This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security articles
This article is within the scope of WikiProject Software, a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.SoftwareWikipedia:WikiProject SoftwareTemplate:WikiProject Softwaresoftware articles
This article is within the scope of the Military history WikiProject. If you would like to participate, please visit the project page, where you can join the project and see a list of open tasks. To use this banner, please see the full instructions.Military historyWikipedia:WikiProject Military historyTemplate:WikiProject Military historymilitary history articles
This article has been checked against the following criteria for B-class status:
Cyberweapon is within the scope of WikiProject Espionage, which aims to improve Wikipedia's coverage of espionage, intelligence, and related topics. If you would like to participate, visit the project page, or contribute to the discussion.EspionageWikipedia:WikiProject EspionageTemplate:WikiProject EspionageEspionage articles
This article is within the scope of the WikiProject Law Enforcement. Please Join, Create, and Assess.Law EnforcementWikipedia:WikiProject Law EnforcementTemplate:WikiProject Law EnforcementLaw enforcement articles
Latest comment: 9 years ago7 comments5 people in discussion
The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section.
The result of the move request was: not moved. What should ultimately be done with this article still remains a little unclear, but there is a definite consensus that it should not be renamed "State-sponsored hacking". Jenks24 (talk) 05:20, 10 November 2015 (UTC)Reply
Comment malware isn't necessarily hacking, since a computer operator is not being interactively involved in the process. Stuxnet doesn't require hacker interaction. And state-sponsored hacking, such as infiltrating systems and extracting information doesn't require "weaponry", since exploiting security holes can be done with badly secured or buggy systems without deploying malware. Also cyberwarfare is not called state-sponsored Internet warfare -- 70.51.44.60 (talk) 09:31, 2 November 2015 (UTC)Reply
Comment I agree with 70.51. State-sponsored hacking is a significantly broader subject than Cyberweapon. It would make more sense to rename Cyberwarfare in that case, or merge this with Advanced persistent threat, although those wouldn't necessarily be a good ideas either. —Ruud10:59, 2 November 2015 (UTC)Reply
Comment. Hi. IMHO, "cyberweapon" is a buzzword at best. Having read the definition in the article, a cyberweapon is practically indistinguishable from a malware unless you know who built or operated it. It is like Agent 006 walking over to Agent 008 and say, "Hey, remember the cyberweapon that MI9 discovered two days ago? It was not a cyberweapon at all! It wasn't developed by that tiny African country; it was developed by a super-huge drug cartel." It is best if this article is dissolved and redirected to cyberwarfare, with parts merged into malware.
The above discussion is preserved as an archive of a requested move. Please do not modify it. Subsequent comments should be made in a new section on this talk page or in a move review. No further edits should be made to this section.
Latest comment: 2 years ago1 comment1 person in discussion
Hi! I am a new editor to Wikipedia, and I am planning to add to this page. What I want to do is essentially expand the Controls section (now changing it into history, as that makes it a bit clearer) by adding history of some of the more important cyberweapons and what happened around them (Stuxnet, Flame, NSA leaks by Shadow Brokers and ATP3). Additionally, I plan on adding a short section about potential regulation of cyberweapons. Finally, I plan on adding a short part to the characteristics explaining the dangers behind cyberweapons (as compared to other weaponry). Looking forward to working with everyone on this! --Junglekarmapizza (talk) 08:24, 9 May 2022 (UTC)Reply