Category Cyber & Information Warfare

With rising threat of mobile malware, Mobile companies are launching secure smartphones

5 most secure smartphones in the world

The recent rise in mobile malware have made Mobile phones vulnerable to data leakage and tempering of sensitive information such as business documents, bank details, credit card information and make purchases. Malware client called Pegasus have been found that can  jailbreak…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising cyber-attacks to Small and Medium Businesses( SMB or SME) and cyber security requirements

cybersecurity for small businesses

SMEs contribute to more than one third of GDP in emerging and developing economies and account for 34% and 52% of formal employment respectively. SMEs and young firms that experience rapid growth can have a considerable impact on employment creation…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA plans secure Blockchain technologies to create tamper-proof military computer systems

darpablockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

IARPA using Big Data Analytics to automatically discover Signals from Web Sources to Predict Cyber Attacks

article predictcyber

Cyber crimes and attacks continue to expand exponentially and involving more and more advanced and sophisticated techniques to infiltrate corporate networks and enterprise systems. Types of attacks include advanced malware, zero day attacks and advanced persistent threats. Flawed software, the root…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s PLINY & MUSE use Big Data on open-source software to remove software vulnerabilities and enhance reliability

darapamusepliny

During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA enhancing Military COTS system security by automatically deploying secure configurations of Components

cotsDARPA

The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Detecting and Mitigating Advanced persistent threat (APT) major challenge for IT Firms, industrial establishments, and military organizations.

apt lifecycle

An advanced persistent threat (APT) refer to complex, sophisticated and stealthy techniques of using software, hardware or social engineering tools to continuously monitor and extract data from targets such as organizations and/or nations for business or political motives. They typically…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

syntheic fraud

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technologies to secure future Billions of Every day and Military “Internet of Things” and enabling new industrial revolutions such as Industry 4.0

iot security problems challenges and solutions 17 638

By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability. These devices shall comprise of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Recent reports find rising insider cyber threats, rising Gray / Black Hats, with US & UK topping in number

081011 scaryhacks 1 100541046 gallery.idge

Black hat hackers  are  responsible for writing malware, which is a method used to gain access to these systems. They usually have extensive knowledge about breaking into computer networks and bypassing security protocols. Their primary motivation is usually for personal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here