Cyber War Can Be Real War

Cyber-war.jpg

While we’re worrying, with justification, about the possibility of all-out nuclear war in the Middle East we also need to consider the possibilities inherent in a simple device that you are looking at right now.

That device is your computer, and the means of delivery of untold mayhem is the Internet. Revenge hacking is an old deal and recently The Democrats for Life web site, was maliciously hacked for by pro abortionists. Now big web sites experience frequent malicious attacks.

Recently, the Vatican was hacked. A group of hackers took credit for it, with a pompous statement claiming that they were attacking the Catholic Church, not individual Christians. Last month The World Weekly, which is a UK magazine, was shut down by hackers after they had criticized the Turkish president.

Cyber warfare has the potential to cripple entire nations in one swoop, and it can do it without spending a dime or firing a shot.

The primary purpose of bombing in warfare is to destroy the war-making capacity of a nation. The targets are the means of building armaments, transportation links and the infrastructure of the nation. If bombing is able to destroy these things, it will destroy the ability of the nation to carry war forward on a mass scale.

Cyber warfare can accomplish most of these same purposes. It can shut down economic systems, cripple or even halt modern manufacturing, bring the flow of traffic to a halt, and destroy communication at all levels of government, including among first responders. It can completely scramble the internal communications of nations or whole regions of the world.

Cyber warfare also has the potential to be the ultimate code-breaker. It can obtain data of all types from government, business and individuals, revealing their plans, finances and secrets.

Cyber warfare can be real warfare. If it is backed up with more traditional forms of war making such as bombing and troop deployment, its tactical impact is almost beyond reckoning.

Ein News: http://bit.ly/1JgnHwb

« The 2016 USA Election Cyberwar Has Begun
How Can You Survive Cyber Warfare? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.