China

South Korea, another data breach. How is changing the hacking world?

Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect…

12 years ago

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

12 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

12 years ago

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial…

12 years ago

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

12 years ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

12 years ago

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the…

12 years ago

Deep Web and censorship

  We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a…

12 years ago

US cyber warfare, budget cuts and shortage of cyber experts

The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of…

12 years ago

U.S. communication equipments subject to China cyber espionage

The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to…

12 years ago

This website uses cookies.