cyber

US vc China. Is cyber warfare gap increasing?US vc China. Is cyber warfare gap increasing?

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

13 years ago
Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

Article published on The Malta Indipendent Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of…

13 years ago
A picture of the Iran threatA picture of the Iran threat

A picture of the Iran threat

The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have…

13 years ago
DNSChanger , much ado about nothing and the wrong choiceDNSChanger , much ado about nothing and the wrong choice

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…

13 years ago
Iran,Oil Industry under cyber attack,are we close to a military strike?Iran,Oil Industry under cyber attack,are we close to a military strike?

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

13 years ago
Analysis of cybercrime and its impact on private and military sectorsAnalysis of cybercrime and its impact on private and military sectors

Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last…

13 years ago
DDoS, detailed analysis of the phenomenonDDoS, detailed analysis of the phenomenon

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…

13 years ago
Anonymous,from OpTrialAtHome to the streets,is time for changingAnonymous,from OpTrialAtHome to the streets,is time for changing

Anonymous,from OpTrialAtHome to the streets,is time for changing

Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing…

13 years ago
Medicaid incident. How much cost a data breach?Medicaid incident. How much cost a data breach?

Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an…

13 years ago
Governments and gaming platforms, it’s time for warfareGovernments and gaming platforms, it’s time for warfare

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

13 years ago