Geopolitical, Terrorism

Russian hacking campaign targets G20 attendees with booby-trapped invites

Russian hacking campaign targets G20 attendees with booby-trapped invites

Tracing the sources of today's Russian cyber threat

Tracing the sources of today's Russian cyber threat

GOP lawmaker calls for ‘massive cyberattack’ on North Korea

GOP lawmaker calls for ‘massive cyberattack’ on North Korea

In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking

In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking

Claims resurface that Kaspersky helped Russian intelligence

Claims resurface that Kaspersky helped Russian intelligence

There's Now At Least One Real, Live Witness In FBI's Election-Hacking Probe

There's Now At Least One Real, Live Witness In FBI's Election-Hacking Probe

America’s top 4 cyberspace foes

America’s top 4 cyberspace foes

U.S. Worried North Korea Will Unleash Cyberattacks

U.S. Worried North Korea Will Unleash Cyberattacks

Tracing the sources of today’s Russian cyberthreat

Tracing the sources of today’s Russian cyberthreat

Kenya's Election Proves Fake News Is A Serious Threat To International Security

Kenya's Election Proves Fake News Is A Serious Threat To International Security

A Guide to Russia’s High Tech Tool Box for Subverting US Democracy

A Guide to Russia’s High Tech Tool Box for Subverting US Democracy

Controlling cyber conflict

Controlling cyber conflict

Drop a pre-emptive cyber bomb on North Korea?

Drop a pre-emptive cyber bomb on North Korea?

How to Prevent a Cyberwar

How to Prevent a Cyberwar

Trump can’t use cyber to stop North Korea’s nuclear weapons

Trump can’t use cyber to stop North Korea’s nuclear weapons

Cyberwar: A guide to the frightening future of online conflict

Cyberwar: A guide to the frightening future of online conflict

Read about the latest happening in geopolitical cyberspace and cyber terrorist attacks

This category provides expertly curated news on the geopolitical and terrorism related aspects of the cyberspace. It has now been globally accepted that cyberspace has emerged as the fifth domain of warfare and geopolitics; the other four being land, air, water and space. No country can now afford to overlook the cyber dimension to their national security. The terrorists have become very much active on the cyber space as is evident from the recent activities of the Islamic State. Cyber terrorism has emerged as a major challenge for the security agencies. The terrorists are finding it meaningful to conduct cyber attacks on the national assets and make them dysfunctional and achieve their means of spreading terrorism. The state actors are also finding it convenient to conduct cyber attacks for achieving geopolitical gains because of lack of attribution in cyberspace. A “Great Game-Cyber” is being played now among the major powers of the world wherein the security of private sector and government sector is intricately linked to the national security. For any security professional, to understand the geopolitical and terrorism aspects of cyberspace, news from this category should never be missed.