North Korea More Likely To Launch A Cyber Attack Than A Military Strike

North Korea is more likely to wage a cyber-attack against the United States than a military strike, according to Homeland Security Secretary John Kelly.

As tensions build between Pyongyang and Washington in anticipation of possible military action from either, Mr. Kelly said that North Korean dictator Kim Jong Un is more inclined to direct hackers against American cyber targets in lieu of deploying a more traditional arsenal.

“In the case of North Korea, you know, a kinetic threat against the United States right now I don’t think is likely, but certainly a cyber threat,” Mr. Kelly said in an interview on “Meet the Press.”

“So we would raise various threat levels in the event that something happened and we felt as though there were a possible threat. You always want to come down on the side of caution,” he said in a preview.

North Korea and the US each have threatened military action one another in recent days amid reports the former is readying a possible nuclear test to commemorate the anniversary this weekend of the birth of its founder, Kim il-Sung.

Yet despite being largely otherwise disconnected from the outside world, US officials have acknowledged the hermit kingdom is most certainly capable of compromising American computer networks, notably evidenced by the 2014 cyber-attack suffered by Sony Pictures Entertainment and widely attributed on North Korea.

Washington Times

You Might Also Read:

Cyber Attacks Against Korean Missile Launches:

Cyberwarfare: Borders Offer No Defense:

Surprise: N Korea Hacked S Korea Cyber Command:

War In The Information Age:

 

 

 

« Cybercrime Is A Growing Threat To Small Business
Time To Speak The Language Of Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.