cyber weapon

Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to…

13 years ago

Gauss, evidence of ongoing cyber-war and cyber espionage campaigns

As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab.…

13 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

13 years ago

Japan institutions victim of cyber espionage, is it cyber warfare?

One of the biggest cyber threat is cyber espionage, it's the sign of the technological era in which every devices…

13 years ago

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We…

13 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

13 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

13 years ago

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the…

13 years ago

Increasing concerns on cyber warfare capabilities of the North Korea

According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks…

14 years ago

Israel between cyber war and cyber warfare business

It's not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare…

14 years ago

This website uses cookies.