1198 results
Today I have read several articles where is hypothesized an imminent cyber attacks of Iran cyber army against US infrastructures, this news seems alarming the international community. Are we close to a military attack of Iran? Why this news is circulating so closely? Sources of intelligence report to Congress on Thursday that Iran is recruiting […]
The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012. Several reports published in the last months demonstrate that Cybercrime has double digit growth, being today among the four biggest crime threat all over the world, within asset theft crimes, frauds and corruption. The trend is the same all over the word, […]
Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group of hacktivists such as Anonymous. During a DDoS attacks multitude of compromised systems attack a single target causing denial of service for users of the targeted system. I desire to analyze with you the interesting results […]
The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do we place on human life? Are we really willing to sacrifice the life of a child for money? International opinion has been found before the massacres of innocent civilians by the Assad regime, but little […]
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]
The news that I wish discuss was published on the website of Forbes magazine, titled “Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits“, that focuses on the commercial value of the vulnerability of popular applications. Time ago the figure of the hacker was recognized mainly as a researcher interested to measures its skills […]
Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes used to control the International Space Station. The news is sensations as worrying, is it possible to store so sensible information without using any precaution like disk encryption. Are we discussing about an isolated case […]
We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts of information, at this time the new power is the detention of the most data on whatever is around us. The technological processes of the last decade have influenced, as never before, the experience of […]
We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do not observe a striking hack, yet another multinational ridiculed and made bare and vulnerable to human eyes. It’s happened with Sony, with RSA with Stratfor, clay giants collapsed at the hands of groups of hactivists, a […]
In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term “malware” in several respects as: functional characteristics developing process distribution channels field of use In the past we used to differenciate the malware in groups whose members were deeply identified by distinct behaviors, hence the origin of […]