Home / Cyber & IW (page 14)

Cyber & IW

5G Mobile Networks deployments have many security and privacy threats, Require New policies and technologies including quantum cryptography

Countries are now racing to deploy 5G, short for 5th generation mobile networking or 5th generation wireless systems. The Fifth Generation (5G) mobile networks  promise fast Internet for everyone, smart cities, driverless cars, critical health care, “internet of things” revolution, and reliable and secure communications for critical infrastructures and services. The …

Read More »

Growing threat of Cryptocurrency in terrorism for terror financing

Modern terrorist attacks display increasingly sophisticated ICT skills in both conducting their attacks and communicating them globally through digital technologies, combined with, in some cases, an awareness of counter-intelligence measures, largely enabled by Web 2.0. The Paris attackers displayed the most sophisticated use of these, including so-called Dark Web platforms …

Read More »

Emerging technologies sounding death knell to Privacy, requirement of new governance structures

Significant technological advances are being made across a range of fields, including information communications technology (ICT); artificial intelligence (AI), particularly in terms of machine learning and robotics; nanotechnology; space technology; biotechnology; and quantum computing. The technological advances are driven by a digital revolution and need to gather, process, and analyze …

Read More »

DARPA SSITH developed secure hardware architectures for Unhackable Military systems, FETT testing exploits to thwart Tampering

As 5G and IoT proliferation sweep across the planet, businesses and consumers are benefiting greatly from increased connectivity. However, this connectivity is also introducing greater risks and security concerns than ever before. As the Military and civilian technological systems, from fighter aircraft to networked household appliances, are becoming ever more …

Read More »

Blockchain disrupting Industries from healthcare, IoT to Cybersecurity

Bitcoin and other virtual currencies are made possible by what’s known as blockchain technology. Blockchain technology is a digital ledger that consists of distributed, decentralized and often-times public data capable of automatically recording and verifying a high volume of digital transactions, regardless of location.   A blockchain is a type …

Read More »

Rising Threats of data breaches requires new Data loss prevention (DLP) solutions and technologies

More data is being generated each year than in the whole of re­corded human history, yet data security hasn’t kept up. Further, the IoT is growing at such a rapid rate, companies have a huge influx of data to comprehend. It’s thought as much as 2.5 quintillion bytes of data …

Read More »

Cyber threats to critical Infrastructure (CII) require Effective Cyber Incident Response plan at National level

Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted cyber activities.   Cyber-attacks are continuously growing in size and …

Read More »

DARPA’s SAHARA to automate Structured ASICs production and enhance their security for defense electronic systems

Time to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans. Hardware Trojans (HT), which are malicious circuit inclusions into the …

Read More »

Cyber attacks on Port facilities can cause disruptions to Shipping operations

Maritime networks have become an attractive playground for hackers, with cyber-attacks on vessel OT networks and systems increasing by 900% over the past three years.  A ship’s onboard information technology and operational technology systems can be hacked just as easily as systems ashore. Such security breaches have the potential to …

Read More »

New Physical and behavioral Biometrics technologies with increased accuracy and security being developed

Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from consumers in 2021, a nearly 27% increase over the 2.2 …

Read More »
wpChatIcon
wpChatIcon
error: Content is protected !!