Cyber Weapons

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Hypersonic Weapons

    Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.

    Sanjay Prakash Sahoo asked: Is there a CERT kind of an approved framework to neutralise cyber threats to our nuclear reactors?

    Munish Sharma replies: The Indian Computer Emergency Response Team (CERT-In) is the national nodal agency to respond to the cyber security incidents. However, nuclear installations are part of India's critical infrastructure. A nodal agency, National Critical Information Infrastructure Protection Centre (NCIIPC), designated by Section 70A of the IT (Amendment) Act, 2008 was established in 2014 to augment the protection of critical information infrastructure in India.

    Lashkar-e-Cyber of Hafiz Saeed

    Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.

    March 21, 2016

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    As ISIS strives to spread its tentacles in India, it would definitely build up a network of sympathisers and probable recruits, connected digitally with its operatives spread across the globe and available online round the clock.

    February 02, 2016

    Sunny Tomar asked: What is the difference between cyber-crime and cyber-terrorism? What is India’s position on both the issues?

    Cherian Samuel replies: From the technical angle, the difference between cyber-crime and cyber-terrorism is only nominal in that the means are the same, but the goals may be different. The same vulnerabilities in networks and systems can be used to attain a variety of goals, from crime to terrorism. As a hypothetical example, the systems of a high-value target such as a nuclear plant may be taken over by criminals and held to ransom or by terrorists for destructive purposes.

    The Invisible War in West Asia

    The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.

    September 07, 2012

    Top