With the age of quantum computing drawing ever-closer, traditional encryption methods are at risk. While brute force attacks can take months to break through security, quantum attacks can use more advanced techniques to break standard public key cryptography in a much shorter timeframe. Quantum cryptography is an emerging technology …
Read More »Navies developing cyber security measures and cyber defense technologies to counter growing cyber threats
Ships are increasingly using systems that rely on digitization, integration, and automation. Offensive actors understand the naval reliance on communications, ISR, and visualization technologies, and perceive them as vulnerable to disruption and exploitation. In 2016, the Baltic and International Maritime Council (BIMCO) in their “Guidelines on Cyber Security Onboard Ships,” warned about the …
Read More »Multi-factor authentication has become essential to protect accounts in commercial and military
The traditional, not so secure way to log in to your bank account: enter your username and that familiar password you probably use for most of your online accounts. Then, you’re in. You can go about your business. If you’re one of the 54% of consumers who, according to TeleSign, …
Read More »Australia facing cyber attacks by sophisticated state-based cyber actor, implementing Cyber Vision 2020, cyber security strategy, cyber science and technology plan
The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is exerted within, and through cyberspace domain, much like the land, …
Read More »Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches
Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The …
Read More »Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies
Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who have frequently launched cyber-attacks to retrieve and misuse data. The major …
Read More »Indian Threat Scenario, National security threats and future military capability requirements
There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging technologies that can offer new military capability. Coming to …
Read More »Rising security threats to Smart homes their security requirements and measures for protection
A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the internet, allowing the user to control functions such as security …
Read More »Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance
The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets, and laptop computers. At the same time this has also …
Read More »Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions
Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of the wheel to a computer that can make intelligent decisions …
Read More »