HOW READY ARE WE IN OPPOSITION TO THE DANGERS OF CYBER WAR?

THE technological breakthroughs of our twenty-first century have unfolded huge alternatives for untold wealth. But they’ve additionally unleashed new dangers for people, companies and international locations. To all intents and functions, the wars of the long run is probably not fought with armoured tanks, bomber airplane and heavy artillery; somewhat,…

read more

India-Pak cyber war is no longer funny

By Tuesday evening, several Indian websites had been hacked by a group called Pakistan Haxors Crew, who claimed that the attack was a payback for hacking websites in Pakistan, including the Pakistani Railways website. On Tuesday, the websites of Indian Institute of Technology Delhi (IIT Delhi), IIT Varanasi, Aligarh Muslim…

read more

Manufacturers spending big in automotive cyber war

A Wikileaks exposé revealed the Agency’s plans to take remote control of targeted vehicles, adding fuel to a fiery discussion about connected car vulnerability, and vindicating a multi-billion- dollar investment into cyber security by Mercedes-Benz. “I would only be exaggerating a little bit when I say that 90 percent of…

read more

Why Our Nuclear Weapons Can Be Hacked

It is tempting for the United States to exploit its superiority in cyberwarfare to hobble the nuclear forces of North Korea or other opponents. As a new form of missile defense, cyberwarfare seems to offer the possibility of preventing nuclear strikes without the firing of a single nuclear warhead. But…

read more

The US has been conducting a secret cyberwar against North Korea’s nukes — with surprising results

A recent New York Times report uncovered a secret operation to derail North Korea’s nuclear-missile program that has been raging for three years. Essentially, the report attributes North Korea’s high rate of failure with Russian-designed missiles to US meddling in the country’s missile software and networks. Though North Korea’s missile…

read more

Cyber Warfare Exercises Exploit Weaknesses

The way to hack an oil refinery seemed rather basic, or “basisk” to a team of potential hackers playing the part of nation-state, backed perhaps by the Chinese or Russian governments. That’s because the word “basisk” was the default user name and password for an internet-connected valve on an oil…

read more

America Needs a Cybersecurity “Reboot”

A generation ago, as Americans began logging onto the earliest versions of the internet, McAfee antivirus alerts were as ubiquitous as the sound of dial-up modems. For years, McAfee antivirus software was the standard in protection from spyware, Trojan horses, and other traps that allowed hackers access to your personal…

read more