Cyber War Can Be Real War

Cyber-war.jpg

While we’re worrying, with justification, about the possibility of all-out nuclear war in the Middle East we also need to consider the possibilities inherent in a simple device that you are looking at right now.

That device is your computer, and the means of delivery of untold mayhem is the Internet. Revenge hacking is an old deal and recently The Democrats for Life web site, was maliciously hacked for by pro abortionists. Now big web sites experience frequent malicious attacks.

Recently, the Vatican was hacked. A group of hackers took credit for it, with a pompous statement claiming that they were attacking the Catholic Church, not individual Christians. Last month The World Weekly, which is a UK magazine, was shut down by hackers after they had criticized the Turkish president.

Cyber warfare has the potential to cripple entire nations in one swoop, and it can do it without spending a dime or firing a shot.

The primary purpose of bombing in warfare is to destroy the war-making capacity of a nation. The targets are the means of building armaments, transportation links and the infrastructure of the nation. If bombing is able to destroy these things, it will destroy the ability of the nation to carry war forward on a mass scale.

Cyber warfare can accomplish most of these same purposes. It can shut down economic systems, cripple or even halt modern manufacturing, bring the flow of traffic to a halt, and destroy communication at all levels of government, including among first responders. It can completely scramble the internal communications of nations or whole regions of the world.

Cyber warfare also has the potential to be the ultimate code-breaker. It can obtain data of all types from government, business and individuals, revealing their plans, finances and secrets.

Cyber warfare can be real warfare. If it is backed up with more traditional forms of war making such as bombing and troop deployment, its tactical impact is almost beyond reckoning.

Ein News: http://bit.ly/1JgnHwb

« The 2016 USA Election Cyberwar Has Begun
How Can You Survive Cyber Warfare? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.