No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical skills. As always, the movement gives voice to social dissent and protest against amendments and decisions of governments guilty of not listening to the masses. Among the prominent victims group hacktivist there ‘s the FBI, […]
In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]
No peace in the cyber space, day after day we read that the computer systems for major corporations and governments are compromised due repeated cyber attacks. This time it was the prestigious Verisign, a name that is our mind we link to the concept of “strong security”, but we are learning that the total security […]
We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency […]
The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until now we have observed as typical scenario for the contagion an unsuspecting user that clicks on a link in the body of email that started the download of malware or that open the agent directly […]
Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that give an idea of the business. Since now we have analyzed the grows of […]
It’s not first time and the news itself doesn’t rapresent a surprise, once again Chinese hacker groups are involved in cyber intelligence operations against western companies with the intent to steal critical information. Symantec Researchers have proved the involvement of Chinese groups in attacks alerting the international community regarding the target attacked, including major U.S. defense […]
So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries and after this offensive is lawful expect a reply first under warfare matter and of […]
Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not […]
Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]