Connect with us

Technology

Cyber-weapons on the Dark Web

Published

on



Cyber-war is more concerning to today's policymakers and decision-makers than cybercrime. Cyber-terrorists and state-sponsored hackers are the key actors in cyber-war, who not only attack websites to deface them and steal Facebook accounts, but also compromise and destroy our country's economic security.

A malware agent used in a cyberattack for military, paramilitary, or intelligence purposes is usually referred to as a cyberweapon. Data theft and electronic or physical destruction are examples of cyber weapons. While a cyberweapon nearly always causes direct or indirect financial harm to the target organization, direct financial gain for the sponsor is not the primary goal of this type of agent.

A cyber-army is a group of troops with advanced cyber talents who are extremely competent in information technology. Countries should use cyber-armies to maintain national cybersecurity. China is ranked first in cyber defensive power, followed by the Netherlands and France, then the United States and Canada.

According to the researchers, the United States leads in cyber offensive, cyber norms influence, and cyber intelligence. Teams at Cyber Command are allocated to specific adversaries — including Iran, North Korea, Russia, and China — and have worked with the intelligence community for years to get access to digital networks. Cyberweapons are stealth weapons that, like any computer code, are written in zeros and ones. They have the ability to infiltrate entire networks as well as infect individual PCs. They have the ability to block communication systems, confound enemy signals, and stop military attacks before they happen, all without the flash and bang of traditional weapons of war.

Advertisement

Although cyber warfare is a new phenomenon in its current form, the notion is as old as warfare itself. Rivals used to try to physically interrupt their opponent's communication networks in the old days as well. Similarly, using all available means, well-thought-out strategies were used to gain access to information systems and develop mechanisms of misinformation in enemy ranks.

Humans are becoming increasingly reliant on technology due to rapid advancements in communication tool applications. During the COVID-19 pandemic, the efficacy of these technical techniques was put to the test. Even the most advanced states with cutting-edge medical facilities were crippled for months, forcing everyone from executives to administrative staff to work digitally from their homes.

Furthermore, the idea of cyber threats has muddled the internal and external dimensions of national security, allowing less powerful state and non-state actors to increase their influence efforts. One of the causes that have fostered the formation of hybrid threats or made irregular warfare more appealing is the shifting nature of traditional ideas of armed conflict and war, because these may not motivate military action.

Due to its great capacity to disrupt communication infrastructure, cyberwarfare is now regarded as a more appropriate tactic for offensive action against a rival. This is particularly risky because it has the potential to immobilize the target system for the duration of the disruption. Highly sensitive defense installations, such as command and control systems, missile-firing sites, air defense systems, and, more importantly, strategic decision-making mechanisms, may be included in these systems.

The race for space dominance, which began in 1957 with the launch of Sputnik-I by the then-Soviet Union and ended in 1958 with the launch of the United States' first manned space voyage, was perhaps to attain improved connectedness, integration, and networking in the decades to come. However, knowledge gained via advancements in the fields of information and space technology is now being used in a bad way to disrupt the same communication and integration.

Advertisement

State institutions have become increasingly vulnerable as a result of the use of cyber warfare as part of a strategy to disrupt enemy lines of communication and cause harm to their prospective capabilities. Personal security, which is an important component of human security, is also vulnerable to disruptions in communication, location, and financial activities, to name a few examples. As a result, international and national organizations must establish legal procedures to ensure that cyber warfare does not violate an individual's rights or deprive him or her of his or her financial assets.

Cyber-warfare tools used by the military could eventually fall into the hands of hackers. According to Interpol Secretary General Jurgen Stock, in a few years, state-developed cyberweapons will be available on the darknet, a hidden area of the internet that cannot be accessed using search engines like Google.

"In the physical world, that is a significant problem—we have weapons that are used on the battlefield today and will be utilized by organized crime groups tomorrow. The same is true for digital weapons that are currently in use by the military, have been created by the military, and will be available to criminals tomorrow."

Ransomware, in which hackers lock down a company's computer systems and demand a ransom payment to regain control, is one of the most common cyberweapons. Cyberwar has long been a source of fear for governments around the world, but it has resurfaced in the wake of the Russia-Ukraine conflict.

Cyberwar has long been a source of fear for governments around the world, but it has resurfaced in the wake of the Russia-Ukraine conflict. Moscow has been blamed for a number of cyberattacks that occurred before and during its military invasion of Ukraine, but it has always denied the allegations. Meanwhile, Ukraine has solicited the assistance of volunteer hackers from all around the world to aid in its defense against Russian aggression. A "significant number" of cyberattacks go unnoticed. "It's not just law enforcement that demands we develop bridges between our silos, the islands of information," says the author. According to the World Economic Forum's Global Cybersecurity Outlook study, the number of cyberattacks worldwide more than doubled in 2021. According to the research, ransomware remains the most common sort of assault, with firms being targeted 270 times each year on average. Critical energy infrastructure and supply lines are being jeopardized by cyberattacks.

