Espionage

China, cyber warfare and challenges for the future

When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In…

14 years ago

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

14 years ago

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

14 years ago

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

14 years ago

North Korea scares the West

According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much…

14 years ago

Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult…

14 years ago

Huawei – Symantec, broken join venture and the fear on chinese firms

Huawei - Symantec joint venture is ended because the US firm feared business repercussion for the collaboration with the Chinese giant…

14 years ago

Reflections on the Zero-Days Exploits market starting from Forbes’s article

The news that I wish discuss was published on the website of Forbes magazine, titled "Shopping For Zero-Days: A Price…

14 years ago

US Experts say: Government Networks constantly hacked

For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical…

14 years ago

Face to Face with Duqu malware

Once again we discuss about Stuxnet, cyber weapons and of the malware that appears derivate from the dangerous virus. The international scientific community…

14 years ago

This website uses cookies.