Category Cyber & Information Warfare

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

IoTsurveiilance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Car Bomb

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

After initial Hype and amid Cyber Warfare threat, Network Centric Warfare approach is now being adopted realistically in various Militaries

NCW

As the 21st Century battlefield becomes increasingly complex and asymmetrical, military forces are striving to harness network technology to gain an operational advantage, by transforming traditional linear command structures and linking sensors, unmanned vehicles, command posts and ground troops to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threats of hacking of digital IDs, driving develpment of unbreakable Quantum EPUF IDs containing 1,000 trillion atoms

PUFauthentication

We live in digitised, connected societies, in an Internet of Things (IoT) world where our reliance on software, hardware, and the networks that connect us, grows exponentially. Our increasing global reliance on what we hope and assume are secure networks,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CHARIOT developing Quantum proof cryptography for Military Mobile and IoT security

darpachariot

The exponential price/performance improvements in semiconductor technology stemming from Moore’s Law are enabling even the smallest and most application-specific devices, such as sensors and actuators, to include networking capabilities. The overwhelming majority of such devices will be cheap and power-constrained.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Security Situational Awareness tools on Defense Platform Networks are critical for Cyber Warfare

situation awareness1

Cyberspace is understood as the fifth domain of warfare equally critical to military operations as land, sea, air, and space. Success of military operations in the physical domains is increasingly dependent on the availability of, and access to, cyberspace. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HACCS employing AI for cybersecurity by developing autonomous software agents, that will infiltrate adversary’s networks, detect botnets and neutralize them

Defense research unit neutralize botnets

As the complexity of software is growing software vulnerabilites are also increasing. According to two US based organizations that track vulnerability disclosure, the number of software vulnerabilities has gradually grown year-over-year achieving its highest peak in 2017. Computers are not…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

COVID-19 is enhancing Terrorism, Cyberattacks, and Bioterrorism threats in the world

Covidcyber

The head of the World Health Organization is warning that the COVID-19 pandemic is speeding up, and he criticized governments that have failed to establish reliable contact tracing to stop the spread of the coronavirus. According to the latest tally…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Under Cyber Warfare threat from China and Pakistan, India steps up cyber security measures and operationalising its Cyber Command

cyber war a threat to indias homeland security 2015 35 638

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AISS program to develop tools for automatic design of secured System on Chip (SoC) for Military IoT

AISS

A system on a chip or system on chip (SoC) is an integrated circuit (also known as a “chip”) that integrates all components of a computer or other electronic system on a single circuit die. Similar to how a microcontroller…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here