Espionage

Millions US government email addresses in the hands of the cybercrime

It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources,…

14 years ago

CIA and the intelligence components of the things

Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use…

14 years ago

Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…

14 years ago

Why consider an enemy Iran and not Russia?

There is no doubt that through the analysis of the operations of a State in cyber space it is possible…

14 years ago

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

14 years ago

Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer…

14 years ago

Wikileaks & Anonymous, new alliance against dirty affairs

The day has come, WikiLeaks began publishing more than five million emails from Texas-based global security think tank company Stratfor, a…

14 years ago

Syria, a massacre began on the web

Syria massacre shocks the world, syrian army has repeatedly bombed the protest city of Homs killing several hundred civilians. The images of…

14 years ago

Critical infrastructures & manipulation of the name Anonymous

What are the main dangers for our infrastructures? Too much threats which any country is exposed. The situation is bleak,…

14 years ago

Google code used to circumvent privacy protections … true or false?

The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple's…

14 years ago

This website uses cookies.