Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. It’s a […]
For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts have suggested the U.S. as the authors of the cyber threat, but the main U.S. authorities have […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]
In recent days the discovery of Flame malware has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of the technological miracle, a perfect tool for cyber espionage that could suddenly mutate in an offensive cyber threat. It’s clear that Iran share same conviction, the government of Teheran beliefs that behind the last wave of attacks there are the Western enemies and Israel, of […]
In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours the Iranian Computer Emergency Response Team Coordination CenterLab, CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]
We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]
Many experts are convinced that the death of Bin Laden marked the end of an ideological group that has been beheaded of its leaders and that began to slowly fall apart. The same experts are convinced that from the rubble of the group might begin small groups, definitely dangerous, but without a central coordination that […]
A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reports that a vulnerability in LinkedIn allows obtaining user’s password. For the authentication process LinkedIn adopts a token in login phase that can […]
The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international community that fears the rise of China‘s technological colossus. In recent days a summit had placed in front of U.S. and China with the aim of promoting mutual cooperation to restore equilibrium in cyberspace. Many […]
We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states. Of course the countries that have valuable technology skills are most exposed to targeted attacks that daily try to steal information regarding hi tech projects. Japan, US and European Countries are preferred target of many […]