Cyber Crime

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will…

14 years ago

Zeus,software as a service – Implications for civil and military

As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis.…

14 years ago

Koobface, an excuse to talk about botnets and cyber crime

Koobface virus is undoubtedly considered as the malware of social network because it uses them as spread channel. We have…

14 years ago

Symantec, the inconvenient truth on the data breach

Do you remember the case of Symantec and the theft of the source code of some of its products by…

14 years ago

Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or…

14 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

14 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

14 years ago

WiFi Protected Setup vulnerable to Reaver tool attack

Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard used to allow easy establishment of a secure…

14 years ago

This website uses cookies.