Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]
In recent days the discovery of Flame malware has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of the technological miracle, a perfect tool for cyber espionage that could suddenly mutate in an offensive cyber threat. It’s clear that Iran share same conviction, the government of Teheran beliefs that behind the last wave of attacks there are the Western enemies and Israel, of […]
In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours the Iranian Computer Emergency Response Team Coordination CenterLab, CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]
We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]
Many experts are convinced that the death of Bin Laden marked the end of an ideological group that has been beheaded of its leaders and that began to slowly fall apart. The same experts are convinced that from the rubble of the group might begin small groups, definitely dangerous, but without a central coordination that […]
A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reports that a vulnerability in LinkedIn allows obtaining user’s password. For the authentication process LinkedIn adopts a token in login phase that can […]
The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international community that fears the rise of China‘s technological colossus. In recent days a summit had placed in front of U.S. and China with the aim of promoting mutual cooperation to restore equilibrium in cyberspace. Many […]
We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states. Of course the countries that have valuable technology skills are most exposed to targeted attacks that daily try to steal information regarding hi tech projects. Japan, US and European Countries are preferred target of many […]
The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the country several clashes are undermining a virtual ceasefire. Deputy Rep to Syria, Nasser Al-Qudwa, declared : “There is, at least, a theoretical commitment on the part of the Syrian government, and also on the part […]
In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular struck us deeply, that relating to the vulnerability of U.S. Government networks for admission […]