Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been stolen in a successful attack to the […]
To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems. The news has been announced by the same “Japan Aerospace Exploration Agency (JAXA)” that […]
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]
Which is the critical infrastructure of a country that is most exposed to cyber threat? The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure it could be targeted in an attack also with the only destructive purpose with the intent […]
Searching in Internet the words “Cyberwar” and “cyberware” you will immediately realize how high is the interest in the matter. An ocean of information that demonstates the growing interest in the matter and that awaken in many ancestral fears. The spectrum is that of a conflict, the scenario is the cyber space. Governments around the world […]
Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or China represents a real threat? When we think of China in relation to cyber warfare, we imagine an army of hackers hired by the government in a computer room ready to successfully attack any potential target. China […]
Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a backdoor in the devices of Huawei company. The news in itself is terrifying, even if it is discussed for years. The presence of a backdoor once again raises the issue of qualification of the hardware, […]
Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]
The news that I desire to discuss with you is the will to put into orbit a satellite system to combat new forms of censorship. The project is certainly ambitious and effective, an hacker group has decided to launch a series of satellites for the composition of an alternative communication platform that would be used […]
We live in the era of free technology market , devices and appliances of all kinds can be found on a global market without particular problems. But when you make a purchase of hardware which is the main attribute that influences the final choice? Obviously price is an essential component that is very heavy on […]