It is clear that there is an unrelenting increase in cyber attacks. Indeed, the media at large is now bombarding the community with a stream of isolated security incidents, one after the other, leaving most of us on “main street” feeling paralyzed and wondering: Is this just sensationalism? How bad is the situation really? Those of us who […]
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]
Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include a new exploit for the Java CVE-2012-0507 vulnerability. The exploit was discovered for the first time on 7.03.2012 and it first detections were dated on March 12, 2012 and today a public module for Metasploit […]
Article Published on The Hacker New Magazine – April Edition “Cyber_Warfare” First let’s try to provide a definition of cyber-weapon, to do this I get inspiration from an article written by experts Thomas Rid and Peter McBurney. Correctly define cyber weapon has significant legal and political consequences as well as the security itself. The line […]
Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]
According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much concern in political and military. The dialogue between Western governments, and particularly the U.S, with the government in Pyongyang continues to be difficult, complicating the situation is the defiant attitude adopted by the North Korean government […]
We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined to thwart the development of Iran’s nuclear program. A predictable decision that haven’t created any problem the state that seems has developed a new antivirus program to immunize the systems from the notorious Stuxnet virus. […]
Huawei – Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant It’s official, the joint venture between Symantec and Huawei Technologies is ended because the American IT security firms feared that the collaboration with the Chinese telecommunications producer could have a sensible impact on its business. […]
The news that I wish discuss was published on the website of Forbes magazine, titled “Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits“, that focuses on the commercial value of the vulnerability of popular applications. Time ago the figure of the hacker was recognized mainly as a researcher interested to measures its skills […]
For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical infrastructures to defend them from cyber threats of any kind and in our imagination we have always considered the US as a country at the forefront. While the cyber security experts analyze the progress made […]