Cyber Warfare … Not “if” but “when”

We are now truly in the Information Age.

Just this week we saw the first signs of Cyber warfare, and where the US launched a cyber attack against Iranian weapon systems. This type of warfare is obviously more silent than enabling air strikes, but can lead to the same end goal. It is said to be a response to attacks on oil tankers. To make it a “war”, all we need now is for a retaliation from Iran on…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

How i get p1 to p4 Using Google Dork Some Google Dork Which Give You All Secrets

Docker security Best Practices: What nobody told you before!

{UPDATE} World Geography Travel & Places Quiz Maestro Hack Free Resources Generator

Can I Prove To You I Have Added Data … Without Revealing Any Other Data?

Introduction to Social Engineering

Testnet upgrade announcement

Coming Soon: Nextform, an API for Collecting Official Forms

What Is VMware Changed Block Tracking and How It Works

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

From crypt To GPU Breakers … thank Morris!

Digitally Signing For Something, And Checking Without Revealing The Message … Meet AAI Encryption

How To Crack The Near Impossible When There’s a Weakness … Meet Fermat’s Attack on RSA