- Governments and hackers agree: the laws of war must apply in cyberspaceby Johanna Weaver, Director, ANU Tech Policy Design Centre, Australian National University on October 25, 2023 at 4:20 am
Cyberspace is a battlefield in modern conflicts – and combatants must follow international humanitarian law to protect civilians.
- The US navy is still more powerful than China’s: more so than the Australian government is letting onby Greg Austin, Adjunct Professor, Australia-China Relations Institute, University of Technology Sydney on August 18, 2023 at 3:23 am
Part of the rationale for acquiring nuclear-powered subs is to counter China’s growing military influence. But the US navy still remains much more powerful than China’s.
- Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weaponby Greg Austin, Adjunct Professor, Australia-China Relations Institute, University of Technology Sydney on May 4, 2023 at 5:58 am
Contrary to popular belief, cyber security isn’t a strong point for China and this makes it particularly vulnerable to attack in wartime.
- Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspaceby Matthew Sussex, Fellow, Strategic and Defence Studies Centre, Australian National University on April 3, 2023 at 8:10 pm
More than 5,000 documents were leaked by an anonymous whistleblower.
- A new cyber taskforce will supposedly ‘hack the hackers’ behind the Medibank breach. It could put a target on Australia’s backby Mamoun Alazab, Associate Professor, College of Engineering, IT and Environment, Charles Darwin University on November 16, 2022 at 2:35 am
Beyond neutralising the cybercriminals behind the Medibank breach, the taskforce will also seek out and attack other potential threats.
- How Ukraine has defended itself against cyberattacks – lessons for the USby Robert Peacock, Assistant Professor of Criminology and Criminal Justice, Florida International University on April 5, 2022 at 12:49 pm
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
- Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasonsby Nadiya Kostyuk, Assistant Professor of Public Policy, Georgia Institute of Technology on April 4, 2022 at 12:31 pm
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
- Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraineby Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology on March 1, 2022 at 1:44 pm
From jamming satellite signals to spreading disinformation, Russia’s military has sophisticated technologies it’s bringing to the battlefield in Ukraine.
- How much damage could a Russian cyberattack do in the US?by Scott Jasper, Senior Lecturer in National Security Affairs, Naval Postgraduate School on February 25, 2022 at 10:02 pm
Russian information warriors have the capacity to damage critical US infrastructure systems.
- Russia has been at war with Ukraine for years – in cyberspaceby Maggie Smith, Assistant Professor of Public Policy, United States Military Academy West Point on February 7, 2022 at 1:19 pm
Troop buildups and diplomatic negotiations highlight the threat of a major land war in Europe. In cyberspace, Russia has been attacking Ukrainian infrastructure and government operations for years.
- Russia could unleash disruptive cyberattacks against the US – but efforts to sow confusion and division are more likelyby Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology on January 26, 2022 at 7:55 pm
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
- Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threatby Ahmed Ibrahim, Lecturer (Computing and Security), Edith Cowan University on June 25, 2021 at 1:16 am
At this month’s summit, US President Joe Biden warned his counterpart Vladimir Putin of reprisals against ‘persistent malicious cyber-attacks’. But it will take more than posturing to end the stand-off.
- Espionage attempts like the SolarWinds hack are inevitable, so it’s safer to focus on defense – not retaliationby William Akoto, Assistant Professor of International Politics, Fordham University on January 29, 2021 at 1:30 pm
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
- The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expertby Paulo Shakarian, Associate Professor of Computer Science, Arizona State University on December 29, 2020 at 2:17 pm
Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.
- Australia is under sustained cyber attack, warns the government. What’s going on, and what should businesses do?by Mahmoud Elkhodr, Lecturer in Information and Communication Technologies, CQUniversity Australia on June 19, 2020 at 5:21 am
Australia is coming under sustained cyber attack by a ‘state-based’ actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
- Government cybersecurity commission calls for international cooperation, resilience and retaliationby Benjamin Jensen, Professor of Strategic Studies, Marine Corps University; Scholar-in-Residence, American University, American University School of International Service on May 12, 2020 at 12:35 pm
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
- Ransomware attack on sheep farmers shows there’s no room for woolly thinking in cyber securityby Roberto Musotto, Cyber Security Cooperative Research Centre Postdoctoral Fellow, Edith Cowan University on March 5, 2020 at 7:06 pm
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
- Cyberspace is the next front in Iran-US conflict – and private companies may bear the bruntby Bryan Cunningham, Executive Director of the Cyber Security Policy & Research Institute, University of California, Irvine on January 13, 2020 at 11:48 am
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
- We aren’t in a cyber war – despite what Britain’s top general thinksby David J. Lonsdale, Senior Lecturer in War Studies, University of Hull on October 25, 2019 at 9:53 am
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
- Why Huawei security concerns cannot be removed from US-China relationsby Sascha-Dominik (Dov) Bachmann, Associate Professor in International Law (BU) and (extraordinary) Reader in War Studies (SEDU), Bournemouth University on May 10, 2019 at 11:53 am
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
- US military steps up cyberwarfare effortby Benjamin Jensen, Associate Professor of International Relations, Marine Corps University; Scholar-in-Residence, American University School of International Service on March 12, 2019 at 10:44 am
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
- Cyber spies for hire: efforts to control cyber weapons ignore the agents who use themby Alexi Drew, Research Associate, King’s College London on February 15, 2019 at 1:19 pm
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
- With hacking of US utilities, Russia could move from cyberespionage toward cyberwarby Frank J. Cilluffo, Director, Center for Cyber and Homeland Security, George Washington University on July 26, 2018 at 7:14 pm
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
- Is counter-attack justified against a state-sponsored cyber attack? It’s a legal grey areaby Sandeep Gopalan, Pro Vice-Chancellor (Academic Innovation) & Professor of Law, Deakin University on March 27, 2018 at 8:15 am
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
- Cyber peacekeeping is integral in an era of cyberwar – here’s whyby Helge Janicke, Professor of Computer Science, Head of School Computer Science and Informatics, De Montfort University on January 29, 2018 at 12:55 pm
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.
Cyber Warfare
Comodo News and Internet Security Information
Security Leadership and Management Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise.
News About Cyber Warfare From Around The World.
There’s new credit card fraud research showing how vulnerable credit and debit cards are online, bought by criminals for as little as 10 dollars.
ChatGPT's latest bugs and the cybersecurity concerns surrounding OpenAI's product.
Cyber Exposure Alerts From Tenable
Two teens selling candy and asking for donations via Venmo or Zelle are accused of draining a victim's bank account in NYC in the newest scam.
CyberSecurity News, Information, Education, Certifications, Vulnerabilities and Guides.
Brussels announces plans to defend itself from growing cyber threats and the proposals will cost €1.1 billion.
Vanessa Teague is a cyber security expert and says we don't need top-down 'authoritarian' cyber security, but citizens to be empowered to protect themselves.
App Center Blog The latest news, updates and information for mobile developers using Visual Studio App Center.
By The Way.