cyber threat

US Experts say: Government Networks constantly hackedUS Experts say: Government Networks constantly hacked

US Experts say: Government Networks constantly hacked

For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical…

13 years ago
Social networks & Deactivated Friend Attack, the cybercrime paradiseSocial networks & Deactivated Friend Attack, the cybercrime paradise

Social networks & Deactivated Friend Attack, the cybercrime paradise

A few days ago I wrote about the dangers relating to a not careful attendance of social networks, powerful platforms…

13 years ago
Verizon Report, the wind of hacktivism pushes cybercrimeVerizon Report, the wind of hacktivism pushes cybercrime

Verizon Report, the wind of hacktivism pushes cybercrime

Just yesterday I completed a lengthy article regarding several aspects of cybercrime and their impact on private and military sectors. In a…

13 years ago
Face to Face with Duqu malwareFace to Face with Duqu malware

Face to Face with Duqu malware

Once again we discuss about Stuxnet, cyber weapons and of the malware that appears derivate from the dangerous virus. The international scientific community…

13 years ago
China again victim of cyber attacksChina again victim of cyber attacks

China again victim of cyber attacks

We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions.…

13 years ago
Drone for freedom or cyber threat? The Pirate Bay ideaDrone for freedom or cyber threat? The Pirate Bay idea

Drone for freedom or cyber threat? The Pirate Bay idea

The news seems to come from a science fiction film, drone aircrafts used to escape the oppressive censorship practiced by many states,…

13 years ago
Millions US government email addresses in the hands of the cybercrimeMillions US government email addresses in the hands of the cybercrime

Millions US government email addresses in the hands of the cybercrime

It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources,…

13 years ago
Anonymous fake OS, who is behind it?Anonymous fake OS, who is behind it?

Anonymous fake OS, who is behind it?

In recent days, by chance I discussed with colleagues the relationship between the Vatican and Anonymous groups because I consider the Holy See a…

13 years ago
CIA and the intelligence components of the thingsCIA and the intelligence components of the things

CIA and the intelligence components of the things

Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use…

13 years ago
Anonymous vs Vatican, thirst for justice or criminal act?Anonymous vs Vatican, thirst for justice or criminal act?

Anonymous vs Vatican, thirst for justice or criminal act?

Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear…

13 years ago