Espionage

Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of…

14 years ago

Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the…

14 years ago

Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking…

14 years ago

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to…

14 years ago

VeriSign Hacked. Why?

No peace in the cyber space, day after day we read that the computer systems for major corporations and governments…

14 years ago

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in…

14 years ago

Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on…

14 years ago

This website uses cookies.