Soon, nearly every device will be online. That is both a beautiful and a dangerous thing “We live in a connected world” is a well-worn axiom. Even so, few people realize the true extent of t... Read more
Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate trans... Read more
Crucial questions remain unanswered Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governme... Read more
The failure to protect the Flame code from being reverse engineered may turn out to have been a monumental error. The discovery of a new species of highly sophisticated malware earlier this... Read more
Advanced cyberwar is different THE decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s... Read more
What about the benefit of transparency, accountability and public discussion? In recent years, the United States has pioneered the use of two innovative weapons, drones and cyberattacks, tha... Read more
Has the threat of cyberwar entered a significant new phase? Unpicking the burgeoning reports of activity on the digital battlefield CYBERSPACE. Some call it the new domain of war, aft... Read more
More and more, nations are waging attacks with cyber weapons — silent strikes on another country’s computer systems that leave behind no trace. (Think of the Stuxnet worm.) At TE... Read more
Countries are beginning to develop cyberwarfare policies to protect their national interests, but defending oneself in the borderless Internet will prove problematic There is speculation amo... Read more
Last year’s Stuxnet virus attack represented a new kind of threat to critical infrastructure. Just over a year ago, a computer in Iran started repeatedly rebooting itself, seemingly wi... Read more