Category Cyber & Information Warfare

Blockchain technology of decentralized digital currency to enhance security of additive manufacturing in Internet of Things to Military 3D printing

Vantage Points 1

Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or company owns or controls, ensures security of transfer of funds through public and private cryptology and third parties to verify that they shook,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum Cryptography emerging alternative to secure Military Internet of things (MIOT) from cyber attacks even in post Quantum Computer Era

IoTQKD

The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hacking of Electronic Voting Machines is a threat to Democracy, DARPA Is Building a Open Source, Secure Voting System

securevoting

The introduction of the electronic voting machines in India at the turn of the century  had aided in  reducing instances of capturing of polling stations and stuffing of ballot boxes by mobs hired by political parties. Using data from state elections,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s RACE developing Secure Messaging Platform to provide WhatsApp like communication for troops on ground

RACE anonymous communication DARPA

Military is integrating Smartphones and tablets into their military operations, to enhance situational awareness and as backup communication in denied situations. Marines are considering airborne operations with tablets, Air Force looks at maintenance efficiencies, they have also widely used for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia

cyber attackISIS

United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber criminals favouring stealthier attacks like Cryptojacking to make free money

Enisa cryptojacking

Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Future Global Quantum internet could be brought down by Quantum terrorists

quantuminternet

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF Offensive Cyberspace Operations (OCO) program developed Cyber Mission Platforms, Cyber Weapons Platform & Command and Control Mission System

usafcyberdefence

The Department of Defense (DOD) defines cyberspace as a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

With rising threat of mobile malware, Mobile companies are launching secure smartphones

5 most secure smartphones in the world

The recent rise in mobile malware have made Mobile phones vulnerable to data leakage and tempering of sensitive information such as business documents, bank details, credit card information and make purchases. Malware client called Pegasus have been found that can  jailbreak…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising cyber-attacks to Small and Medium Businesses( SMB or SME) and cyber security requirements

cybersecurity for small businesses

SMEs contribute to more than one third of GDP in emerging and developing economies and account for 34% and 52% of formal employment respectively. SMEs and young firms that experience rapid growth can have a considerable impact on employment creation…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here