Trending News


Quantum Random Number Generator for IoT security and impenetrable encryption of military communications


Random numbers are important in many fields of scientific research and real-life applications, such as fundamental physical research, computer science and the lottery industry.  They also serve as foundation in many security applications including encryption, authentication, signing, key wrapping and other cryptographic applications. The weakness of  random number generators can …

Read More »

UK implementing its Cyber Security Strategy emphasizing Defence , Deterrence and Cyber technology development


Russian cyber attacks have targeted Britain’s energy networks, telecommunications and media as part of efforts to “undermine the international system”, a senior security official has revealed in 2017. Ciaran Martin, CEO of the National Cyber Security Centre (NCSC), said Russia is among the hostile threats posing a growing threat, alongside that …

Read More »

US DOD and NATO plan Battlefield Internet of Things connecting sensors, wearables, weapons, minitions, platforms and networks for information dominance


The Internet-of-Things is an emerging revolution in the ICT sector under which there is shift from an “Internet used for interconnecting end-user devices” to an “Internet used for interconnecting physical objects that communicate with each other and/or with humans in order to offer a given service”. The increasing miniaturization of …

Read More »

Cyber an operational domain of warfare, and Militaries establishing Cyber commands and planning Offensive cyber operations

Army Cyber Command/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. Serve as Cyber Proponent. Coordinate Information Operations.

The incidents of cyberwarfare are ever increasing, targeting more and more countries and becoming legitimate. Part of the Ukrainian power grid was attacked by hackers, causing blackouts; US accused Iranians of attempting to hack into the control-system of a dam.  President Barack Obama strongly suggested that Russian President Vladimir Putin personally …

Read More »

Australia’s Cyber Vision 2020, cyber security strategy, cyber science and technology plan


The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is exerted within, and through cyberspace domain, much like the land, …

Read More »
error: Content is protected !!