China

Dalai Lama + Mac OS X = APT with Tibet malwareDalai Lama + Mac OS X = APT with Tibet malware

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

13 years ago
The ‘cyber war’ era began long agoThe ‘cyber war’ era began long ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

13 years ago
Cyber war, the strategic importance of the defenseCyber war, the strategic importance of the defense

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the…

13 years ago
Deep Web and censorshipDeep Web and censorship

Deep Web and censorship

  We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a…

13 years ago
US cyber warfare, budget cuts and shortage of cyber expertsUS cyber warfare, budget cuts and shortage of cyber experts

US cyber warfare, budget cuts and shortage of cyber experts

The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of…

13 years ago
U.S. communication equipments subject to China cyber espionageU.S. communication equipments subject to China cyber espionage

U.S. communication equipments subject to China cyber espionage

The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to…

13 years ago
Increasing concerns on cyber warfare capabilities of the North KoreaIncreasing concerns on cyber warfare capabilities of the North Korea

Increasing concerns on cyber warfare capabilities of the North Korea

According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks…

13 years ago
Plan X, new lymph to US cyber warfare capabilitiesPlan X, new lymph to US cyber warfare capabilities

Plan X, new lymph to US cyber warfare capabilities

Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts…

13 years ago
‘Olyimpic Games’ and boomerang effect, it isn’t sport but cyber war‘Olyimpic Games’ and boomerang effect, it isn’t sport but cyber war

‘Olyimpic Games’ and boomerang effect, it isn’t sport but cyber war

For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet,…

13 years ago
China-made US military chip, security backdoor or debugging functionality?China-made US military chip, security backdoor or debugging functionality?

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

13 years ago