Home / Cyber & IW (page 15)

Cyber & IW

Australia facing cyber attacks by sophisticated state-based cyber actor, implementing Cyber Vision 2020, cyber security strategy, cyber science and technology plan

The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is exerted within, and through cyberspace domain, much like the land, …

Read More »

Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The …

Read More »

Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The major  …

Read More »

Indian Threat Scenario, National security threats and future military capability requirements

There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging technologies that can offer new military capability.   Coming to …

Read More »

Rising security threats to Smart homes their security requirements and measures for protection

A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the internet, allowing the user to control functions such as security …

Read More »

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets, and laptop computers. At the same time this has also …

Read More »

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of the wheel to a computer that can make intelligent decisions …

Read More »

After initial Hype and amid Cyber Warfare threat, Network Centric Warfare approach is now being adopted realistically in various Militaries

As the 21st Century battlefield becomes increasingly complex and asymmetrical, military forces are striving to harness network technology to gain an operational advantage, by transforming traditional linear command structures and linking sensors, unmanned vehicles, command posts and ground troops to achieve decision superiority for full spectrum dominance.   Network Centric …

Read More »

Threats of hacking of digital IDs, driving develpment of unbreakable Quantum EPUF IDs containing 1,000 trillion atoms

We live in digitised, connected societies, in an Internet of Things (IoT) world where our reliance on software, hardware, and the networks that connect us, grows exponentially. Our increasing global reliance on what we hope and assume are secure networks, is profound. The threat of large-scale cyber-attack has become a …

Read More »

DARPA CHARIOT developing Quantum proof cryptography for Military Mobile and IoT security

The exponential price/performance improvements in semiconductor technology stemming from Moore’s Law are enabling even the smallest and most application-specific devices, such as sensors and actuators, to include networking capabilities. The overwhelming majority of such devices will be cheap and power-constrained. Low device costs permit deployment in unprecedented numbers, with some …

Read More »
error: Content is protected !!