Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of attack, the same result. On internet bounced messages of joy for having staged the second act of the operation called by the group #OpTrialAtHome. Let’s start making some reflections on the real utility of these […]
A few days ago I wrote about the dangers relating to a not careful attendance of social networks, powerful platforms and privileged communication tools, the subject of increasing interest of cybercrime. Many possibilities for attack across these platforms, from social engineering to cyber espionage, not forgetting the spread of all types of malware. Endless audiences […]
No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile systems. I speak of mobile systems and I avoid simply to define them “devices” because of their processing capacity equal to a common desktop. Unfortunately the development of the sector is not paid to the […]
A few days ago I wrote an article on cyber espionage and its higher incidence in the computer crimes. What are the figures who most frequently perform operations of this type? An interest in cyber espionage has been demonstrated by government agencies in search of sensitive information and information relating to industrial technologies used by […]
It is impossible to argue otherwise, after one days from the publication of mail stolen during the hack to Stratfor, it’s time to analyze them in the light of political events in recent years. More than a surprise in many cases we have had confirmation on the controversial work made by governments, companies and security […]
Syria massacre shocks the world, syrian army has repeatedly bombed the protest city of Homs killing several hundred civilians. The images of the bombings and violence have been broadcasted by the main satellites television Al-Arabiya and Al Jazera, but the Damascus government denied involvement in operations made against civilians, blaming groups of mercenaries trying to incite unrest […]
The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple’s users using the Safari browser installed on all products of the company (Mac, iPhone and iPad). It was discovered a mechanism by which Google traced and memorized every online user’s action through cookies, circumventing the […]
Where can I find money? At the bank of course, this is the thought which underlies dell’orietamento of cyber crime that seems to have targeted the banking industry and its services. The event is not new but the intensification of efforts in this area is troubling . The banking sector is considered a strategic sector […]
The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]
In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]