Skip to content

Technology - 8. page

NASA Building Space Shotgun To Blast Asteroids

Sanjay Kumar Writes: Scientists at NASA are working on a giant space shotgun capable of smashing rocks out of asteroids. It is hoped the shotgun will allow experts test asteroid strength and will eventually be used as part of NASA’s Asteroid Redirect Mission (ARM).

YOUR CAR CAN BE HACKED WHILE YOU ARE DRIVING IT!!!

Sanjeev Relia says: Mr. Andy Greenberg’s car was hacked by two White Hats as part of a demonstration to show what a hacker can do to an automobile loaded with high technology. The incident highlighted shocking security vulnerabilities of our cars, something we rely on so much.

Countering Exploitation of the Internet by Extremists

Rohit Mehrotra says:The menace of abuse of social media and other internet related communications by various extremists and terror groups for fostering their ideology and showcasing their exploits is on the rise.

Russia – China Pledge Non Aggression in Cyber Warfare: Have They Ushered in an Era of Bilateral Cyber Agreements?

Sanjeev Relia writes: On 9 May 2015, Russia and China signed a pledge of non-aggression in cyber warfare. This is the first ever bilateral treaty on cyber warfare signed between two nations who themselves are known to have undertaken large scale cyberattacks in the past. In the absence of an international law governing the use of cyberspace for waging a war, nations need to work on bilateral treaties to prevent cyberspace from threatening national security.

Armed Forces Need to Learn from the CDA(O) Hack and Protect their Critical Information

Sanjeev Relia writes: The Times of India newspaper recently reported that the Controller of Defence Accounts (officers) website at Pune had been hacked into and sensitive data about Indian Army officers had been stolen. A quick check of the web page shows that the hacker had defaced the website too. This instance highlights India’s poor preparedness poorly in protecting sensitive information against new methods of surveillance and espionage, particularly in the cyber domain.