"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
Despite efforts to tighten security to prevent such digital invasions, the military understands such breaches could still occur, which led Lynn to say the military must develop and train its cyber defenders to act in a degraded information environment.
"Any conflict we see going forward is going to have some element of cyber warfare and we need to make sure that we've prepared and developed our military capabilities to sustain that," says Defense Deputy Secretary William Lynn III.
Alex Cox, Research Consultant and Principal Analyst, NetWitness
Alex Cox, a research consultant and principal analyst at the IT security firm NetWitness, discovered last month the Kneber botnet, a variant of the ZueS Trojan that he says has infested 75,000 systems in 2,500 corporate and governmental organizations...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
As the federal government rolls out to its agencies the second iteration of the Einstein intrusion-detection system and readies a more advanced intrusion-prevention Einstein 2, it is partnering with Michigan in deploying the original version of Einstein. Michigan becomes the first state to employ Einstein.
The breach is the latest of many cyber assaults that have plagued the space agency, which experienced 1,200 security incidents in 2007 and 2008, resulting in the installation of malicious code and unauthorized access to sensitive information.
According to new data from Cisco, phishing, ransomware, malicious spam, information stealing malware and trojans have not abated their relentless assault against multiple industries including financial services, healthcare, manufacturing, higher education and government.