Cyber

Military application of the Internet of Things in Network-Centric Warfare

In the 1990s, the U.S. Department of Defense put forward a new military doctrine called Network-Centric Warfare (NCW). The objective was to integrate emerging tactics, techniques, and procedures to bolster the...

Rise of Anonymous in Cyber War

Cyber warfare is a covert conflict. It encompasses attempts to harm a nation's computers or information networks by nation-states, international terrorist groups, or non-state actors using, for example, computer viruses or...

Cyber war and Right to Self-Defense of States

Cyber attacks are effective in the past and present and will be effective in the future by increasing their potential. It is a virtual attack that seriously threatens your security. Today,...

Is Central Asia Cyber Secure?

Is Central Asia Cyber Secure? Border security, religious extremism, drug trafficking, corruption and political turbulence have been acting as persistent stumbling blocks in the path of prosperity of Central Asia since its...

Pegasus Spyware: Birth of a New Peril for Pakistan

Pegasus Spyware: Birth of a New Peril for Pakistan A list of 50,000 phone numbers leaked to Amnesty International and the Paris based journalism. Some nonprofit Forbidden Stories, earlier this month, raised...
spot_img

Popular