Trending Cyber-Kinetic Security & Cybersecurity Posts

    All Cyber-Kinetic Security & Cybersecurity Posts

    • Cyber-Kinetic SecurityStuxnet Cyber-Physical Weapon

      Stuxnet and the Birth of Cyber-Kinetic Weapons

      Stuxnet was the first true cyber-kinetic weapon, designed to cripple the Iranian – and perhaps also the North Korean – nuclear weapon programs. It succeeded in slowing the Iranian program, although it was discovered before it could deal the program a fatal blow. Its significance goes far beyond what it did. It marks a clear turning point in the military history and cybersecurity. Its developers…

      Read More »
    • Cyber-Kinetic SecurityMaritime Cybersecurity

      Navigating a Safe Course Through Maritime Cyberattacks

      The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on facing – and overcoming – risks. But, as technology increasingly dominates it, growing risks exist that the industry dare not ignore. Its growing effort to…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Threat

      Our Smart Future and the Threat of Cyber-Kinetic Attacks

      A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure would cripple modern society. It’s easy to watch such shows and pass off their plots as something that could never happen. The chilling reality is that those plots are often based on real cyber-kinetic threats that either have already happened, are…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Attacks History

      History of Cyber-Kinetic Incidents and Research

      The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts in understanding the full scope and recognizing the trends in this growing problem. We’ll highlight examples of cyber-kinetic incidents and attacks in this chapter. Some…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Timeline

      Timeline of Key Cyber-Kinetic Attacks, Incidents & Research

      Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and Industrial Control Systems (ICS) resulting in kinetic impacts in the physical world. I tried to select only those that were first-of-the-kind or that significantly increased general awareness about a particular type of an attack or incident I know that the list…

      Read More »
    • Cyber-Kinetic SecurityChinese cybercrime

      Cybercrime in China – a Growing Threat for the Chinese Economy

      Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in the Greater China region (Taiwan, Macau and Hong Kong) have, over last few years, became the most technologically advanced region in the world – ahead…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Robot

      When Hackers Threaten your Life – Cyber-Kinetic Risks

      The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in…

      Read More »
    • Cyber-Kinetic SecurityZombification Cybersecurity Social Engineering

      Human Zombification as an Information Security Threat

      China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a discussion about population zombification does happen and it fits squarely within the domain of information security. No, this is not an Onion article. China and Russia have significantly broader definitions of Information Security than US, UK and other mostly aligned Euro-Atlantic…

      Read More »