Cyber attacks

Identity Theft, the growing crimeIdentity Theft, the growing crime

Identity Theft, the growing crime

Every day we exchange personal information with colleagues, friends and unknown people with no idea how they are treated and…

13 years ago
Fear Iran and escalation of cyber attacksFear Iran and escalation of cyber attacks

Fear Iran and escalation of cyber attacks

Last week I reported the virus attack to the Iranian oil industry, a cyber attack that seems has caused few…

13 years ago
DNSChanger , much ado about nothing and the wrong choiceDNSChanger , much ado about nothing and the wrong choice

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…

13 years ago
Russian cybercrime, not only a localized threatRussian cybercrime, not only a localized threat

Russian cybercrime, not only a localized threat

Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is…

13 years ago
Iran,Oil Industry under cyber attack,are we close to a military strike?Iran,Oil Industry under cyber attack,are we close to a military strike?

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

13 years ago
Analysis of cybercrime and its impact on private and military sectorsAnalysis of cybercrime and its impact on private and military sectors

Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last…

13 years ago
Flashback? Are you joking? There aren’t malware for MacFlashback? Are you joking? There aren’t malware for Mac

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…

13 years ago
Cyber threats in mobile environmentCyber threats in mobile environment

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…

13 years ago
Stuxnet & Duqu, update on cyber weapons usageStuxnet & Duqu, update on cyber weapons usage

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

13 years ago
DDoS, detailed analysis of the phenomenonDDoS, detailed analysis of the phenomenon

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…

13 years ago