The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to reinforce their presence in the cyber space. The fear of cyber attacks against critical infrastructures is high, it is a common strategy […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues related to the use of SCADA systems in critical infrastructures, providing a careful analysis of the relative level of security on a global scale. It discusses the main vulnerabilities of critical systems exploitable by cyber […]
It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Donât forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]
Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological battle growing. After the publishing of the news regarding the genesis of Stuxnet and Flame every actor of the conflict has increased the effort on cyber warfare especially on cyber defense fearing an imminent cyber […]
We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government is developing an adequate cyber strategy investing huge quantity of money in the establishment of cyber units, on formation of groups of cyber experts and on the development of new cyber weapons. In this scenario […]
The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of the strong commitment of Indian and German government, praising the US capabilities for the involvement in operations such as the “Olympic Games” project. But what are the real cyber capabilities of the United States? No […]
During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the team of experts of his company has found strong similarities between part of the Flame source code and a 2009 version of Stuxnet. The news is really surprising, the analogies demonstrate that behind the development […]
It’s not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare to attack its enemy in the cyber space. For years Israel conducts cyber espionage and cyber offensive operations that allow the state to operate undisturbed, away from media pressure always attentive to the controversial international policy […]
What’s happening while the world’s attention is on Flame malware? The cyberspace is a very turbulent place where groups of hackers daily attack governments and private industries. Governments, hacktivist, cybercrime opposing forces facing each other on the same board, a game of chess where the outcome is unpredictable and no shortage of twists. Stuxnet, Flame […]
Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts sustains that the cyber war era is just begun, due this reason the Pentagon is involving the private companies, universities and even computer-game companies to develop technologies to improve its cyber warfare capabilities. Events such […]