cyber weapon

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

14 years ago

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

14 years ago

Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last…

14 years ago

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

14 years ago

Walk trough the penetration testing fundamentals

The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download…

14 years ago

Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after…

14 years ago

Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the…

14 years ago

OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…

14 years ago

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

14 years ago

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

14 years ago

This website uses cookies.