China

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

11 years ago

Korean cyber espionage campaign against Russia

Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information…

11 years ago

Japan Aerospace Exploration Agency hit again by malware

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that…

11 years ago

UK recruits “Xbox generation” youngsters for cyber war games

The future is now, I've often spoken about the enormous potentiality of gaming platforms and of the capabilities of young…

12 years ago

Secretary of Defense Panetta on U.S. cyber capabilities

Without doubts the man that has attracted the media attention in the cyber warfare scenario is Defense Secretary Leon Panetta,…

12 years ago

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

12 years ago

Chinese cyber attack against White House Office

The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign…

12 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

12 years ago

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and…

12 years ago

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

12 years ago

This website uses cookies.