With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country full of contradictions I presented a picture of the nation in terms of cyberwarfare, […]
Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked? Have you ever dreamt, reading sad and bad news pages on the censure of many governments, a world where the concept of freedom of thought has been materialized? In recent decades we have witnessed radical […]
The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20 major economies, Goldman Sachs predicts that “from 2007 to 2020, India’s GDP per capita in US$ terms will quadruple”, and that the Indian economy will surpass the United States (in US$) by 2043, this are […]
Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously suspected, he says that they are active in different variant since 2006. Precisely he claims that the Stuxnet computer virus is linked to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions […]
Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. “Be Social” is the imperative of the last years. We live alternative lives, we have dense networks of relationships, we feel the irrepressible urge to be part of a group, to fill the void that we carry within. But this human propensity to aggregation is now the foundation of the […]
If we talk about security which could be our worst nightmare? My answer is “to be vulnerable in every moment of our day, whatever we are doing and wherever we are” How could this happen? Imagine that someone has installed an app on our phones, and he is able to stalk us, to know our […]
The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA. The crucial point is the legality of these actions conducted by Intelligence Agencies in the name of Nations Security abusing the rights of citizens. To this we must consider another significant issue , the corruption. Corruption has no Country and is a cross problem […]
In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated software. How to identify these sites? How to find and block communications to the final users. The role of the ISPs is fundamental because it was asked them to monitor the traffic of their customers […]
In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web I came across more than one occasion in satellite photos reporting strange structures that we asked the real intended use. The successful attacks occurred in 2007 and 2008. The more serious of the two happened […]