cyber threats

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…

14 years ago

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…

14 years ago

Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after…

14 years ago

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…

14 years ago

Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the…

14 years ago

OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…

14 years ago

China, cyber warfare and challenges for the future

When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In…

14 years ago

Anonymous attacks the UK government.OpTrialAtHome, Tango Down

As announced during last days Anonymous has launched a Distributed Denial of Service (DDoS) against several UK government websites. A massive recruiting campaign…

14 years ago

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

14 years ago

Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and…

14 years ago

This website uses cookies.