cyber weapon

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will…

14 years ago

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this…

14 years ago

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in…

14 years ago

Malware evolution and the Frankenmalware case

In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term "malware" in…

14 years ago

Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on…

14 years ago

MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence…

14 years ago

Zeus,software as a service – Implications for civil and military

As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis.…

14 years ago

Japan under cyber attack. The cyber threat China

The events of recent days from the closure of the Megaupload web site to the heavy offensive of the Anonymous…

14 years ago

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups…

14 years ago

This website uses cookies.