• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • New Bad Magic APT used CommonMagic framework in the area of Russo-Ukrainian conflict
  • New ShellBot bot targets poorly managed Linux SSH Servers
  • 2022 Zero-Day exploitation continues at a worrisome pace
  • Ferrari confirms data breach after receiving a ransom demand from an unnamed extortion group
  • Crooks stole more than $1.5M worth of Bitcoin from General Bytes ATMs
  • Acropalypse flaw in Google Pixel's Markup tool allowed the recovery of edited images
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 122)

Cyber warfare

Syria drama and impact on cyberspace

The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict that many have tended to avoid. The world, today unarmed, is witnessing a fierce crackdown led by President Bashar al-Assad, a massacre...

February 7, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence 

Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital role in the management and transmission of information of all kinds, satellites infact do the work in silent thet we enjoy...

February 6, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic...

February 4, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Social Networks 

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive...

February 2, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Security 

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this time, and a lot of which will be discussed in the years to come. From all the scientists Stuxnet was defined a deadly weapon, but why  if any direct...

January 31, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in cyber intelligence operations against western companies with the intent to steal critical information. Symantec Researchers have proved...

January 29, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries...

January 27, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence 

Iran – China Axis and the dangerous alliances

If you were to ask me what is the most frightened nation in terms of cyber offense without a doubt I say it is China. The Beijing government has distinguished itself in recent years in the field of warfare demonstrating extraordinary abilities. It is among...

January 23, 2012  By Pierluigi Paganini   Posted In  Cyber warfare 

Japan under cyber attack. The cyber threat China

The events of recent days from the closure of the Megaupload web site to the heavy offensive of the Anonymous group have distracted media attention from important cyber operations, in my opinion of military matrix, against Japan. Last week several...

January 22, 2012  By Pierluigi Paganini   Posted In  Cyber warfare 

Israel under a cyber warfare escalation

This week has began under worse auspices worse for Israel, which, despite its attention to the cyber threats posed by cyber-space, has been victim of a series of attacks that have checkmated the government of Jerusalem. Israel is facing with a true...

January 17, 2012  By Pierluigi Paganini   Posted In  Cyber warfare 


« First‹ Previous118119120121122
Page 122 of 122



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version