Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the “2013 Global Threat Intelligence Report” (registration is required). The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks […]
In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments all over the world, in particular of the censorship and persecutions operated by authoritarian regimes. In discussion is the technological support often provide by Western IT company in the name of business that totally ignore […]
A report titled “Resilient Military Systems and the Advanced Cyber Threat” written by Defense Science Board (DSB), a Federal Advisory Committee established to provide independent advice to the Secretary of Defense, presented alarming scenarios on US nation’s military considered unprepared for a full-scale cyber-conflict. The 138-page report alerts Pentagon on the necessity to improve cyber […]
The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a global approach, we cannot distinguish between cybercrime and cyber warfare but we must be focused on the cyber menaces, their effects and the risks connected to adoption of not appropriate security measures. The case is […]
There is no peace for enterprises, in few weaks we have discovered how much vulnerable are giants of IT, one after another, fell the most renowned names from Facebook to Twitter, companies that we considered immune from thousands of attacks they receive each day. Until now Microsoft and Apple weren’t affected … but it’s news […]
Early this month it was spread the news regarding a sophisticated cyber espionage campaign against principal media agencies in the US, included NYT and Washington Post, the hackers have tried to compromise the email account of journalists to steal sensitive information. The campaign appeared very aggressive, the hackers have tried to infiltrate the network of […]
In this days it is circulating persistently the news that The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced by House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) before the US House next week. The controversial cyber bill raised an heated debate, the act will force any company to […]
Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal information; or about cyber attacks that target critical infrastructure. The principal question raised by these fervent activities are rules of engagement and proportionality of defense – the operative limit of country that discovers an attack […]
Security Firm FireEye revealed to have discovered an APT campaign targeting companies in the defense and aerospace sector and that has been originated from China to steal intellectual property and industrial secrets from US companies. In this period many other attacks have been linked to China such as the cyber espionage campaign against NYT and […]
It seems that suddenly US have discovered to be victim of a serious of cyber espionage campaigns that are targeting every sector from media to military and every time seems that is a must to blame the nightmare China. A report published in 2012 by the U.S. China Economic and Security Review Commission revealed that “U.S. industry […]