During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the team of experts of his company has found strong similarities between part of the Flame source code and a 2009 version of Stuxnet. The news is really surprising, the analogies demonstrate that behind the development […]
The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to the communication equipments sold to the United States and Western Countries. The revelation made by the open source intelligence company Lignet reinforces a lot of concerns about the possible presence of backdoors in communications devices […]
According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks on Incheon International Airport systems spreading a virus planted in game programs. The information has been provided by the Seoul Metropolitan Police Agency referring that a 39-year-old South Korean man was arrested for involvement and […]
It’s not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare to attack its enemy in the cyber space. For years Israel conducts cyber espionage and cyber offensive operations that allow the state to operate undisturbed, away from media pressure always attentive to the controversial international policy […]
Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts sustains that the cyber war era is just begun, due this reason the Pentagon is involving the private companies, universities and even computer-game companies to develop technologies to improve its cyber warfare capabilities. Events such […]
Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. Itâs a […]
For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts have suggested the U.S. as the authors of the cyber threat, but the main U.S. authorities have […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Letâs start from the beginning, which are the available metrics to […]
In recent days the discovery of Flame malware  has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of the technological miracle, a perfect tool for cyber espionage that could suddenly mutate in an offensive cyber threat. Itâs clear that Iran share same conviction, the government of Teheran beliefs that behind the last wave of attacks there are the Western enemies and Israel, of […]
In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours  the Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]