cyber threat

Cyber terrorism, cyber attacks against al Qaeda 2.0Cyber terrorism, cyber attacks against al Qaeda 2.0

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

13 years ago
Anonymous, its strategy against censorship and the diversionary theoryAnonymous, its strategy against censorship and the diversionary theory

Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and…

13 years ago
Cyber WeaponsCyber Weapons

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

13 years ago
UPGRADE – VISA, MASTERCARD and GPN breachUPGRADE – VISA, MASTERCARD and GPN breach

UPGRADE – VISA, MASTERCARD and GPN breach

The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently…

13 years ago
Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and IndiaChinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

13 years ago
VISA & MASTERCARD breach raises Security doubts on standard complianceVISA & MASTERCARD breach raises Security doubts on standard compliance

VISA & MASTERCARD breach raises Security doubts on standard compliance

The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more…

13 years ago
Duqu – Cyber weapons factory still operating … it’s just the beginningDuqu – Cyber weapons factory still operating … it’s just the beginning

Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined…

13 years ago
Japan and the privacy contradictionsJapan and the privacy contradictions

Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult…

13 years ago
Huawei – Symantec, broken join venture and the fear on chinese firmsHuawei – Symantec, broken join venture and the fear on chinese firms

Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei - Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant…

13 years ago
Reflections on the Zero-Days Exploits market starting from Forbes’s articleReflections on the Zero-Days Exploits market starting from Forbes’s article

Reflections on the Zero-Days Exploits market starting from Forbes’s article

The news that I wish discuss was published on the website of Forbes magazine, titled "Shopping For Zero-Days: A Price…

13 years ago