Cyber Crime

Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu…

14 years ago

Video game & Security, a new opportunity? Gaming platform primary target for cyber attacks. (EN/IT)

English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort…

14 years ago

Trojan & Co, the new frontiers of espionage

Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about…

14 years ago

Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor…

14 years ago

On demand Calling service for cybercriminals growing

Trusteer Researchers have found a professional calling service that has been designed for cybercriminals needs. The service is organized to…

14 years ago

Can Cloud Computing Manage Serious Cyber Threats?

Can Cloud Computing Manage Serious Cyber Threats? U.S. Cyber Chief Says yes, personally I have several doubts regarding this opportunity. I draw…

14 years ago

CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an…

14 years ago

Hackers Attacked U.S. Satellites Connected To The Internet, Report Finds

Hackers interfered with the operation of two U.S. government satellites in 2007 and 2008 obtaining access through a ground station…

14 years ago

This website uses cookies.