North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value. Over 3,000 cyber experts have been recruited by North Korea, in the country’s attempt to harm the […]
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks “APT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]
Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working to secure the networks. In November 2014 the State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. ‘Activity of concern’ was detected in the […]
A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]
Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
The British Government has announced the creation of the 77th battalion, a cyber unit composed of soldiers familiar with social media. The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance in cyberspace. The cyberspace is a strategic domain for modern warfare, for this reason, the […]
Cyber warfare is becoming the most progressive warfare domain after the Second World War. Which global actors benefit the most from this capability. Cyber warfare is becoming the most progressive warfare domain after the Second World War. The progression of this concept brings us to the next milestone, to define which global actors benefit the […]
A report issued by FireEye revealed that hackers have stolen GigaBytes of data from Syrian opposition’s computers, including battlefield plans. A recent report issued by FireEye revealed that hackers tapped into Syrian opposition’s computers and have stolen gigabytes of secret communications and battlefield plans. In mid-2013, ten armed units belonging to the opposition to the Syrian Government were […]
The Malaysia Airlines website was hacked by hackers that claimed to be from the Lizard Squad, but who referenced the IS and the cyber Cyber Caliphate. The Malaysia Airlines website was hacked by alleged members of the popular collective “Lizard Squad”, the curious thing is that hackers also referenced Islamic State jihadists. Malaysia Airlines released […]
Davos World Economic Forum Annual Meeting 2015 – The elite of experts confirms the rising technological risks, notably cyber attacks. The World Economic Forum in Davos brings together some 2,500 of the top players in the sphere of politics, finance and business. The elite of experts meeting in Davos for the World Economic Forum Annual […]