Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that give an idea of the business. Since now we have analyzed the grows of […]
Once again I draw inspiration from the argument “Stuxnet” on which much is being read on the web at this time, and a lot of which will be discussed in the years to come. From all the scientists Stuxnet was defined a deadly weapon, but why if any direct damages recorded are comparable to those […]
Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not […]
In these days we have witnessed the escalation of operations conducted by the Anonymous group, the hacker group that is espressing a social dissent througth cyber attacks. The Internet world is profoundly changing, and the threat of hacktivist groups represents one of the major cyber threats. We must consider that the attacks of these groups […]
In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided by the Israeli government officials, they have declared infact that attacks like […]
Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been stolen in a successful attack to the […]
To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems. The news has been announced by the same “Japan Aerospace Exploration Agency (JAXA)” that […]
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]
Which is the critical infrastructure of a country that is most exposed to cyber threat? The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure it could be targeted in an attack also with the only destructive purpose with the intent […]
Searching in Internet the words “Cyberwar” and “cyberware” you will immediately realize how high is the interest in the matter. An ocean of information that demonstates the growing interest in the matter and that awaken in many ancestral fears. The spectrum is that of a conflict, the scenario is the cyber space. Governments around the world […]