Home / Cyber (page 7)

Cyber

Hiding Messages in Plain Sight: Exploring the Art of Steganography

Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding a message in plain sight. Steganography differs from cryptography because …

Read More »

The Growing Threat of Smartphone Security to National Security

Smartphones are ubiquitous in modern society, and their use has become increasingly prevalent in government agencies and other sensitive settings. However, this increasing reliance on mobile technology has also raised significant concerns regarding national security. Research indicates that smartphones pose a significant security threat to government agencies and other organizations …

Read More »

Hidden Dangers: The Rising Threat of Steganography and Stegware Cyber Attacks

Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding a message in plain sight.   In digital steganography, electronic …

Read More »

The Cyber Cold War: How Russia is Using Cyber Attacks as a Weapon in Geopolitics

Russia is widely believed to have advanced malware capabilities that enable them to conduct cyber attacks with devastating effects. The Russian government has been accused of creating and using sophisticated malware to target government agencies, critical infrastructure, and other entities around the world. Russian hackers are known for their ability …

Read More »

The Next Frontier in Encryption: Homomorphic Encryption the Future of Secure Computation

Businesses, large and small, are embracing the Cloud. No matter which research company, vendor or expert you consult, everyone agrees that about four in every five enterprise workloads are either already in the Cloud or will be within the next few months. That means the best-practice security strategy you established …

Read More »

DARPA DPRIVE developing an ASIC for Fully homomorphic encryption (FHE) to ensure Data privacy and Security

In the last few years, data privacy has become a hot-button issue globally, with high profile scandals and data leaks surrounding prominent companies like Facebook and Equifax resulting in greater privacy awareness among both consumers and businesses. On top of that, companies often share this data with third parties that can …

Read More »

NATO cyber doctrine and command calls for enhancing Deterrence and cyber defense capabilities amid Russian and Chinese Cyber Warfare Threat

The North Atlantic Treaty Organization is an alliance of European and North American countries formed after World War II as a bulwark against Russian aggression, as per The Associated Press. Its original members were Belgium, Canada, Denmark, France, Iceland, Italy, Luxembourg, the Netherlands, Norway, Portugal, the United Kingdom, and the …

Read More »

Cyber Resilience enables company to better prevent, quickly detect, contain, and recover from a cyberattack

This year has been largely dominated by the Russia-Ukraine war, with major concerns about its impact on the global threat level. Just three days after the invasion of Ukraine, on February 27th, Check Point Research (CPR) noted a 196% increase in cyber-attacks on Ukraine’s government-military sector, and a 4% increase …

Read More »

DARPA HARDEN developing designs and tools for trusted computing systems

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to market demand has forced integrated circuit design, manufacturing and testing …

Read More »

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities. In …

Read More »
error: Content is protected !!