Cyberdefence

Cyber ​​attacks with physical effects

Throughout the months of June and July of this year we have been witnessing various explosions in Iran, followed over time and that have affected such sensitive facilities as missile warehouses of the Islamic Revolutionary Guard Corps (IRGC), complexes military, nuclear plants, petrochemical plants or healthcare facilities. The possibility that these explosions are actually cyberattacks carried out by an enemy country, specifically Israel, has raised several doubts among analysts and experts dedicated to monitoring the security and strategic context in this region. [Keep reading…]

Cyberdefence

Quantum computing and cyber defense

On October 23, 2019, Google announced that it had managed to achieve quantum supremacy, that is, that it had developed a computer capable of solving a problem that a traditional computer would not have been able to solve in a fixed time. Specifically, they claimed to have carried out a calculation in 200 seconds that would have taken a current computer about 10.000 years. [Keep reading…]

Cyberdefence

The electronic trail of COVID-19 and user privacy

The design of methods and plans to resume activity and increase control of the COVID-19 crisis, in which institutions are immersed, necessarily involves the search for a solution to control or stop infections, possibly following the model from countries that have managed to control it in an early phase such as South Korea. One of the tools that have allowed such tight control of infections in this country has been the implementation of a strict social control program, whose interference in the privacy of citizens makes it difficult to compatible with the privacy principles that it seeks to promote. the European Union in cyberspace. (Continue…) Dear reader, this article is exclusively for paying users. If you want to access the full text, you can subscribe to Ejercitos Magazine taking advantage of our offer for new subscribers through the following link.

Cyberdefence

Social engineering

If there is one concept that information security experts generally agree on, it is that the human factor is the most vulnerable element of any security system. According to a survey of the private sector carried out in 2017 by Carnegie Mellon University, the companies consulted estimated, on average, that 27% of the cyber incidents they had suffered in the year had originated from a person belonging to the organization, or insider ( Trzeciak, 2019), either as the author of the attack or as an unconscious facilitator. [Keep reading…]