China

Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously…

14 years ago

Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related…

14 years ago

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment…

14 years ago

E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…

14 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…

14 years ago

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…

14 years ago

Hacking satellites

In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web…

14 years ago

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the…

14 years ago

This website uses cookies.