Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts sustains that the cyber war era is just begun, due this reason the Pentagon is involving the private companies, universities and even computer-game companies to develop technologies to improve its cyber warfare capabilities. Events such […]
Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. It’s a […]
For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts have suggested the U.S. as the authors of the cyber threat, but the main U.S. authorities have […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]
What is happening to Anonymous? His media energy seems to be at risk addiction just when major security firm are beginning to consider it as one of the most dangerous cyber threat. The feeling that comes from outside is that the group of hacktivist is slowly falling apart, the feeling is that within the group are mixed stirring souls. Some groups are more aware on […]
In recent days the discovery of Flame malware has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of the technological miracle, a perfect tool for cyber espionage that could suddenly mutate in an offensive cyber threat. It’s clear that Iran share same conviction, the government of Teheran beliefs that behind the last wave of attacks there are the Western enemies and Israel, of […]
In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours the Iranian Computer Emergency Response Team Coordination CenterLab, CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]
During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in China contains a secret “backdoor” that make possible a remote control of the devices. The disclosure is attributed to Cambridge University’s Computing Laboratory, it’s clear the media impact of similar news in security environments, an […]
We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]
The UK’s companies 123-reg, the biggest domain provider, was hit this week by a “massive” DDoS attack that caused interruption of the services provided. The company hosts three million domain names and more than 1.4 million sites. According a press published on the company web site, later removed, the attack came from a Chinese source […]