Malware once were used primarily to destroy the victim’s PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop agents that serve primarily to the function of spying. Cybercrime, governments, and groups […]
Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect their facilities exposing the information of their customers and employees. Yesterday Anonymous group has released more than 400K record of the Australian AAPT company stolen during a recent attack, meanwhile this morning I read about […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
I desire to tribute another article to the group that catch the worldwide attention of security community, Anonymous. Few years to consolidate its image become one of the most debated phenomenon on internet, many consider the collective a threat, many other the expression of a dissent to listen. Both interpretations are correct, but let’s think […]
Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial vehicle (UAV), parked at Lockheed Martin’s Skunk Works facility in Palmdale, California. “Skunk Works” LM’s Advanced Development Program Facility is where some of the most futuristic and secret projects are developed. The image was dated […]
Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware detected infects OS X machines and is spread following a consolidated schema for politically motivated […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace US military strategist John Boyd states: “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.” Cyber warfare is combat in cyberspace and includes computers, the Internet and the […]
I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the first nuclear bomb detonated at a site nicknamed Trinity in the barren Jornada del Muerto desert of New Mexico on July 16, 1945. Although the comparison must be done with the proper proportions, it summarizes […]
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]
The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of the strong commitment of Indian and German government, praising the US capabilities for the involvement in operations such as the “Olympic Games” project. But what are the real cyber capabilities of the United States? No […]