In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure from this threat? Let’s approach the questions step by step talking about its origin, on which much has been discussed. Comparing Stuxnet to Duqu Many researcher indicate that Stuxnet is the progenitor of the Duqu, both […]
English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort necessary to the success of the attack, the audience involved, access to resources used in turn for further offenses? Personally, I have many doubts … a gaming platform! Yesterday on a national newspaper has been published […]
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality of interest. Over the years, and the overwhelming technological evolution, scenarios are profoundly changed. Access to information most often passes through the circuits of a mobile device or a personal computer and this led to an increasing focus of many companies and government agencies in […]
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the “Russian Federal Service for Supervision Telecoms” has announced it that it has launched a tender for developing a Content Monitor System with a budget of $ 530,000. Following the tender the development phase was started in august and have […]
Trusteer Researchers have found a professional calling service that has been designed for cybercriminals needs. The service is organized to offer the extraction of sensitive information needed for bank fraud and identity theft from individuals. The security company Trusteer has discovered an advertisement for making targeted call calls in different languages to private individuals, banks, […]
Can Cloud Computing Manage Serious Cyber Threats? U.S. Cyber Chief Says yes, personally I have several doubts regarding this opportunity. I draw inspiration in the article that I read and I quote to introduce the topic, dwelling on the words of Alexander that appeared, in my humble opinion, empty of a technical foundation. In fact, the paradigm can be adopted to implement complex architectures that can be used to combat threats posed by cyber crime. Do not forget, […]
As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an ocean seemingly unrelated data. An unit part of the CIA’s Open Source Center is responsible for monitoring the vast and various social networks, local and international news, radio, and television, Internet chat rooms, and pretty much anything from […]
Hackers interfered with the operation of two U.S. government satellites in 2007 and 2008 obtaining access through a ground station in Norway. The usage of the attacked satellites is climate monitoring. There aren’t any news regarding the nature of the interference but notes that the hackers “achieved all steps required to command” the Terra AM-1 […]