Critical infrastructures

How the US are preparing to cyber warfare?

Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability…

11 years ago

Russian government wants to strengthen its cyber defense,what’s new?

Russian President Vladimir Putin is considered one of the political figures most attentive to the development of a suitable cyber…

11 years ago

Panetta is critical on the security level for NATO networks

Today on Atlantic Council web site it has been published an excerpts from remarks by Secretary of Defense Leon Panetta at…

11 years ago

New attacks against SCADA, old vulnerabilities, very old issues

Stuxnet first and news of countless zero-day vulnerabilities in the wild have strengthened the idea that citizens security is constantly…

11 years ago

Perfect Citizen, US vulnerability assessment program on critical infrastructures

CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting…

11 years ago

European Commission supports research on Cyber security

Cyber security is considered a primary target for every governments, the increase of cyber criminal activities, state-sponsored operations and the…

11 years ago

Proactive defense, humans or machines … that’s the question

  Governments all around the world are committed for the definition of a proper cyber strategy that represents an optimum…

11 years ago

LTE networks vulnerable to jamming, a question of national security

Few months and also in Italy the wireless industry will live its mobile connectivity revolution with the introduction of new…

11 years ago

Secretary of Defense Panetta on U.S. cyber capabilities

Without doubts the man that has attracted the media attention in the cyber warfare scenario is Defense Secretary Leon Panetta,…

12 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

12 years ago

This website uses cookies.