Category Cyber & Information Warfare

DARPA Report Finds Vulnerabilities in Blockchain Crypto Transactions

Distributed ledger technologies commonly known as the blockchain, refer to software that stores information on a secure, decentralized network where users need specific cryptographic keys to decrypt and access data. Cryptocurrencies, such as the popular Bitcoin, are networks built on…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Quantum computer to Blockchain , Researchers propose Quantum Resistant Ledger (QRL) and Quantum blockchain

QRL

Blockchain, is a growing list of records, called blocks, which are linked using cryptography. Blockchains which are readable by the public are widely used by cryptocurrencies. Private blockchains have been proposed for business use.  Blockchain a transformative decentralized digital currency, a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

International cyber diplomacy and security

Information and communication technology present new challenges to international affairs.The scale and speed of technological advancements in cyberspace are unprecedented. As the fourth industrial revolution dawns, bringing with it the reality of big data, artificial intelligence, and quantum technology, the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber threats of Cryptocurrency and Cryware

Bitcoin is a digital currency that allows for the transfer of payment between two parties, without the help of a bank—and without government oversight. On average, more than 250,000 bitcoin transactions occur every day, and with a market capitalization in excess…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

GPS III and NTS-3 Satellites will provide higher acccuracy, jam resistance, and new navigation warfare (NAVWAR) capabilities to US DOD

GPS IIIF Program

The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Security of Industrial control systems (ICS) and SCADA systems

ICS

Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes. Depending on the industry, each ICS…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Mobile security

mobilesecurity

The future of computers and communication lies with mobile devices, such as laptops, tablets and smartphones with desktop-computer capabilities. Their size, operating systems, applications and processing power make them ideal to use from any place with an internet connection. And…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyberbiosecurity threats, vulnerabilites and cyberbiosecurity technologies

cyberbiosecurity

The life sciences now interface broadly with information technology (IT) through its industrial applications in health care, agriculture, manufacturing, automation, artificial intelligence, and synthetic biology. The information moves between living and cyber systems in a two-way flow.   Global public…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing Cyber threats to commercial aviation require cyber risk management, and resilient systems

cyber security in transportation 9 638

Cyber attacks are growing in number and sophistication affecting large corporations, critical infrastructures of all kinds, governments to SMEs, and increasingly the aviation industry.   Commercial aviation plays a central role in our daily lives and is an essential part…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyberwarfare among US, China and Russia driving Secure Internets cyber technologies

russia internet isolated

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here