CIA

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

Iran threat … are we close to the conflict?

These days, there are countless news regarding the Iranian government and its ability to pursue its objectives of a cyber…

14 years ago

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous…

14 years ago

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…

14 years ago

“Need an expert in customized botnet.” … new recruiting channel.

In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing…

14 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more…

14 years ago

“Cyber India” lights and shadows of the country full of contradictions

The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20…

14 years ago

Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously…

14 years ago

This website uses cookies.