Espionage

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

14 years ago

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

14 years ago

FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks…

14 years ago

Russian cybercrime, not only a localized threat

Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is…

14 years ago

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

14 years ago

Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last…

14 years ago

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

14 years ago

Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the…

14 years ago

OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…

14 years ago

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

14 years ago

This website uses cookies.