Last October Kaspersky Labâs Global Research & Analysis Team started a new investigation after several attacks hit computer networks of various international diplomatic service agencies. The attacks appeared very suspect, a new large scale cyber-espionage operation has been discovered, the operation is dubbed «Red October», a name inspired by famous novel «The Hunt For The Red […]
The charge is heavy, according to some experts, Nokia analyzes userâs traffic officially to increase performance compressing data on some of its mobile devices. According many experts the popular company is responsible of the hijacking of userâs traffic on its servers, that is the case for the Nokia Asha models, for this reason on internet […]
Aaron Swartz has committed suicide on January 11, 2013 in New York City. I have long been fought if you write something about this extraordinary boy, but not dedicate a tribute would be a shame. Aaron Swartz has decided to leave a huge void in the IT scenario. For me, as the entire world he […]
The year is start way for Oracle Java platform, a new Java 0-day vulnerability has been discovered and worldwide security community is very concerned on the potential effect of the bug. We have discovered how much dangerous could be the exploit of a zero-day vulnerability especially against institutional targets and governments (e.g. Elderwood project), state-sponsored hackers […]
According last report published by The European Network and Information Security Agency (ENISA)  âENISA Threat Landscape â Responding to the Evolving Threat Environmentâ that summarizes principal cyber threats, critical infrastructures represent privileged targets for emerging trends. Different agents such as terrorists, state-sponsored hackers or hacktivists could be interested in attack control systems within a critical […]
Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet, intelligence agencies are making great investments in term of money and resources to define new methods and to […]
The European Network and Information Security Agency (ENISA) is the EUâs agency responsible for cyber security issues of the European Union, its last report âENISA Threat Landscape – Responding to the Evolving Threat Environmentâ, summarizing the principal threats and providing also useful indication on the emerging trends. The report proposes the list of top threats […]
In this period there is an intense debate on the wiretapping of every communication channel, governments are increasing the monitoring of internet, of social network platforms and VOIP conversations in many cases with supports of the companies that provide those services. In a recent post I discussed on the control ordered by Indian Governments that […]
The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement  of the country is developing a software for “smart control” of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering. Moghadam exposed the consideration made […]
On this day Bitcoin turns 4 years old. As any 4 year old will tell you this has been a wild ride. From a little know digital currency to todayâs acceptance into the legal banks and marketplace this little currency that could has shocked world leaders, stunned banking officials all over the world trading and […]