Cyber Weapons

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • A Step Beyond Sabre Rattling: Notes from the Ukraine–Russia Cyberconflict

    Cyberconflict in Ukraine has become normalised in that it is focused, there is no lasting damage, and it effectively conveys a sense of helplessness to the affected government and population. At the same time, it signals to other governments that they are not impervious to such attacks.

    February 23, 2022

    Growing Cyber Risks to Energy Infrastructure

    Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.

    May 20, 2021

    COVID-19 Vaccine and Cyber Espionage

    Cyber criminals have caused economic losses and operational disruptions to organisations involved in vaccine research and distribution.

    January 28, 2021

    COVID-19 and Cyber Risks

    While maintaining cyber hygiene in these disruptive times is indeed a challenge, each organisation should work towards putting in place a tailor-made work-from-home cyber defence strategy.

    March 30, 2020

    TikTok: A Ticking Bomb!

    TikTok has hooked youngsters around the world. What is worrisome is the lack of understanding about the long-term implications of such social media apps with regard to data protection and national security.

    December 24, 2019

    Why wait for the elusive tipping point in cyber?

    The UNGGE process is the least bad option to keep open channels and maintain continued focus on securing cyberspace.

    March 21, 2018

    EMP Weapons and the New Equation of War

    Besides military targets, a number of strategic civilian targets, like urban data and communication centres, stock exchanges, factories and other centres of gravity could also be attacked by e-bombs.

    October 13, 2017

    US ups the ante in Cyberspace

    The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.

    August 25, 2017

    The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Hypersonic Weapons

    Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.

    Pages

    Top