'He will consolidate the Russian hold over the Eastern Russian majority provinces in Ukraine and quickly withdraw from the rest of Ukraine.' 'At all costs, the Russians should avoid attacking and capturing urban areas, else they risk getting into a quagmire,' cautions Colonel Anil A Athale (retd).
Tom Bossert's resignation came a day after John Bolton took over the role of National Security Adviser.
Zubair refuted the allegation as 'an absolutely frivolous complaint', and AltNews backed him, saying his work 'hurts those who have weaponised misinformation to subvert the Indian democracy'.
A 23-year-old man who allegedly sent threat messages to Bollywood actress Madhuri Dixit on her mobile phone in a bid to extort money has landed in the police net.
Internet users now will have to be more watchful while carrying out their online financial transactions as Pharming -- a new security threat used by hackers for making financial gains, has started surfacing in the country with the proliferation of Internet subscribers. Pharming attack is a new security threat for the Internet users, which is developing in the country and it is primarily launched by the hackers on the websites for getting financial gains.
Twenty-six per cent of members who responded to an annual survey said their proprietary data or trade secrets had been compromised or stolen from their China operations, the American Chamber of Commerce in China report said.
The first joint theatre command would be responsible for the border against Pakistan in what the military refers to as the "western theatre"; while a second command -- the northern theatre command -- would be responsible for the border with China. A third, navy-heavy theatre, called the "maritime command" will be responsible for the security of the Indian Ocean Region (IOR); and an island command, already functional and called the Andaman & Nicobar Command (ANC), would project power into the eastern Indian Ocean.
Cybersecurity blog KrebsOnSecurity had said Wipro's systems had been breached and were being used to launch attacks against some of its clients.
Computer networks of the Eastern Naval Command were "probably compromised" after hacking attempts in 2011 and appropriate steps have been taken since then to strengthen it, Defence Minister A K Antony said on Wednesday.
The Delhi Police on Thursday filed a first information report against the 'pro-Khalistan' creators of a 'toolkit', which was shared by teen climate activist Greta Thunberg and others on Twitter in connection with the farmers' protest, alleging it aimed to wage a 'social, cultural and economic war against the Government of India'.
The Mutual Logistics Support Agreement will allow militaries of the two countries to use each other's bases for repair and replenishment of supplies besides facilitating scaling up of overall defence cooperation.
The agreement would divert China's attention and keep them busy in the Pacific theatre, probably resulting in a reduction in threat perception in our area of interest in the Indian Ocean, notes Commodore Venugopal Menon (retd).
Identifying cyber world and space as the sources of new threats, Prime Minister Manmohan Singh on Friday said these could be met by reorienting "mindsets" as he warned the armed forces that segmented approaches would delay or dilute the responses.
The 'One-China' policy states that Taiwan and Tibet are part of China's mainland.
Norton report says Indians putting themselves at risk over Wi-Fi usage
New Delhi has turned into a virtual fortress ahead of the Independence Day celebrations as thousands of armed security personnel kept a hawk-eyed vigil to pre-empt any possible terror strike in the city.
Recent incidents suggest these safeguards perform well in simulated conditions and mock drills, but often fall short when actual threats emerge.
The strategic and security implications from Af-Pak region, China's strategic rivalry and domestic and trans-national terrorism were the challenges outlined by Defence Minister A K Antony on Tuesday who said these cannot be felt in the same measure by other countries.
From Covid to climate change, Shankar Acharya's look at some of the trends and events that might shape 2022.
'Section 153A is not meant to protect fragile sentiments of the majority Hindu community who choose to get offended by slogans celebrating the success of the Pakistani cricket team.'
Are hacker collectives like Anonymous and Legion black hats or white hats, or do they lurk in the space between the two? Dhruv Munjal reports.
In April, RBI had to issue a warning about a mobile application.
There is a perception getting built inside the government that big technology companies -- a common term used for firms like Facebook, Google, Twitter, Amazon and the like - are becoming very powerful and present multiple threats to entire nations and their citizens today. The digital ecosystem is replete with CSAM (child sexual abuse material), fake news, drug trade, radicalisation, trolling among other social vices. Given the network effect that these platforms have, it is important to ensure that these platforms are not misused.
India's national security strategy needs to be revised periodically since the global and regional geopolitical situation is dynamic, points out Commodore Venugopal Menon (retd).
Warning of the possibility of a limited war under a nuclear backdrop in the future, India on Thursday sought a new 'open, balanced and inclusive' global security architecture that corresponds to modern threats such as hi-tech terrorism and cyber conflicts.
Digital extortion, in which hackers lock out all your data and seek ransom, is a real threat today, says Veenu Sandhu.
Danti is highly focused on diplomatic entities. It may already have full access to internal networks in Indian government organisations.
The entire gamut of China's activities is aimed at keeping India on tenterhooks, cause fatigue to its troops and keeping its security system unstable, so that it cannot play a meaningful role in international geopolitics as an effective partner of the US and Japan, observes Lieutenant General Syed Ata Hasnain (retd).
Modi is the first Indian Prime Minister to attend Davos meeting in about 20 years since H D Deve Gowda in 1997.
The RBI plans to increase e-smart facility.
Israel is determined to take the bilateral engagement to a different level that goes beyond defence hardware and intelligence software. Kanchan Gupta reports exclusively from Tel Aviv for Rediff.com
Hackers have begun to emerge from the shadows of suspicion.
About 3,000 internet connections, including those of the Ministry of Defence, security agencies, the Central Bureau of Intelligence and banks in Delhi, have been found to be compromised, probably for snooping from foreign locations, according to a report submitted by cyber security experts to government.
United States President Barack Obama and British Prime Minister David Cameron had a working dinner on Thursday night at the White House as Cameron began a two-day visit.
Expressing concern over revelations by whistleblower Edward Snowden alleging that the NSA spied on Chinese leaders and businesses, China on Monday demanded that the US explain the facts and stop surveillance activities.
'What this incident must do is provide a renewed impetus to urgently bring in police reforms; changes that will ensure that political patronage and extraneous pressure are reduced to a minimum and allow the police to function independently and honestly,' argues Vivek Gumaste.
Modi said during their talks he and Netanyahu agreed to to do much more together to combat terrorism to protect their strategic interests.
'India finds itself in an unenviable situation today with its prospects diminished by acutely polarised domestic politics and the setbacks suffered during the pandemic,' notes Ambassador Shyam Saran, the former foreign secretary.
According to statistics of the Computer Emergency Response Team (Cert-In), which handles computer securities incidents in the country, 612 websites were defaced in March compared to 214 websites in February. Website defacement is a form of malicious hacking. It is usually the substitution of the original home page by a system cracker that breaks into a web server and alters the hosted website creating one of his own.