When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In particular, the Beijing government has distinguished itself in recent years for two key aspects: the aggressive strategy cyber conduct towards foreign countries the country’s willingness to become independent from the technological The second aspect is […]
It is clear that there is an unrelenting increase in cyber attacks.  Indeed, the media at large is now bombarding the community with a stream of isolated security incidents, one after the other, leaving most of us on âmain streetâ feeling paralyzed and wondering:  Is this just sensationalism?  How bad is the situation really?  Those of us who […]
As announced during last days Anonymous has launched a Distributed Denial of Service (DDoS) against several UK government websites. A massive recruiting campaign is started on social media, a call to arm to protest the extradition of U.K. citizens to the United States. The Operation named âOperation Trial At Home,â fight the European Arrest Warrant (EAW) that could […]
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]
Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]
Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include a new exploit for the Java CVE-2012-0507 vulnerability. Â The exploit was discovered for the first time on 7.03.2012 and it first detections were dated on March 12, 2012 and today a public module for Metasploit […]
Article Published on The Hacker New Magazine – April Edition “Cyber_Warfare” First let’s try to provide a definition of cyber-weapon, to do this I get inspiration from an article written by experts Thomas Rid and Peter McBurney. Correctly define cyber weapon has significant legal and political consequences as well as the security itself. The line […]
The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently announced a breach that exposed fewer than 1.5 million card accounts, held a conference call to discuss about the breach and its impacts. Again Krebson Security Blog is the more accredited source in my opinion, they […]
Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]
The Krebs on Security blog reported that there has been a security breach at Global Payments that âmay involve more than 10 million compromised card numbers.â Â We are facing with a massive breach that could impact more over 10 million compromised card numbers, for this reason VISA and MasterCard are alerting banks across US about […]