Trending News


US, China and Russia developing new cyber capabilities and technologies like Secure Internets to protect against Cyber Warfare


Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks will be a necessary component of any future military campaign, …

Read More »

DARPA plans hack resistant hardware to protect military systems from cyber attacks under their System Security Integrated Through Hardware and firmware (SSITH) program


An internal report produced by the J-2 intelligence directorate stated that cyber security officials are concerned that Lenovo computers and handheld devices could introduce compromised hardware into the Defense Department supply chain, posing cyber espionage risks, said officials familiar with the report. The chairman of the House Judiciary Committee wrote …

Read More »

Psychological warfare becomes sophisticated and moves to social media, China expands it to three Warfares strategy


Psychological warfare consists of attempts to make your enemy lose confidence, give up hope, or feel afraid, so that you can win. Psychological warfare involves the planned use of propaganda and other psychological operations to influence the opinions, emotions, motives, reasoning,  attitudes, and behavior of opposition groups. Psychological operations target foreign governments, …

Read More »

Militaries developing Integrated commands for Joint Cyber, Space, EW, Signals intelligence and Communications operations and technologies for future battlefield


A simulated tank assault was deterred using cyber weapons and electronic warfare technology during a training exercise, according to Defense Systems. Trainers stopped a simulated assault by targeting the tank crew’s radio and communication systems during the exercise at the Army’s National Training Center in Fort Irwin, California. “These tanks had …

Read More »

Defeating complex, sophisticated and stealthy long-term cyber security threats (APT) needs Transparent Computing, says DARPA


An advanced persistent threat (APT) refer to complex, sophisticated and stealthy techniques of using software, hardware or social engineering tools to continuously monitor and extract data from targets such as organizations and/or nations for business or political motives. One of the examples can be the Stuxnet computer worm, which targeted …

Read More »

Military plans to employ Blockchain, the virtual currencies technology, for creating tamper-proof military computer systems defeating stealthy APT threats and secure messaging


Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or …

Read More »
error: Content is protected !!