cyber war

Israel vs Iran.The strategic importance of 5° domain,the cyberspaceIsrael vs Iran.The strategic importance of 5° domain,the cyberspace

Israel vs Iran.The strategic importance of 5° domain,the cyberspace

Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for…

13 years ago
UK recruits “Xbox generation” youngsters for cyber war gamesUK recruits “Xbox generation” youngsters for cyber war games

UK recruits “Xbox generation” youngsters for cyber war games

The future is now, I've often spoken about the enormous potentiality of gaming platforms and of the capabilities of young…

13 years ago
Secretary of Defense Panetta on U.S. cyber capabilitiesSecretary of Defense Panetta on U.S. cyber capabilities

Secretary of Defense Panetta on U.S. cyber capabilities

Without doubts the man that has attracted the media attention in the cyber warfare scenario is Defense Secretary Leon Panetta,…

13 years ago
Analisys on Flame C&C, the cyber war began long agoAnalisys on Flame C&C, the cyber war began long ago

Analisys on Flame C&C, the cyber war began long ago

In May Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published a news regarding a…

13 years ago
Gauss, evidence of ongoing cyber-war and cyber espionage campaignsGauss, evidence of ongoing cyber-war and cyber espionage campaigns

Gauss, evidence of ongoing cyber-war and cyber espionage campaigns

As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab.…

13 years ago
South Korea, another data breach. How is changing the hacking world?South Korea, another data breach. How is changing the hacking world?

South Korea, another data breach. How is changing the hacking world?

Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect…

13 years ago
Who really takes advantage of the operations of Anonymous?Who really takes advantage of the operations of Anonymous?

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

13 years ago
The ‘cyber war’ era began long agoThe ‘cyber war’ era began long ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

13 years ago
Cyber war, the strategic importance of the defenseCyber war, the strategic importance of the defense

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the…

13 years ago
The mystery of a massive cyber attack on IranThe mystery of a massive cyber attack on Iran

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological…

13 years ago