Israeli `undercover’ operatives appear to have penetrated the supply-chain logistics of the Shia militant group acting as middlemen. It is, ho
Read MoreBy Prasad Nallapati* Malicious activists of China and its allies, Pakistan and North Korea, are seen to be aggressively prowling to take control of
Read MoreHacktivists and western cybersecurity groups, who played a vital role in helping Ukraine in their fight against Russian cyberattacks, appear to be
Read MoreNew Trans-Atlantic Data Privacy Protections and Data Leaks of Drug Trafficking operations are some of the highlights during the last week New Trans-
Read MoreCyberattacks are indeed a critical component of a conflict but their success depends on multiple variables, such as early access to adversary’s system
Read MoreIf Russia’s influence operations are bursts of bad weather, China’s growing operations are like climate change that are far more destructive – says Ke
Read MoreThe country needs to build up the required capability inhouse, besides joining multinational effort to police cyberattacks and develop foolproof stand
Read MoreThe two technical giants, US and China, have intensified their unfettered confrontation for global domination. Either of them coming out victori
Read MoreBy Prasad Nallapati SUMMARY Pressure is mounting on India from both the US and China on use of the Huawei Corp equipment in its 5thGeneration (5G) t
Read Moreby Prasad Nallapati Cyber warfare, which has so far been a hush-hush affair, is now public with nation states fully integrating it into their strategi
Read More