This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world. This weapons could be been used in cyber attacks, claiming victims from cyberspace to the real world. Names like Stuxnet and Duqu have become […]
Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments such as Russia, the country where a massive cyber repressive action was carried out […]
The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions monitoring to remote surgery. Informations systems manage massive amounts of sensitive information, making them available to […]
Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised doubts about the genesis of the agent. […]
Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision of electricity supply or water. The concern is high, it could materialize the nightmare […]
With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software privacy: End user: sing one licensed copy to install a program on multiple computers,copying distrubuting […]
2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were led to believe, with the case Comodo. Comodo officials revealed that the registration authority had […]
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our SMS … the privacy of millions of users has been violated! A disturbing application, multi-platform, which had not been reported previously. The news is troubling because it puts into serious consideration the privacy rights of […]
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country full of contradictions I presented a picture of the nation in terms of cyberwarfare, […]