The Petya Cyber-Attack
Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.
- Mohan Babu
- July 13, 2017
Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.
Though there might be several prevalent concerns over Aadhaar’s data security, these do not outweigh the benefits it has to offer.
The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.
The 2017 Conference also comes at a time when the existing international discourses on securing cyberspace, whether it be the UNGGE process or the Internet Governance Forum (IGF), seem to be unable to cope with the accelerated developments in cyberspace.
With the digitisation of services, such as in the case of governance and banking, or the electronic means of conducting commerce or trade, a large amount of data is generated, stored, processed; this also traverses, over digital devices and networks. The incidents of data theft compromise the integrity of this data. Data is at continuous risk from a myriad of threat actors varying from hacktivists to nation states.
China has justified the passage of the new law as an ‘objective need’ for national security considering its large cyber infrastructure and its vulnerabilities.
This backgrounder examines the current structure of ICANN, the intricacies of the IANA transition, and the way it will impact the architecture of cyberspace in the future.
Effective use of social media fuelled Wani’s rise to prominence. His skills in this domain radicalised youth in greater numbers than had previously been achieved using more conventional methods.
While the intent exists to forge a strong partnership on cyberspace issues, there is much groundwork to be done to actually build trust and move forward together.
While the China-US Cyber agreement is an attempt at conflict management or risk mitigation, the India-US Cyber agreement is a joint quest for security driven by a common threat perception, democratic values and growing dependence.