Cyberterrorism

Active pursuit of nuclear weapons by North Korea is widely recognized as a threat to peace and stability Asia, but its investments in cyber warfare and other asymmetric capabilities are also considerable. North Korea regularly hacks South Korean computers, and the bulk of its cyberattacks appear to be email hacks, says the Yonhap News Agency. Roughly 86 percent […]

by

Sharon Muguwu  •  19 September 2016 5:08PM  •  0 comments HARARE – The Computer Crime and Cybercrime Bill has come under heavy scrutiny with stakeholders raising concerns over some sections that give the State power to spy on citizens. A panicky Zanu PF — that is faced with rising protests has proposed a raft of […]

by

Sharon Muguwu  •  19 September 2016 5:08PM  •  0 comments HARARE – The Computer Crime and Cybercrime Bill has come under heavy scrutiny with stakeholders raising concerns over some sections that give the State power to spy on citizens. A panicky Zanu PF — that is faced with rising protests has proposed a raft of […]

by

3 Gaps in State Power The opportunistic ability of criminal-terrorist groups to take over geographic areas is due to declining state power in some regions. In the Middle East and North Africa, for example, the instability in the wake of the Arab Spring has undermined state control in several countries, resulting in weak services, chronic […]

by

‘+’ml’ ); if (!(jQuery.browser.msie || jQuery.browser.opera)) { iframeDoc.close(); } } } } var DQnADOMReady = { onDQnADOMReadyHandler : function() {}, // returns true if listener is active, otherwise – false (that means that // window.onload is used listenDQnADOMReady : function() { var browser = navigator.userAgent; var is_safari = /(safari|webkit)/i.test(browser); var is_opera = /opera/i.test(browser); var is_msie […]

by

The Organization for Security and Cooperation in Europe (OSCE), an umbrella body for 57 European, North American, and Central Asian nations in the security field, has chosen Prof. Gabi Weimann of the University of Haifa to plan and establish a new teaching and research framework concerning online terror. “Online incitement, radicalization, and recruitment have had a significant […]

by

Security researchers claimed last week that hackers have managed to penetrate computer networks associated with the IDF, Reuters reported. The researchers at Blue Coat Systems Inc. told the news agency that the attack was part of an espionage campaign that skillfully packages existing attack software with trick emails. The four-month-old effort, most likely by Arabic-speaking […]

by