Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that is facing with rising political tension such as Iran. I refuse to call cyber criminals, a group of expert hackers who made himself the protagonist of a complex story from different points of view. The […]
There is no doubt that through the analysis of the operations of a State in cyber space it is possible to create a political profile of the country itself, discover the level of technology available and design covenants and relations with other countries. Not a day passes without discussion on the hostile Iran, which would seem […]
No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile systems. I speak of mobile systems and I avoid simply to define them “devices” because of their processing capacity equal to a common desktop. Unfortunately the development of the sector is not paid to the […]
In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by groups of hacktivist, first Anonymous, that have hit main institutions and agencies all over the world. The modus operandi of the group is now well known, attacks that have crippled many victims were mainly of DDoS type, in this way […]
Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In internet it is possible to find many news regarding the topic that declare both Iran and nations opposing them seem intentioned to attack. In this stage, the contenders are engaged in a mutual and intense […]
Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes used to control the International Space Station. The news is sensations as worrying, is it possible to store so sensible information without using any precaution like disk encryption. Are we discussing about an isolated case […]
Published on The Hacker News Magazine – March 2012 During the last years we have seen the tendency to use social media as a major vector for the exchange of information. The communication concept has been totally revolutionized as billions of people could be in contact with a few clicks thanks to the social network platforms. Imperative is to be social, no matter if […]
We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts of information, at this time the new power is the detention of the most data on whatever is around us. The technological processes of the last decade have influenced, as never before, the experience of […]
The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8. The Redmond has announced in its systems the presence of a “kill switch” feature, a system that allows the company to remotely access the terminal to proceed with the killing of processes that could cause […]
We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do not observe a striking hack, yet another multinational ridiculed and made bare and vulnerable to human eyes. It’s happened with Sony, with RSA with Stratfor, clay giants collapsed at the hands of groups of hactivists, a […]