cyber weapon

Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…

14 years ago

Why consider an enemy Iran and not Russia?

There is no doubt that through the analysis of the operations of a State in cyber space it is possible…

14 years ago

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

14 years ago

Anonymous, DNS Amplification Attacks for Operation Global Blackout

In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by  groups…

14 years ago

Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer…

14 years ago

Iran from cyber warfare to the oil war

Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In…

14 years ago

Mud against Anonymous using Zeus malware

Symantec company recently has disclosed the news that the collective Anonymous has deceived his supporters favoring the spread and installing of Zeus…

14 years ago

Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do…

14 years ago

Wikileaks & Anonymous, new alliance against dirty affairs

The day has come, WikiLeaks began publishing more than five million emails from Texas-based global security think tank company Stratfor, a…

14 years ago

Cyber arms race, too many shadows on the future

The Mehr News Agency has published a declaration of brigadier general Gholamreza Jalali collected during an official conference that demonstrate…

14 years ago

This website uses cookies.