China

Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and…

12 years ago

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

12 years ago

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

12 years ago

Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei - Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant…

12 years ago

US Experts say: Government Networks constantly hacked

For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical…

12 years ago

China again victim of cyber attacks

We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions.…

12 years ago

Anonymous vs Vatican, thirst for justice or criminal act?

Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear…

12 years ago

Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…

12 years ago

Why consider an enemy Iran and not Russia?

There is no doubt that through the analysis of the operations of a State in cyber space it is possible…

12 years ago

Spying on Facebook and not only, it’s emergency

A few days ago I wrote an article on cyber espionage and its higher incidence in the computer crimes. What…

12 years ago

This website uses cookies.