Countries

The cyber threat in outer space

Source : The Bulletin.org In 2011 a draft report to the US Congress stated that at least two US environment-monitoring satellites had suffered interference four or more times in 2007 and 2008. A Landsat-7 Earth...

US Army Takes Aim At Fake News Hybrid Warfare

Source: TekThink The Age Of Cyber Hybrid Warfare. We are all starting to realize that we cannot necessarily trust news we are seeing on the internet or even from our politicians. It seems like everyone has...

Spain’s national security strategy to include risk of disinformation campaigns

Source : El País Latest government document does not specifically mention Russia, but alludes to recent interference in Catalan crisis and Brexit Spain’s latest National Security Strategy document, which sets out the risks to the country’s...

The House Intelligence Committee this morning will hold a rare public markup of its...

    Source and texts The House Intelligence Committee

NATO mulls ‘offensive defense’ with cyber warfare rules

Source Reuters A group of NATO allies are considering a more muscular response to state-sponsored computer hackers that could involve using cyber attacks to bring down enemy networks, officials said. The United States, Britain, Germany, Norway,...

Wikileaks publishes Project Protego.CIA’s secret missile control system

Source: wikileaks   The Protego project is a PIC-based missile control system that was developed by Raytheon. The documents indicate that the system is installed on-board a Pratt & Whitney aircraft (PWA) equipped with missile launch...

EU cyber defense Project

eda.europa.eu Fact Sheet: EDA Workstrand goals The Cyber Security Strategy for the European Union, which was released in February 2013 and endorsed by the Council in June 2013, emphasises, “Cyber security efforts in the EU also involve...

First cyber exercise at EU ministerial level focuses on strategic decision-making

  https://www.eda.europa.eu EU Defence Ministers today participate in “EU CYBRID 2017”, a strategic table-top cyber defence exercise. The exercise, the first of its kind, is organised by the Estonian Presidency of the Council of the European...

Which countries are most exposed to cyber threats, surveillance?

Cybersecurity experts often talk about the level of exposure, or the amount of “attack surface,” when describing security vulnerabilities and cyber risks. Both factors affect the likelihood that an individual or organization will fall...

Guide to Russia’s Infrastructure Hacking Teams

Since reports first surfaced that hackers targeted more than a dozen American energy utilities, including a Kansas nuclear power plant, the cybersecurity community has dug into the surrounding evidence to determine the culprits. Without...

Must Read

WP Facebook Auto Publish Powered By : XYZScripts.com

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close