Hypersonic Weapons
Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.
- Ajey Lele
- 2017
Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.
Cyberconflict in Ukraine has become normalised in that it is focused, there is no lasting damage, and it effectively conveys a sense of helplessness to the affected government and population. At the same time, it signals to other governments that they are not impervious to such attacks.
Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.
Cyber criminals have caused economic losses and operational disruptions to organisations involved in vaccine research and distribution.
While maintaining cyber hygiene in these disruptive times is indeed a challenge, each organisation should work towards putting in place a tailor-made work-from-home cyber defence strategy.
TikTok has hooked youngsters around the world. What is worrisome is the lack of understanding about the long-term implications of such social media apps with regard to data protection and national security.
The UNGGE process is the least bad option to keep open channels and maintain continued focus on securing cyberspace.
Besides military targets, a number of strategic civilian targets, like urban data and communication centres, stock exchanges, factories and other centres of gravity could also be attacked by e-bombs.
The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.
Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.