China

Chinese cyber attack against White House Office

The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign…

13 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today, I would like to discuss the real effects of a cyber attack. We have recently introduced the direct and…

13 years ago

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

13 years ago

South Korea, another data breach. How is changing the hacking world?

Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect…

13 years ago

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

13 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

13 years ago

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial…

13 years ago

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

13 years ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

13 years ago

This website uses cookies.