I have just read the news that Iran will be banned the purchase of antivirus systems, a kind of technological embargo with clear reference to the virus Stuxnet and the need of the country to prevent further infection to any control systems of critical infrastructures, nuclear plants first. The new has been made public by […]
The Chinese government is famous for the high level of monitoring implemented on the internet and in the specific on all the new social media, that is the modern form of censorship, a model that several countries all over the world are taking for example. Nothing is changed, the government plans to continue censoring […]
The news has caused much uproar in the scientific community, according European and U.S. officials and private experts the iranian scientists have isolated and made harmless the Stuxnet malware that has infected the control systems of the nuclear plants all over the country. For some years Iranian security experts are facing with this virus that is […]
By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of the implemented security policies . The Wall Street Journal has reported the news that the telecoms company Nortel Networks has been repeatedly exploited by Chinese hackers for a long time, almost a decade. The former Nortel […]
At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]
The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]
Cloud computing will play an increasingly critical role in the future of the information technology sector, impacting individual consumers, corporations, governments, and international commerce alike. As a forensic psychologist with a national security and law enforcement background, arguably, the design and implementation of cloud computing also involves exposure to multiple security risks at various levels. Understanding the “dark side” of cloud computing at […]
The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks’ 7th Annual Worldwide Infrastructure Security Report. Despite this king of attacks remain relatively rare, the news must alert […]
In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]
No peace in the cyber space, day after day we read that the computer systems for major corporations and governments are compromised due repeated cyber attacks. This time it was the prestigious Verisign, a name that is our mind we link to the concept of “strong security”, but we are learning that the total security […]