Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not […]
Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]
As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis. The reasons are countless, high profits and unpunished crimes most often the main reasons. What amazes is, however, the organization managing the criminal business. Operations managed as projects and malware designed as products of large […]
In these days we have witnessed the escalation of operations conducted by the Anonymous group, the hacker group that is espressing a social dissent througth cyber attacks. The Internet world is profoundly changing, and the threat of hacktivist groups represents one of the major cyber threats. We must consider that the attacks of these groups […]
In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided by the Israeli government officials, they have declared infact that attacks like […]
Koobface virus is undoubtedly considered as the malware of social network because it uses them as spread channel. We have repeatedly mentioned the incredible power of social networking media, platforms that reach a global audience with a simple click, obvious that such a capability could be attractive to criminal organizations for the spread of malware. […]
Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been stolen in a successful attack to the […]
This week has began under worse auspices worse for Israel, which, despite its attention to the cyber threats posed by cyber-space, has been victim of a series of attacks that have checkmated the government of Jerusalem. Israel is facing with a true escalation in cyberwar, not identified attackers have in fact pulled down two principal […]
The year 2012 has started in the worst way in terms of cyber security, because we have observed several attacks settled successfully against military organizations and private companies. After the sensational case of the Zappos data breach and of the cyber escalation which Israel is a victim, also the company T-Mobile has suffered an attack. […]
In this hours is circulating in internet the news regarding a new clamorous hack that this time has hit the online retailer Zappos.com, a division of Amazon. According the official announcement of the company it was victim of a cyber attack that gained access to its internal network exposing sensible information. Seems to be that […]