Cyber attacks

Israel and Iran, expense, capabilities and cyber strategiesIsrael and Iran, expense, capabilities and cyber strategies

Israel and Iran, expense, capabilities and cyber strategies

In recent days the discovery of Flame malware  has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of…

13 years ago
Flame malware, from genesis to the plot theoryFlame malware, from genesis to the plot theory

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

13 years ago
China-made US military chip, security backdoor or debugging functionality?China-made US military chip, security backdoor or debugging functionality?

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

13 years ago
US vc China. Is cyber warfare gap increasing?US vc China. Is cyber warfare gap increasing?

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

13 years ago
Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

Article published on The Malta Indipendent Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of…

13 years ago
Has Anonymous infiltrated US Government? The insider issueHas Anonymous infiltrated US Government? The insider issue

Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described…

13 years ago
A picture of the Iran threatA picture of the Iran threat

A picture of the Iran threat

The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have…

13 years ago
The Unknowns, hacker’s revenge in the name of securityThe Unknowns, hacker’s revenge in the name of security

The Unknowns, hacker’s revenge in the name of security

It's happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air…

13 years ago
They are Not What You Think They are … They are HacktivistsThey are Not What You Think They are … They are Hacktivists

They are Not What You Think They are … They are Hacktivists

Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are…

13 years ago
Anonymous Reloaded. Yesterday, today, tomorrowAnonymous Reloaded. Yesterday, today, tomorrow

Anonymous Reloaded. Yesterday, today, tomorrow

The word "Anonymous " evokes the myth of the hacker in today's society that defends freedom of expression and agrees…

13 years ago