By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of the implemented security policies . The Wall Street Journal has reported the news that the telecoms company Nortel Networks has been repeatedly exploited by Chinese hackers for a long time, almost a decade. The former Nortel […]
At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]
The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict that many have tended to avoid. The world, today unarmed, is witnessing a fierce crackdown led by President Bashar al-Assad, a massacre against an opposition that wants the removal of what is considered a dictator […]
We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency […]
Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and social media, at the center of heated debates. Always consider myself an avid supporter of freedom of expression and free access to the network, but what I want to do in this post is to […]
So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries and after this offensive is lawful expect a reply first under warfare matter and of […]
Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]
In the recent years we have seen increasing attention from governments in the presidium of the cyber space. The concept of cyber warfare has become reality with the materialization of new threats that can strike unpredictably with a real destructive power like conventional weapons. In a period of radical changes are narrow new alliances and […]
What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]