Cyber Crime

Anonymous vs FBI, threat or voice to listen?

No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical…

14 years ago

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to…

14 years ago

VeriSign Hacked. Why?

No peace in the cyber space, day after day we read that the computer systems for major corporations and governments…

14 years ago

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until…

14 years ago

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will…

14 years ago

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in…

14 years ago

Malware evolution and the Frankenmalware case

In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term "malware" in…

14 years ago

This website uses cookies.