Articles sur Cyber warfare

Affichage de 1 à 20 de 29 articles

Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most. Shutterstock

Is cyberspace the latest conflict frontier on the African continent?

Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Is everything on the up-and-up here? Rick Wilking/Reuters

How vulnerable to hacking is the US election cyber infrastructure?

With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia. Army-Cyber/flickr

America is ‘dropping cyberbombs’ – but how do they work?

The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Cyberwarfare is a threat that is anonymous, hard to trace and hard to defend against. Keyboard image via shutterstock.com

Cyberwar is here to stay

The openness of the Internet gives an advantage to attackers – but what constitutes an act of war in the electronic world?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it. Midnight via www.shutterstock.com

Zero-day’ stockpiling puts us all at risk

“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
Hacking and making a profit isn’t as easy as it looks. Reuters

Hard Evidence: how much is cybercrime really costing us?

In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…

Les contributeurs les plus fréquents

Plus