Article published on The Malta Indipendent Today there is a lot of interest in “Cyber warfare” and “Cyber threats”. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from […]
Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]
The “National Preparedness Report” is the first assessment, directly commissioned by President Obama, on the US capabilities of response to a terrorist attacks and man-made and natural disasters. Really interesting is the component related to cyber security, U.S. Computer Emergency Readiness Team (US-CERT) has reported an impressive growth of the number of cyber attacks and […]
Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are hacktivists” During the last couple of years, we have witnessed the escalation of operations conducted by the Anonymous group, the collective of hackers that is expressing a social dissent through cyber attacks. In modern society, […]
The word “Anonymous ” evokes the myth of the hacker in today’s society that defends freedom of expression and agrees with sensational cyber operations in the fight against censorship and government and industrial questionable policies. If Anonymous is perceived by future generations as an attractive ideology to follow, industry and government view with concern the […]
In this period the cyber space is a place in full swing, international attention is focused on Iran and its quarrel with the West, but other silent battles are being fought. In the last month has been registered a surprising activity that opposes China and Philippines, continuous and reciprocal attacks attack to the sound of bits […]
It’s a pleasure for me to propose to my readers an article of my colleagues of TheBestDegrees Group on social networking and related crimes. Several times I highlighted the importance of social networking and of all related form of communication. Of course with the rapid diffusion of technology the number of crimes is increased dramatically. […]
Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus infect a MAC pc? Is it possible to monetize a malware development? How is it possible? Obvious my answers, we cannot think of a software system free of bugs and vulnerabilities. To those who I have […]
Every day we exchange personal information with colleagues, friends and unknown people with no idea how they are treated and for what use they will be managed. Telephone number, email address or driver’s license number are example of the data we provide ordinary using new media channels like internet and the social networks. The use […]
Last week I reported the virus attack to the Iranian oil industry, a cyber attack that seems has caused few damages but that raised again the theme of cyber warfare. Oil industry is the primary economic business of Iranian Government and an attack to the sector appears to the experts as a cyber war acts. […]