cyber espionage

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

14 years ago

A virus specialized for AutoCAD, a perfect cyber espionage tool

In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development…

14 years ago

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

14 years ago

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports…

14 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

14 years ago

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the…

14 years ago

U.S. communication equipments subject to China cyber espionage

The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to…

14 years ago

LinkedIn passwords compromised.Social network poisoning & other risks

It's happened, today has been diffused the news that users’ passwords of the most famous business social network LinkedIn have…

14 years ago

Israel between cyber war and cyber warfare business

It's not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare…

14 years ago

In the shadow of the Flame, Warner Bros, China Telecom & US Navy hacks

What's happening while the world's attention is on Flame malware? The cyberspace is a very turbulent place where groups of…

14 years ago

This website uses cookies.