Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on […]
NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches. The National Institute of Standards and Technology has released a draft of the cybersecurity framework for private companies and infrastructure networks as part of  President Obama’s executive order. The order has the primary goal to improve the […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace US military strategist John Boyd states: âWar comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.â Cyber warfare is combat in cyberspace and includes computers, the Internet and the […]
Article published on The Malta Indipendent Convergence in world leading research in Europe to tackle these problems This the first part of a two-part mini-series in which we look at the safety (and security) problems in real-time cyber-physical systems used around the world Ron Kelson, Pierluigi Paganini, David Pace, Benjamin Gittins Modern computer chips… a marvel of […]
According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks on Incheon International Airport systems spreading a virus planted in game programs. The information has been provided by the Seoul Metropolitan Police Agency referring that a 39-year-old South Korean man was arrested for involvement and […]
The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download it you just have to create a free account on www.pentestmag.com. Talking about penetration testing fundamentals and their introduction in private and military sectors. The growing request for experienced IT professionals is demonstration of the awareness […]
Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes used to control the International Space Station. The news is sensations as worrying, is it possible to store so sensible information without using any precaution like disk encryption. Are we discussing about an isolated case […]