Tags » Cyber War

Red Flags in Cyber-Surveillance Pt I

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[6] In the United States for example, under the…

210 more words
Cultural Consciousness

Indian Hackers Defaced Pakistani Singer's website, cyber war continues. Beware!

Yet Again, Indian Hackers have struck yet again. They have hacked Pakistani Singer Haroon’s website. They have warned Pakistani hackers to stop hacking Indian Websites or the hacking would multiply. 70 more words

India

How countries use war games to prevent future catastrophes

On Oct. 13, the US and the UK will engage in a simulation of what would happen (paywall) if a large transatlantic bank went under. Treasury secretary Jack Lew, his British counterpart George Osborne and the heads of both central banks will take part. 759 more words

Indian Hackers hack Rawalpindi's govt website, posts National Anthem and warn Pakistanis.

Indian Hackers have struck yet again. They have hacked Rawalpindi’s govt official website. They have warned Pakistani hackers to stop hacking Indian Websites or the hacking would multiply. 70 more words

India

These Superb Indian Hackers hacked website of Bilawal Bhutto's party, Posts Indian Flag on his website.

An Indian Hacker group called Indian Hacker’s Online Squad ( i-HOS) hacked Bilawal Bhutto’s party PPP’S Official page and they say it’s just a warning for Bilawal’s Bhutto for giving stupid comments for Kashmir. 70 more words

India

UNITED STATES: ' You Have Been Hacked or About to be By China '

#AceNewServices – UNITED STATES – The United States says it spends billions of dollars each year to counter what it describes as China’s cyber-war against the…

183 more words

#ANS2014

Chinese Military’s Quantum Communications Not Vulnerable to Cyber Attack

In my post on August 31, 2014 titled “Xi Jinping Exploits Development of Military Technology to Control PLA”, I said, “As far as this bloggers knows, China is making great efforts in developing quantum communications networks that are entirely secure from hacking and cyber espionage.” 594 more words