week: http://bit.ly/1pOdiB0

« Obama Says Apple's Technology Can't Be Inaccessible To The State
Cybersecurity Training, Military Style »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Huawei

Huawei

Huawei is a leading global ICT solutions provider. with end-to-end capabilities across the carrier networks, enterprise, consumer, and cloud computing fields.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.