Advertisement

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

AI threat demands new approach to security designs

Published

on

By



OTTAWA:

The potential threat posed by the rapid development of artificial intelligence (AI) means safeguards need to be built in to systems from the start rather than tacked on later, a top US official said on Monday.

“We’ve normalized a world where technology products come off the line full of vulnerabilities and then consumers are expected to patch those vulnerabilities. We can’t live in that world with AI,” said Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency.

Advertisement

“It is too powerful, it is moving too fast,” she said in a telephone interview after holding talks in Ottawa with Sami Khoury, head of Canada’s Centre for Cyber Security.

Easterly spoke the same day that agencies from 18 countries, including the United States, endorsed new British-developed guidelines on AI cyber security that focus on secure design, development, deployment and maintenance.

“We have to look at security throughout the lifecycle of that AI capability,” Khoury said.

Earlier this month, leading AI developers agreed to work with governments to test new frontier models before they are released to help manage the risks of the rapidly developing technology.

“I think we have done as much as we possibly could do at this point in time, to help come together with nations around the world, with technology companies, to set out from a technical perspective how to build these build these capabilities as securely and safely as possible,” said Easterly.

Advertisement



Continue Reading

Technology

ByteDance to restructure Nuverse in retreat from gaming business

Published

on

By


TikTok maker ByteDance plans to wind down its Nuverse gaming brand and retreat from mainstream video games, four people familiar with the matter said.

ByteDance told Reuters it had decided to restructure its gaming business after a review, without giving further details.

“We regularly review our businesses and make adjustments to centre on long-term strategic growth areas. Following a recent review, we’ve made the difficult decision to restructure our gaming business,” the spokesperson said.

Advertisement

The sources said ByteDance will tell employees on Monday to stop working on unreleased games by December, and that it will look for ways to divest from titles already launched.

The decision is likely to impact hundreds of employees, some of whom learnt about the move at the weekend, the people said.

The Chinese technology firm has no plan to return to the $185 billion global video games market, they added, declining to be identified as the information was not public.

Casual gaming brand Ohayoo, whose games feature on Douyin – TikTok’s sister app in China – will not be affected, and neither will casual games that run on TikTok, one of the people said.

Reuters reported this month that ByteDance had started seeking buyers for game-developing subsidiary Moonton Technology. It also overhauled its virtual reality company Pico, cutting much of its content team.

Advertisement

ByteDance’s 2019 creation of Nuverse was widely seen as a major push into global gaming and a strategic element of its competition with domestic rival Tencent Holdings, the world’s biggest gaming company.

But Nuverse’s performance has been patchy. Its best-known game is “Marvel Snap”, an online card game that amassed a cult following but was not a commercial hit.

Other titles include action games “One Piece: The Voyage” and “Crystal of Atland”.

Nuverse came into focus again in 2021 when ByteDance formalised its status as one of its six business units under a broader structural overhaul.

To build up production capacity, Nuverse acquired external studios including C4games in 2021.

Advertisement



Continue Reading

Technology

Four reasons for not missing out on ChatGPT 3 mobile app

Published

on

By


The launch of ChatGPT-3 took the world by storm, not only becoming a helping hand for many but also igniting a field of competition among leading tech giants

Building on its web version, OpenAI has also made ChatGPT 3 available on mobile as an app. It is designed to mimic human-like conversation, providing responses that are not just accurate but contextually relevant. Here are some details about the app that you should not miss;

1. Simple User Interface

Advertisement

The developers have put in detailed effort to ensure that the app is not just powerful, but also user-friendly and accessible. With a clean, intuitive design, it caters to both tech-savvy users and those new to AI technology. Additionally, the app includes accessibility features, making it a tool that is truly for everyone.

2. Multi-Language Support

To make it accessible to a maximum number of people, ChatGPT 3 can converse in multiple languages. To opt for a different language, click on the three dots beside your profile icon and choose Main Language from the menu. Choose the desired language and continue searching.

3. Voice Interaction

To enhance usability, the app includes voice-to-text and text-to-voice features, allowing users to have conversations with ChatGPT-3 just like they would with a virtual assistant.

Advertisement

4. Regular Updates and Improvements

Continuous updates based on user feedback and technological advancements keep the app at the forefront of AI capabilities, constantly enhancing its features and usability.



Advertisement
Continue Reading

Trending