The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the country several clashes are undermining a virtual ceasefire. Deputy Rep to Syria, Nasser Al-Qudwa, declared : “There is, at least, a theoretical commitment on the part of the Syrian government, and also on the part […]
The experts of Trusteer firm have discovered a new variant Zeus malware responsible of a series of attacks against principal internet service providers. The variant carried out attacks using the P2P network architecture targeting users of Facebook, Hotmail and Yahoo and Google Mail. What is Zeus? The Zeus Trojan is one of most notourios malware […]
In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular struck us deeply, that relating to the vulnerability of U.S. Government networks for admission […]
In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide evidence of the Internet Crime Complaint Center (IC3) against cybercrime in US and of the obtained results. On May 8, 2000 from a partnership between NW3C, BJA and the FBI was born The Internet Fraud Complaint […]
The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have western countries disturbed by an aggressive policy of the government in Tehran, defiant as ever, that risks trigger a dangerous situation in the Middle East undermining the unstable equilibrium of the whole area. Many time […]
Private companies and governments agencies all around the word make huge investments for the automation of their processes and in the management of the electronic documentation. The main requirement in the management of digital documentation is its equivalence, from a legal perspective, to paperwork, affixing a signature on a digital document is the fundamental principle […]
It’s happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions. The complete list has been published in a message on PasteBin: NASA – Glenn Research Center US military US AIR FORCE European Space Agency Thai Royal Navy Harvard Renault […]
Law enforcement, FBI first, are worried by the diffusion of the Bitcoin network that could be used by groups of criminals for several activities. The main problem related to the payment system is that is completely anonymous making impossible to trace the transitions and related users. Bitcoin is a decentralized electronic cash system that uses […]
In recent days I have discussed the increasing tension between China and the Philippines for a territorial dispute and related effects which have had significant repercussions in cyber space. Just the Asia-Pac region is among those area that are of main concerns in its military and cyber warfare. This time to discuss is the historical […]
The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity. The standard describes a radio technology that allows two devices to communicate at a short distance, no more than a few centimeters, allowing the exchange of […]