Intelligence

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

14 years ago

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

14 years ago

Concerns for Chinese firms and the cyberespionage

We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states.…

14 years ago

Syria,uncomfortable assumptions on the control of dissidents

The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the…

14 years ago

Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described…

14 years ago

A picture of the Iran threat

The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have…

14 years ago

US and China are working for stability in Asia-Pac

In recent days I have discussed the increasing tension between China and the Philippines for a territorial dispute and related…

14 years ago

FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks…

14 years ago

US Cybersecurity capability. National Preparedness Report

The "National Preparedness Report" is the first assessment, directly commissioned by President Obama, on the US capabilities of response to…

14 years ago

China vs Philippines, cyber war or hacktivism?

In this period the cyber space is a place in full swing, international attention is focused on Iran and its…

14 years ago

This website uses cookies.