Trending News
Home / Cyber

Cyber

Military Embedded system cyber threats, vulnerabilities and security

An embedded system is a combination of embedded devices that are located within a larger system in order to perform a dedicated function. Such a system is dedicated to executing one specific task, which sets it apart from any other system of devices. An embedded system is typically some combination …

Read More »

Cyberbiosecurity threats, vulnerabilites and cyberbiosecurity technologies

The life sciences now interface broadly with information technology (IT) through its industrial applications in health care, agriculture, manufacturing, automation, artificial intelligence, and synthetic biology. The information moves between living and cyber systems in a two-way flow.   Global public health crises create conditions of extreme fragility where dual-use technologies …

Read More »

Cyber attacks on Power Grids and Nuclear plants will have devastate economy affecting millions of people and military operations

Energy sector has become one of the attractive targets for cyber attackers. Hackers already target the energy sector more than any other part of U.S. critical infrastructure, according to the most recent government report. There are more reported cyber incidents in the energy industry than in healthcare, finance, transportation, water …

Read More »

Growing Cyber threats to commercial aviation require cyber risk management, and resilient systems

Cyber attacks are growing in number and sophistication affecting large corporations, critical infrastructures of all kinds, governments to SMEs, and increasingly the aviation industry.   Commercial aviation plays a central role in our daily lives and is an essential part of the national economy. The number of passengers rose from …

Read More »

DHS Cybersecurity Strategy for full spectrum of response options

President Biden has made cybersecurity, a critical element of the Department of Homeland Security’s (DHS) mission, a top priority for the Biden-Harris Administration at all levels of government. To advance the President’s commitment, and to reflect that enhancing the nation’s cybersecurity resilience is a top priority for DHS, Secretary Mayorkas issued …

Read More »

Cyberwarfare among US, China and Russia driving Secure Internets cyber technologies

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks will be a necessary component of any future military campaign, …

Read More »

Military Race for convergence of Cyber, Space, EW, Signals intelligence and Communications technologies for Information Dominance

Joint Publication (JP 1-02) defined the electromagnetic spectrum as the “range of frequencies of electromagnetic radiation from zero to infinity” (U.S. Joint Chiefs of Staff, 2010b). In a more detailed interpretation, the electromagnetic spectrum is a series of frequencies  from the lowest to the highest frequency (longest to shortest wavelength), …

Read More »

Optical Networks Vulnerabilities and Security threats

Optical networks are vulnerable to several types of security breaches or attacks, typically aimed at disrupting the service or gaining unauthorized access to carried data, i.e., eavesdropping. Depending on the aim of the attack, security breaches can induce financial losses to the clients or cause network-wide service disruption, possibly leading to huge …

Read More »

DARPA SMOKE to automate cyber red teaming or penetration testing to uncover military systems vulnerabilites

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are being taken. Exposed …

Read More »

Quantum cryptography (QC) or Quantum key distribution (QKD) are assumed hackproof but its implementations have vulnerabilities

Quantum computers could undermine almost all of the encryption protocols that we use today. Though quantum computers are still quite some way from being practical, usable machines, once they become so, we could be looking at a whole new world when it comes to online privacy — one in which …

Read More »
error: Content is protected !!