Intelligence

Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of…

14 years ago

Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the…

14 years ago

Syria drama and impact on cyberspace

The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict…

14 years ago

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on…

14 years ago

MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

North Korea, why too many see it as a cyber threat?

In the recent years we have seen increasing attention from governments in the presidium of the cyber space. The concept…

14 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

14 years ago

This website uses cookies.