Cyber Crime

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology.…

14 years ago

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares…

14 years ago

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous…

14 years ago

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…

14 years ago

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is…

14 years ago

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…

14 years ago

From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…

14 years ago

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…

14 years ago

This website uses cookies.