China

Secretary of Defense Panetta on U.S. cyber capabilitiesSecretary of Defense Panetta on U.S. cyber capabilities

Secretary of Defense Panetta on U.S. cyber capabilities

Without doubts the man that has attracted the media attention in the cyber warfare scenario is Defense Secretary Leon Panetta,…

13 years ago
Why do we need hackers today?Why do we need hackers today?

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

13 years ago
Chinese cyber attack against White House OfficeChinese cyber attack against White House Office

Chinese cyber attack against White House Office

The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign…

13 years ago
Microsoft distrupts Nitol botnet, malware hidden in supply chainMicrosoft distrupts Nitol botnet, malware hidden in supply chain

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago
Elderwood project, who is behind Op. Aurora and ongoing attacks?Elderwood project, who is behind Op. Aurora and ongoing attacks?

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and…

13 years ago
Malware & cyber espionage, ongoing attacks on sensitive informationMalware & cyber espionage, ongoing attacks on sensitive information

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

13 years ago
South Korea, another data breach. How is changing the hacking world?South Korea, another data breach. How is changing the hacking world?

South Korea, another data breach. How is changing the hacking world?

Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect…

13 years ago
Government cyber strategies to mitigate growing cyber threatsGovernment cyber strategies to mitigate growing cyber threats

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

13 years ago
Who really takes advantage of the operations of Anonymous?Who really takes advantage of the operations of Anonymous?

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

13 years ago
Drones vulnerable to hijacking, concerns on security and privacyDrones vulnerable to hijacking, concerns on security and privacy

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial…

13 years ago