cyber

Cyber terrorism, cyber attacks against al Qaeda 2.0Cyber terrorism, cyber attacks against al Qaeda 2.0

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

13 years ago
Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and IndiaChinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

13 years ago
North Korea scares the WestNorth Korea scares the West

North Korea scares the West

According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much…

13 years ago
Duqu – Cyber weapons factory still operating … it’s just the beginningDuqu – Cyber weapons factory still operating … it’s just the beginning

Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined…

13 years ago
Huawei – Symantec, broken join venture and the fear on chinese firmsHuawei – Symantec, broken join venture and the fear on chinese firms

Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei - Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant…

13 years ago
China again victim of cyber attacksChina again victim of cyber attacks

China again victim of cyber attacks

We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions.…

13 years ago
CIA and the intelligence components of the thingsCIA and the intelligence components of the things

CIA and the intelligence components of the things

Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use…

13 years ago
Give me your mobile and I’ll tell you who you are!Give me your mobile and I’ll tell you who you are!

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

13 years ago
Cyberespionage and new opportunities for cybercrimeCyberespionage and new opportunities for cybercrime

Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer…

13 years ago

Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do…

13 years ago