We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]
The UKâs companies 123-reg, the biggest domain provider, was hit this week by a âmassiveâ DDoS attack that caused interruption of the services provided. The company hosts three million domain names and more than 1.4 million sites. According a press published on the company web site, later removed, the attack came from a Chinese source […]
Many experts are convinced that the death of Bin Laden marked the end of an ideological group that has been beheaded of its leaders and that began to slowly fall apart. The same experts are convinced that from the rubble of the group might begin small groups, definitely dangerous, but without a central coordination that […]
I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This time I desire to share the data proposed in the by McAfee Labs in its McAfee Threats Report – First Quarter 2012. Let’s start observing that this first part of year have registered an impressive […]
The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users. What do you […]
Exactly on week ago a group of Iranian hackers named Cyber Warriors Team claimed to have compromised an SSL certificate issued to the Research and Education Support Services of NASA. Â The press released by the Cyber Warriors Team said that hackers have written an HTTPS protocol scanner to find weaknesses in the NASA website. Â A […]
A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reports that a vulnerability in LinkedIn allows obtaining user’s password. For the authentication process LinkedIn adopts a token in login phase that can […]
Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of DDoS attacks during last weeks. An alleged hacker with the Twitter account @AnonNyre has taken credit for the attacks claiming to be member of Anonymous.The hacker also said that he is no more part of […]
The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international community that fears the rise of China‘s technological colossus. In recent days a summit had placed in front of U.S. and China with the aim of promoting mutual cooperation to restore equilibrium in cyberspace. Many […]
Article published on The Malta Indipendent Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do […]