Pages

Categories

Search

 

Posts Tagged: cyber-attack

A research team published three separate vulnerabilities in the mobile communication standard LTE (4G). Two of the attacks allow an attacker to view LTE traffic and user details, while the third enables an attacker to manipulate data traveling to users’ devices. The report also indicated that thes...

Cyber and Electromagnetic Activities (CEMA) cells are being inserted into brigades to provide cyber support and capabilities in roles that have been compared to those of artillery planners. The cells could allow a commander to target local ISPs and routers to prevent their use by enemy forces. They ...

Software and hardware used by ships are vulnerable to tracking, and even hijacking ships, according to a study by cybersecurity firm Pen Test Partners. Vulnerabilities are caused by satellite communications systems with insufficient protections that allow hackers to gain admin access. From this poin...

NATO states have increased the levels of cooperation and capabilities in terms of cyber attacks on member states. Areas of increased cooperation include information sharing in real time, integrating national cyber capabilities into NATO planning and operations, creating Rapid Reaction teams, and tra...