With the onset of virtual currency and three-dimensional printing, cyber attacks are likely to grow with intensity.
According to the latest research reports, hackers are growing more sophisticated in terms of discovering vulnerabilities in a country or establishment’s infrastructure.
Israeli Prime Minister Benjamin Netanyahu this week announced an initiative calling on tech giants and allies in the west to collaborate on anti-cyber hacking measures. He also vowed to relax export restrictions normally placed on security-related technologies so Israeli cyber defence companies can sell their expertise around the globe.
"We are taking a gamble," Netanyahu acknowledged at a cyber technology conference on Monday. "Entailing some risks, but willing to do so to get much bigger gain."
In 2012, Israel established a national cyber bureau to co-ordinate defence against attacks on the country's infrastructures and networks.
In the last few years, the number of Israeli cyber defence companies has ballooned from a few dozen to more than 200, accounting for 5% to 10% of the global cyber security industry, said Eviatar Matania, head of Israel's national cyber bureau.
This week, IBM and Lockheed Martin announced new cyber research projects in Israel, and Deutsche Telekom and EMC have also established research centres in the country.
Israel's national cyber bureau said it is currently formulating rules on what cyber technologies cannot be exported. Rami Efrati of the bureau said those regulations would be completed within six months.
In 2013, the US financial industry “faced wide-scale network denial-of-service attacks that became increasingly difficult and costly to mitigate,” according to the U.S.
government’s annual assessment of global threats.
The GAO says next-generation technologies carry photos and other data-heavy packages such as building blueprints and maps to help emergency responders do their jobs, thus rendering itself vulnerable to cyber attacks.
It also noted that the Next-Generation 911(NG 911) technology that local Public Safety Answering Points (PSAPs) are installing in towns and cities across the nation relies heavily on IP and cloud-based technologies to handle emergency calls from the public.
Meanwhile, scientists from the University of Michigan have created a mathematical model to help hackers calculate the optimal moment to launch a cyber attack against a victim and inflict the most damage.
The scientists claim that many nations are accumulating stockpiles of flaws in computer systems that have gone undiscovered by anyone and are kept aside until they are required. This is commonly known “zero-day exploits”.
“New vulnerabilities in computer systems are constantly being discovered. When an individual, group, or nation has access to means of exploiting such vulnerabilities in a rival’s computer systems, it faces a decision of whether to exploit its capacity immediately or wait for a more propitious time,” says the paper.
On Thursday, Cisco issued a report identifying increased complexity of threats and solutions due to rapid growth in intelligent mobile device adoption and explained that cloud computing would continue to provide a greater attack surface than ever before.
New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets, the report added.
It further explained that cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices.
The Pentagon will undergo a massive realignment to its intelligence arm and is stream lining its cyber warfare and science and technology efforts. Part of the re-organization will include merging the Pentagons ISR Task Force into an ISR Operations Directorate, counterintelligence and security directorates have been merged together and HUMINT, sensitive activities and National Programs Directorates have been combined
NATO today launched a three-day major cyber defense exercise named ‘Cyber Coalition 2013 to ward off massive, simultaneous attacks on member states and their partners. "Cyber attacks are a daily reality and they are growing in sophistication and complexity," Jamie Shea, a NATO official specializing in emerging security challenges, said in a statement
As a side-effect to Edward Snowden's revelations on widespread snooping US' National Security Agency (NSA), defense companies rolling out new cyber security solutions aimed at securely sharing sensitive information. Lockheed Martin this week announced the development of a new cyber security solution that allows intelligence to be securely shared among personnel working at all security levels -- from highly classified intelligence sites to unclassified users in the field
Brazil and Russia are planning to expand cooperation between the two countries with the creation of working groups in the areas of cyber security and space. Based on a proposal made by Brazilian defense minister Celso Amorim, and accepted by his Russian counterpart, defense minister Sergei Shoigu, the two countries also agreed to establish a political-strategic dialogue between the two nations in the areas of defense and international security
The Swedish armed forces are seeking to strengthen their cyber defense in order to to attack other countries' computer networks, according to Radio Sweden. In the armed forces' latest forward planning document that was handed over to the government the other week, there is a repeated mention of the need to develop what is called "offensive cyber capabilities"
The United States is reportedly facing a shortage of cybersecurity professionals — particularly for positions within the federal government because it does not offer salaries as high as the private sector. According to a study published by the RAND organization, the demand for cybersecurity professionals began to overtake supply in 2007, largely due to increased reports of large-scale hacking, including the leakage of credit card data, attacks on Internet connectivity, and the discovery of "advanced persistence threats" — teams of hackers who go after intellectual property by establishing a persistent presence in the networks of U
The US Air Force is looking to address challenges of secure communications with its Mini Crypto program, Defense Systems reports. The service is seeking cryptographic devices that meet National Security Agency requirements while also falling within low size, weight and power, or SWaP, parameters
A South African company that builds software security solutions, iSolv Technologies (iSolv), has developed an avant-garde way to help secure sensitive communication from being intercepted. SecCom offers military-grade encryption for all your mobile communications, including voice calls and text messaging
DARPA’s Ground X-Vehicle Technologies Seek Survivability without Piling on Armor
20 Instances of Chinese Laser Attacks on US Military Pilots Reported This
China Invites Bids To Develop Nuclear-Powered Icebreaker Ship
Lockheed Martin Wins $86M Support Contract For Iraqi C-130J Aircraft
BEL in Race to Develop Infrared Tracking System For Sukhoi Su-30 MKI...
Draken Wins USAF $280 Million ADAIR Services Contract
Pakistan Signs Deal to Procure 30 T129 ATAK Helicopters from Turkey
BAE Systems Wins $348 Million to Produce 473 Bradley Armored Vehicles
Indias plans of integrating the MBDAs meteor missile on its LCA Tejas and Su-30MKI aircraft may not happen due to...
The most-read stories on the defenseworld
One of the most interesting exhibits at the Dubai Air show 2017 occupies a corner in the Aviation Industries Corporation...
The rising demand for low-cost, combat-capable aircraft that is able to perform a range of missions in an unchallenged environment,...
Amid the proliferation of real-time data from sources such as mobile devices, web, social media, sensors, log files and transactional...
Military activity in various hotspots of the world has increased the demand for ballistic protection that includes headgear, bulletproof vests,...