Intelligence

E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…

14 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…

14 years ago

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…

14 years ago

Cyber Threats, high social impact but … which is the level of awareness?

Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the…

14 years ago

Hacking satellites

In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web…

14 years ago

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the…

14 years ago

Social Network “in-security”

In recent years social networks have succeeded  in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses…

14 years ago

Trojan & Co, the new frontiers of espionage

Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about…

14 years ago

Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor…

14 years ago

CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an…

14 years ago

This website uses cookies.