According an internal investigation Snowden has leaked the secret NSA’documents using a web crawler software designed to search, index and backup a website. The last assumption of the Snowden case is related to the way the whistleblower has collected the huge quantity of secret document from the National Security Agency (NSA). The leaked documents have shown […]
A report issued by The Federal Government’s Track Record provides a scaring picture on cybersecurity for US Government entities. The US Government is a privileged target for cybercriminals, state-sponsored hackers and hacktivists, for years now, officials and politicians have warned of the risks related to a cyber attack. Leon Panetta, former Director of the Central […]
Intelligence officials now view the threat from counterintelligence, foreign spying and the leaking, as the No. 2 danger facing the country. Top U.S. Intelligence officials released a new Worldwide Threat Assessment Report during a Senate hearing last week, they highlighted the top risks to national security. Let’s give a look to the list, cybersecurity is still perceived […]
Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare to the US citizens? In this post I desire to put together a series of useful information to better understand the perception of cyber threats on both US Government and population. Cyberwarfare is considerable today […]
Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape. Today I desire to propose an interview with Andrey Komarov, CEO of IntelCrawler and Dan Clements, President of IntelCrawler. IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big […]
Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the “model of conflict” and rules for the actors. Cyber war and cyber information warfare are two terms very inflated used to describe the current disputes within the cyberspace. To explain the effect of acts of […]
The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits the mobile platforms. Mobile devices are reason of great concern for governments, they have a great computational capability, huge memories to store our personal data, GPS to follow our movements and are equipped with a […]
Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in a cyber espionage operation lasting at least four years, the news has been reported by the Finnish commercial broadcaster MTV3. Finland’s foreign minister Erkki Tuomioja confirmed the shocking news, a large […]
Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. This week Google launched the Project Shield, an initiative sustained by the company to protect enterprises from DDoS attack that are becoming a serious problem for Internet infrastructures. Google is […]
Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer Tenda Technology. Just a week ago I wrote on a serious backdoor found by researcher Craig Heffner within the D-Link routers, today I’m here describing a new flaw discovered in the Wireless Routers produced by China […]