Trending News

Cyber

Militaries developing Integrated commands for Joint Cyber, Space, EW, Signals intelligence and Communications operations and technologies for future battlefield

integCWEW

A simulated tank assault was deterred using cyber weapons and electronic warfare technology during a training exercise, according to Defense Systems. Trainers stopped a simulated assault by targeting the tank crew’s radio and communication systems during the exercise at the Army’s National Training Center in Fort Irwin, California. “These tanks had …

Read More »

Defeating complex, sophisticated and stealthy long-term cyber security threats (APT) needs Transparent Computing, says DARPA

ce11944b98d0742eead2b016a253afd2

An advanced persistent threat (APT) refer to complex, sophisticated and stealthy techniques of using software, hardware or social engineering tools to continuously monitor and extract data from targets such as organizations and/or nations for business or political motives. One of the examples can be the Stuxnet computer worm, which targeted …

Read More »

Blockchain, the virtual currencies technology, creating tamper-proof military computer systems defeating stealthy APT threats and secure messaging

blockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or …

Read More »

New cyber security technologies Dispersing data packets over Multiple Network Paths and Continuously Scrambling Code

b1d237aad44a95e3871fc116e6241517

“United States adversaries are launching increasingly sophisticated cyberattacks on the complicated web of networked systems upon which our military relies,” explained Robert W. Twitchell, Jr., President and CEO of Dispersive Technologies. “These attacks impair connectivity, degrade mission effectiveness and threaten lives. “While the means of cyber attacks vary, the pattern …

Read More »

DARPA plans for Revolutionary approaches for Real-Time Defense against DDoS attacks on Military Networks

650x300xddos

As the name suggests, denial-of-service (DoS) attacks are designed to deny legitimate users access to websites and services by overwhelming them with illegitimate connections, requests and traffic.  A distributed denial-of-service attack is when the DoS attacks are being done by multiple attackers all trying to attack a source at once, be it from …

Read More »

The cyber attacks on power grids can have devastating economic and human impact, DARPA developing technologies from detecting, responding and recovering from cyberattacks

ukraine-power-system-hacked

The starting point in serious cyber warfare may well be to trip the power stations which power the data centres involved with the core routing elements of the network. DDoS attack on the national grid could make it easier for hackers to neutralize the backup power and trip the system. …

Read More »

UK implementing its Cyber Security Strategy emphasizes Defence , Deterrence and Cyber technology development

608x403xukcyber

Chancellor Philip Hammond has launched UK government’s new five-year National Cyber Security Strategy in a bid to become one of the “safest places in the world to do business.”According to the World Economic Forum’s 2016 Global Risks Report, cyber-security is recognised as one of the greatest threats to business worldwide, and the global …

Read More »
error: Content is protected !!