Cyber attacks

Identity Theft, the growing crime

Every day we exchange personal information with colleagues, friends and unknown people with no idea how they are treated and…

14 years ago

Fear Iran and escalation of cyber attacks

Last week I reported the virus attack to the Iranian oil industry, a cyber attack that seems has caused few…

14 years ago

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…

14 years ago

Russian cybercrime, not only a localized threat

Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is…

14 years ago

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

14 years ago

Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last…

14 years ago

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…

14 years ago

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…

14 years ago

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

14 years ago

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…

14 years ago

This website uses cookies.