It’s happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions. The complete list has been published in a message on PasteBin: NASA – Glenn Research Center US military US AIR FORCE European Space Agency Thai Royal Navy Harvard Renault […]
Law enforcement, FBI first, are worried by the diffusion of the Bitcoin network that could be used by groups of criminals for several activities. The main problem related to the payment system is that is completely anonymous making impossible to trace the transitions and related users. Bitcoin is a decentralized electronic cash system that uses […]
In recent days I have discussed the increasing tension between China and the Philippines for a territorial dispute and related effects which have had significant repercussions in cyber space. Just the Asia-Pac region is among those area that are of main concerns in its military and cyber warfare. This time to discuss is the historical […]
The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity. The standard describes a radio technology that allows two devices to communicate at a short distance, no more than a few centimeters, allowing the exchange of […]
Article published on The Malta Indipendent Today there is a lot of interest in âCyber warfareâ and âCyber threatsâ. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from […]
Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]
The “National Preparedness Report” is the first assessment, directly commissioned by President Obama, on the US capabilities of response to a terrorist attacks and man-made and natural disasters. Really interesting is the component related to cyber security, U.S. Computer Emergency Readiness Team (US-CERT) has reported an impressive growth of the number of cyber attacks and […]
Article Published on The Hacker New Magazine â May Edition âThey are Not What You Think they Are ⊠they are hacktivists” During the last couple of years, we have witnessed the escalation of operations conducted by the Anonymous group, the collective of hackers that is expressing a social dissent through cyber attacks. In modern society, […]
The word “Anonymous ” evokes the myth of the hacker in today’s society that defends freedom of expression and agrees with sensational cyber operations in the fight against censorship and government and industrial questionable policies. If Anonymous is perceived by future generations as an attractive ideology to follow, industry and government view with concern the […]
In this period the cyber space is a place in full swing, international attention is focused on Iran and its quarrel with the West, but other silent battles are being fought. In the last month has been registered a surprising activity that opposes China and Philippines, continuous and reciprocal attacks attack to the sound of bits […]