Espionage

MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence…

14 years ago

Iran – China Axis and the dangerous alliances

If you were to ask me what is the most frightened nation in terms of cyber offense without a doubt…

14 years ago

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups…

14 years ago

Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to…

14 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

14 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

14 years ago

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

This website uses cookies.