cyber espionage

GCHQ used fake LinkedIn and Slashdot to hack GRX providers and OPEC

The GCHQ (British Government Communications Headquarters) used fake LinkedIn and Slashdot to hack Belgacom, OPEC & others GRX providers. According…

12 years ago

Mobile devices and cyber espionage, principal concerns for governments

The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits…

12 years ago

LinkedIn – How to exploit social media for targeted attacks

  The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…

12 years ago

Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Finland's foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry…

12 years ago

Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a…

12 years ago

Social media and digital identity. Prevention and incident response

The hack of a social media account is a common incident that could have a serious impact of our digital…

12 years ago

Profession Hacker, it’s shortage for cyber experts

Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It's…

12 years ago

Ponemon Institute issued the 2013 Cost of Cyber Crime Study

HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to…

12 years ago

How to create undetectable malware with Mac encryption mechanism

Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the…

12 years ago

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

12 years ago

This website uses cookies.